Criminals involve on health worries to trick victims into installing malware.
Cyber criminals are taking benefit of worldwide worries nearby the deadly coronavirus by referring and sharing out malware-laden emails supposedly offering guidance.
Numerous email campaigns have been noticed by security firms monitoring for the latest fears, all of which use coronavirus as a hook to try and get victims to open infected messages.
There have been nearly 7,000 confirmed cases of coronavirus worldwide, More than 300 people have died in the outbreak so far, A man has died of the coronavirus in the Philippines, the first confirmed fatality outside China.
GSMA confirms coronavirus threat won’t halt MWC 2020
iPhone SE 2 may be delayed, iPhone 11 production scaled back, due to coronavirus
Major rise in password-stealing malware detected
Tricked
The first major malware campaign was detected by IBM X-Force Threat Intelligence, and targets victims with coronavirus infection reports in various Japanese prefectures including the main population centers of Gifu, Osaka, and Tottori.
The emails are disguised as official notifications from public health centers, and come with add-ons that promise to provide more details on preventative measures against coronavirus infections.
Disguised as Microsoft Word documents, in fact contain malicious payloads linked to the infamous Emotet malware family which can harvest user credentials, browser history, and sensitive documents.
The malicious files were disguised as pdf, mp4, docx files, with names that implied they contained video orders on how to protect yourself from the virus, updates on the threat and even virus detection procedures.
However the files actually contained a range of threats, counting Trojans and worms that are accomplished of destroying, blocking, adjusting or copying data, as well as interfering with the process of computers or computer systems.
“The coronavirus, which is being widely debated as a major news story, has already been used as bait by cybercriminals. So far, we have seen only 10 unique files, but as this kind of activity often happens with standard media subjects then we expect that this tendency may grow. As people continue to be worried for their health, we may see additional and more malware unseen inside fake documents about the coronavirus being spread,” comments Anton Ivanov, Kaspersky malware analyst.