Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Cybercriminals are Exploiting Coronavirus Fears

By Luke Wilson
phishing
March 17, 2020

Amid the hysteria over coronavirus (COVID-19), many people know to seek out trusted third-parties for guidance in situations like these, such as the World Health Organization (WHO) or the Centers for Disease Control and Prevention (CDC). But lesser known is the fact that phishing scammers have started capitalizing on the wide-spread fear and uncertainty for their benefit by posing as these authoritative agencies.

You’ve probably been on the receiving end of numerous phishing attempts in your lifetime – think of the latest frantic email you received from a relative claiming they’re traveling abroad and lost their wallet. Or what about in the workplace, when you received that email from your CEO asking you to wire over money? Alarmingly, business email compromise (BEC), a more targeted form of phishing, has caused $26 billion in losses the last four years.

In January 2020, email scammers, disguised as virologists, started disseminating phishing emails with malicious links that claimed to have advice on protective safety measures. More recently, bad actors spoofed the WHO and targeted Italy, a country massively affected by this outbreak. Since January, more than 4,000 coronavirus-related domains have been registered, and research by Check Point suggests that these domains are “50 percent more likely to be malicious than other domains registered at the same period.”

Your organization can have stringent security measures in place to fend off even the most technologically complex hackers, but an employer’s lack of awareness can lead to accidental exposure. According to Proofpoint, accidental exposure was the third most common type of breach in 2018. The public is vulnerable to phishing, as evidenced by Retruster’s data showing phishing attempts have grown 65 percent in the last year.

But not to worry. Just like there are basic hygiene methods that will actually slow the spread of disease in communities, implementing cyber hygiene best practices for your organization can reduce the cybercrime risk. Just as most people are naturally wary of fear-inducing, unsolicited calls from the “IRS,” they should be cautious with any and all unsolicited emails concerning coronavirus.

Although some scams are more conspicuous than others, knowing the signs of suspicious activity can go a long way to safeguarding you and your network’s personal information. At first glance, an email may look genuine, but upon a further inspection, you may notice some glaring errors. Did the email contain typos? Did the email address look legitimate? Is there a call to action to click on an attachment or link?

If the email or website looks familiar, you might not think twice about sending over your personal information, but it is important to take a moment to assess the situation. If you are asked to enter personal or financial information, and you recognize the sender – whether it is your bank or a prominent health institute – call customer support to inquire about the questionable email. A legitimate message from a real organization or company wouldn’t email or call to ask you for this sort of sensitive information.

On an organizational level, if you haven’t already, implement mandatory workplace cybersecurity training with coronavirus phishing email examples and hope they might be used. It brings the training up to date with real world situations.

Additionally, it is no secret that bad actors will leverage breached data to steal credentials and ultimately initiate an account takeover. Coronavirus does not change this attack vector, but we may see an increase in activity due to the chaos that coronavirus is creating within organizations. Vigilance is important both at an individual level and corporate level and it is important for companies to implement tools that recognize which employees have compromised accounts that are circulating out in the deep and dark web that can be exploited.

We cannot, however, rely on technology alone to address this issue. In the wake of this pandemic, workflow will be disrupted and companies will be forced to implement new processes.  New processes are rarely perfect, and organizations will be experiencing more exceptions than normal. Amid the chaos, even C-Suite executives may let their guards down. It is important that we as individuals make smart decisions to protect ourselves and our organizations.

Otherwise, phishing schemes will spread further and become as pervasive as the coronavirus itself.  You can find more information about how to protect yourself from coronavirus phishing and cyber scams at the United States Secret Service or the DHS Cybersecurity and Infrastructure Security Agency (CISA).

KEYWORDS: coronavirus cyber security cybersecurity phishing scams

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Luke wilson

Luke Wilson is Vice President of Intelligence at 4iQ, a Los Altos-based adversary intelligence company.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Which Security Testing is Right for Your Enterprise? - Security Magazine

    Scams, Fraud and Misinformation: How Cybercriminals are Taking Advantage of Coronavirus

    See More
  • Cybersecurity Intrusion Detection

    How Hackers are Exploiting COVID-19

    See More
  • cyber

    Russian state-sponsored cybercriminals exploiting VMware vulnerability

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing