How did the rates of cybercrime increase during the Corona pandemic?
The Corona pandemic (covid 19) has raised concerns about cyberattacks targeting hospitals, companies, food supplies, and other vital functions, and with the spread of the virus, it has become a widespread dependence on home-based technologies and the wider use of online services, such as video meetings, online shopping and the use of applications; an opportunity for information hackers to exploit the crisis Humanity in launching cyberattacks.
And our site has previously addressed the issue of pirates exploiting the Corona pandemic to implement tricks and breakthroughs based on the fear of citizens and institutions from the spread of the disease, and their desire to know information related to it, and here are some of the methods that these authorities have followed:
Starting from Japan
The first targets in the recorded hacks, which use the Covid-19 pandemic, were the Japanese. Security experts at IBMX-Force and Kaspersky unveiled this trick called Emotet, one of the notorious malware that has been classified as part of a major crime operation Internet.
And discovered “Emotet” for the first time in 2014, and it is one of the “Torjans” programs, as it is considered a malicious program disguised in the form of a “safe” file such as a text document or a song, and these dangerous files are attached to seemingly harmless email messages, in an attempt to trick the victims to click Click it and download it.
In the new Coronavirus scam, hackers warn the victim that infected patients have been reported in his city or neighborhood.
Then, the hackers urge the victims to open a “Word document” to know the city’s injured, but the file contains malicious code that gives the fraudsters the power to control the device through which the document was opened.
As a result, hackers can spy on you, access your computer over the Internet, and install more dangerous malware.
Suspicious Corona links are growing
Last March, the US cybersecurity firm Check Point warned that there were over 4,000 domains on the Internet related to the coronavirus – that is, they contain words like Corona or Covid-19 – since the beginning of 2020.
The company’s report considered that 3% of these ranges are harmful, and another 5% are suspicious. 3% may not seem like a large number, but according to Check Point, this means that this corona related domains are likely to be 50% more harmful than any other domain registered during the same time period.
The company believes that many of these malicious websites will be used in phishing campaigns, which are phishing emails, as they appear to be from a reliable source to trick the user into providing sensitive information, downloading malware, or clicking a link to a website that can do any who are they.
It is common for fraudsters to take advantage of emergencies, such as moments when people are afraid, desperate, and more vulnerable, to spread fraud, the report said.
With the spread of the coronavirus worldwide, fearful computer users will probably become easy targets.
Corona Maps Pirate Traps
After several government and health agencies published maps to monitor the spread of the coronavirus, security experts discovered in mid-March that pirates were taking advantage of people around the world’s fear of the Coronavirus to trick and steal their personal data.
In a report by Reason Labs, researcher Chai said that hackers use these maps to steal user information, such as their names, passwords, credit card numbers, and other information stored in the browser.
Attackers design coronavirus websites, and ask users to download the app to keep them informed of the situation.
This app does not require any installation and shows you a map of how the virus has spread. However, it is an interface for attackers to create a malicious file and install it on your computer.
Pirates are targeting the WHO
Last April, a group of pirates targeted the World Health Organization, with officials and cybersecurity experts warning that hackers from all walks of life seek to take advantage of international concerns about the spread of the Coruna virus, according to a report we published on our website at the time.
World Health Organization head of information security Flavio Aggio said at the time that the identity of the infiltrators was not clear, but the attempts were unsuccessful. He warned that attempts at piracy against the agency and its partners had risen in conjunction with its battle to contain the coronavirus, which has killed tens of thousands around the world.
Alexander Urbelis, a cybersecurity expert and lawyer with the New York-based Blackstone Legal Group, was the first to report to Reuters the attempted intrusion into the health organization and is a specialist in monitoring suspicious online activities.
Urbelis said he followed the activity on March 13, when a group of hackers he was following had activated a malicious website that emulated the WHO internal email system; “I realized very quickly that this was a direct attack on the World Health Organization in the midst of a pandemic.”