Cybersecurity


Is COVID-19 Germinating More Cyber Attacks?

Is COVID-19 Germinating More Cyber Attacks?

The short answer to that question is a definite yes.

In fact, according to cyber intelligence firm CYFIRMA, there has been a stunning 600% increase in threat indicators between February and early March alone with hackers from all over the globe cooking up new schemes.

 

Why Hackers are Upping their Game?

Hackers know that fear and disruption equals opportunity and there is nothing quite like a global pandemic to create plenty of both.

Cybercriminals are also well aware that many employees are now being forced to work from home and that puts poorly prepared businesses at risk of a wide variety of cyber-attacks – from home Wi-fi hacking and phishing to brutal DDoS assaults.

Businesses directly connected with the pandemic should be doubly careful by using phishing protection services. The nastiest cybercriminals of all are targeting hospitals and medical labs. Some are motivated by money, looking to extort hospitals or steal and sell valuable research. Others have more political aims (e.g. subverting national governments).

 

How do hackers gain entry?

Here are three tactics – with examples of how they have been used during the COVID-19 outbreak:

Sneaking under the gate

This is the closest method fitting the stereotype of the hacker as some sort of technical whizz probing for weaknesses.

For example, with remote working taking off, cybercriminals have realized they can strike gold through hacking relatively insecure home Wi-fi routers. An expo by Bitdefender showed us how hackers are targeting vulnerable types of router (namely Linksys and D-Link routers) to change DNS settings.

Basically, they are telling the routers to direct requests for certain popular sites (e.g. AWS and Disney) to a fake site. Before loading, a convincing info panel pops up offering advice about coronavirus. When the target clicks the download button, a chain of events plays out behind the scenes, ending with a program known as an ‘infostealer’ downloaded on the device. You don’t need much imagination to guess what that does (it even steals Bitcoins!)

Smashing down the gate

Or to be more accurate, holding shut the gate – for everyone. This is how a standard Distributed Denial of Service (DDoS) attack works. It uses the combined power of multiple computers to flood a network with connection requests, effectively taking it offline.

When the website in question is the US Health and Human Services department website, during a killer pandemic, you can see how this could be a problem.

Bloomberg reported a suspected DDoS attack on the HHS in March although, according to secretary Alex Azar, the department: “had no penetration into our networks, we had no degradation of the functioning of our networks.”

It is still unclear whether this was a genuine DDoS attack or simply the result of an uptick in genuine requests overwhelming the HHS servers. Nevertheless the threat is clear to see.

Getting you to open the gate

This is the most effective method of all.

Coronavirus and mass panic creates a perfect storm for hacker phishing expeditions. The classic phishing technique abuses our fears and our trust to get us to download the type of malware mentioned above (and other nasties like ransomware).

The malware (or a link to it) is sent via an email disguised to deceive the recipient into opening it – either due to fear or simple lack of attention (“It said it was from HR, boss!”)

During this COVID crisis, phishing campaigns could be disguised as:

  • An information update from the WHO, CDC or another trusted organization
  • Urgent instructions from HR or the management
  • Check application form from the Federal government
  • COVID-19 vaccine announcement
  • Low cost PPE (masks, gloves, etc.)
  • Foreclosure warning from your bank

If that scares you, we have a solution: Phish Protection is ready to keep these attacks at bay permanently (it’s like PPE for anyone who handles emails!)

 

Solutions: Taking Back Control

Now that you know a little of what you’re up against, here are a few tips to keep you protected from the increase in hacker activity:

  • Instruct remote employees to check the passwords of their home Wi-Fi routers when logging into the corporate network or cloud services (especially if it’s a D-Link or Linksys router).
  • Public Wi-Fi should only be used for non-sensitive work and only if there is no other option.
  • If possible, supply all remote workers with separate devices for work purposes
  • Add remote workers to your VPN (if you don’t have a VPN, set one up)
  • Create a patch/upgrade policy that works for everyone. As provider of IT consulting Los Angeles based DCG Inc. said in a recent blog post: ‘Security patches and updates play a key role in keeping your business safe against cyber threats.’
  • Make sure employees take regular back-ups of their work. You may want to invest in a cloud back up service.
  • Formulate a disaster recovery plan. Another post from provider of IT Services Los Angeles based DCG Inc. warns: ‘Alarmingly, over 90% of unprepared companies get out of business within a year of a data disaster.’
  • Talk to Phish Protection about our cutting edge anti-phishing technology. We even offer a 60-day free trial.

The upheaval caused by COVID-19 is triggering a wave of new phishing attacks from global hackers. By following the above advice and keeping on your toes, you can ensure your systems don’t pick up a virus of a different kind.

 

About Brent:

Brent is the CEO of DCG Technical Solutions Inc. DCG provides the specialist advice and IT Support Los Angeles area businesses need to remain competitive and productive, while being sensitive to limited IT budgets.

Brent has been featured in Fast Company, CNBC, Network Computing, Reuters, and Yahoo Business. He also leads SMBTN – Los Angeles, a MSP peer group that focuses on continuing education for MSP’s and IT professionals. DCG was recognized among the Top 10 Fastest Growing MSPs in North America by MSP mentor.

Cybersecurity Updates For The Week 1 of 2020

Cybersecurity Updates For The Week 1 of 2020

In a shocking development, many people last week suffered from massive ransomware attacks all over the world. Several precautions are taken by users these days as awareness about cybercrime grows, but there are always new ways discovered by attackers to steal more information. Although millions of dollars are being spent by government agencies to rectify the errors that allow such incidents to happen, these incidents continue to occur with alarming regularity.

  Continue reading “Cybersecurity Updates For The Week 1 of 2020” »

Cybersecurity Updates For The Week 52

Cybersecurity Updates For The Week 52

Yet another exciting time in cyberspace, last week was spent by most of the enterprises trying to fix some of the most common vulnerabilities and various sources of zero-day attack present in much of the software of some of the top organizations around the world. Microsoft was finally able to send a patch for the win32k zero-day attack, and the ransomware that affected Pensacola was eventually detected and stopped; however, even with all this progress, there are still millions of cybercrimes taking place every day in the world.

Continue reading “Cybersecurity Updates For The Week 52” »

Cybersecurity Updates For The Week 51

Cybersecurity Updates For The Week 51

Cybersecurity or Internet Security is of utmost importance in the digital world today. It is a body of technology, expertise, norms, and processes designed to safeguard devices, data, programs, and networks from being attacked or accessed without authorization. Cybersecurity is essential to promote as all the important officialdoms, be it the government, military, defense, or medical organizations, store massive amounts of unprecedented data on various networks, computers, and such other devices.

Continue reading “Cybersecurity Updates For The Week 51” »

Cybersecurity Updates For The Week 50

Cybersecurity Updates For The Week 50

Yet another week passes by, and the number of attacks on innocent netizens only escalates. Hackers are undoubtedly on an endless spree of infecting devices with malware and disrupting the daily activities of people. While many users indirectly encourage attackers by easily giving them the demanded ransom, others choose to stay firm and not do what the hacker wants even if they have to struggle because of this decision. People may adopt the best phishing prevention measures, and yet the attackers will manage to find some tiny crevice to enter and breakdown their entire system. The internet is flooded with news of such incidents that have happened over the week. But here we bring you the most important headlines from the world of cybersecurity:

Continue reading “Cybersecurity Updates For The Week 50” »

Cybersecurity Updates For The Week 49

Cybersecurity Updates For The Week 49

The cyber-world is full of stories of technological innovations with newer and unthinkable horizons of progress being reached every day. However, development is not just happening for the masses; there is a community of people who are working against these innovations for their personal benefit, often at the price of privacy, property, identity, and money of the innocent users. These are the cybercriminals who come up with new and unusual methods of defying anti-phishing tools. Here is a list of the major attacks from the past week to help keep your guards up.

Continue reading “Cybersecurity Updates For The Week 49” »

Cybersecurity Updates For The Week 48

Cybersecurity Updates For The Week 48

The cyber arena is an integral part of the life of millennials because of which nothing ever seems to take place offline. However, anti-phishing protection becomes necessary when we deal with new websites, new people, and new technological advancements every day as the times are difficult, and cybersecurity is at stake with the existence of countless malicious actors. There are innumerable instances of cyber-attacks being launched by the attackers, which have made individuals, companies, and governments suffer financially, socially, politically, and emotionally. Here is an account of the most recent cybercrimes to help you better analyze the dark reality of the digital world.

Continue reading “Cybersecurity Updates For The Week 48” »

Cybersecurity Updates For The Week 47

Cybersecurity Updates For The Week 47

Cybersecurity is an issue with growing concern among all netizens. There is barely any privacy on the internet today, and not taking the right security measures only adds on to make us all the more unsafe on the web. Hence, there are rising numbers of instances of cyber-attacks and it is because of this that ensuring phishing prevention has become mandatory for individual users as well as the organizations. Here are the top headlines from the cyber world to help to plan your security better.

Continue reading “Cybersecurity Updates For The Week 47” »

Cybersecurity Updates For The Week 46

Cybersecurity Updates For The Week 46

There is no denial of the fact that the advancement of technology has reached greater heights in the world of the attackers. Now and then, the name of some new form of a cyber-attack can be heard or read. These attacks are so well planned and executed that as users of the internet, anything we do as an anti-phishing measure is barely ever enough to meet the standards of sophistication employed by the attacker. However, continually studying the recent trail of attacks helps gain at least some insight into the minds and functioning of the cyber adversaries, which enables us to exhibit some preparedness. That is why we have come up with a list of the significant cyber-attacks throughout the week to help you study the attackers better.

Continue reading “Cybersecurity Updates For The Week 46” »

Cybersecurity Updates For The Week 45

Cybersecurity Updates For The Week 45

Recent years have witnessed a significant upsurge in the rate of cybercrimes. Not only has the frequency of attacks increased, but even the methods used for launching cyberattacks have also been evolving to include the most sophisticated and unique forms of phishing that phishing prevention almost becomes an unattainable goal for many. However, the least that can be done by us as spectators or apprehensive users of the internet is to stay updated about all the happenings in the cyber world so that we can at least have an inkling of the kind of things to expect while we are online. Here is the list of all the major events related to cybercrime throughout the past week to help you keep abreast of all changes.

Continue reading “Cybersecurity Updates For The Week 45” »

Cybersecurity Updates For The Week 44

Cybersecurity Updates For The Week 44

The rate at which cybercrimes are propagating is beyond the imagination of an ordinary mind. All we can say is that the ill-motivated have begun to outnumber and outsmart the good actors in the cyberworld. This becomes evident in the endless stream of failed phishing prevention measures that lead to major cybercrimes such as identity theft, financial losses, and sextortion campaigns on a daily basis. Here are the most recent cyber attacks that have made it to the headlines in the past week.

Continue reading “Cybersecurity Updates For The Week 44” »

Cybersecurity Updates For The Week 43

Cybersecurity Updates For The Week 43

Cybersecurity is a growing concern across the globe. But as more and more people are gaining awareness about the importance of anti-phishing solutions, there are all the more instances of cybercrimes recorded. There is little doubt that the increase in the adoption of cybersecurity measures is followed by a parallel and perhaps more significant increase in the intellectual and innovative abilities of the adversaries who manage to invent some new form of cyber forgery almost every other day. To help the cyber enthusiasts get a better idea of the recent updates from the incessant scuffle between the good actors and bad actors, we have presented the latest headlines from this past week in the cyber world.

Continue reading “Cybersecurity Updates For The Week 43” »

Cybersecurity Updates For The Week 42

Cybersecurity Updates For The Week 42

Today’s cyberspace includes computer resources, IT networks, and all the fixed and mobile devices which connect to the internet. Because of the borderless nature of the global internet, protection of critical infrastructure operations is emerging as a significant challenge. Hackers always look to exploit the vulnerability of an unsuspecting internet user. Hence, cybersecurity experts strive to combat these threats by inventing new anti-phishing solutions regularly. Here we present some of the latest news headlines from the cyber world.

Continue reading “Cybersecurity Updates For The Week 42” »

Cybersecurity Updates For The Week 41

Cybersecurity Updates For The Week 41

Cybersecurity is a dynamic arena with some event or the other never ceasing to take place. While cybersecurity measures reach unmatched levels of sophistication and ultra protection, cyber attacks make an equal stride. Thus the stifle between the good and the bad actors of the cyber world is never-ending. However, anyone interested in these affairs would want to keep track of all phishing prevention measures that have been possibly invented. Keep yourself updated about the latest activities from the cybersecurity world as we bring you the major events from the past week:

Continue reading “Cybersecurity Updates For The Week 41” »

Cybersecurity Updates For The Week 40

Cybersecurity Updates For The Week 40

Cybersecurity is the biggest challenge that confronts all netizens today. No matter how strong and secured a network chain is attackers manage to exploit the loopholes, using it to their benefit and misguiding the users to extract personal details. Individuals and organizations deploy anti-phishing measures, but bad actors always look forward to outsmarting them. Here we have a list of the main headlines from the digital world for the cybersecurity enthusiasts:

Continue reading “Cybersecurity Updates For The Week 40” »

Cybersecurity Updates For The Week 38

Cybersecurity Updates For The Week 38

As the world goes online and transcends barriers that are not always physically surmountable, there is a parallel force that makes an equal and often more significant leap. This is the progress made by the bad actors who are never tired of inventing new means and ways of getting into our networks and systems, stealing our data either to demand a ransom later or to use our credentials and rob us of our money and identity. Hence, protection from phishing attacks is what the cyber world now seeks to achieve. We have presented below a list of the most recent cyberattacks to help you better estimate the technologies used by the adversaries and thus keep you prepared for any cyber-attacks.

Continue reading “Cybersecurity Updates For The Week 38” »

Cybersecurity Updates For The Week 37

Cybersecurity Updates For The Week 37

As phishing attacks take a toll on the internet users, the losses caused thereof only seem to multiply. Phishing attack prevention is the biggest challenge that lies ahead for netizens. Cyber attacks are imminent and so keeping abreast with the newest technology employed by adversaries is vital for anyone who wishes to keep himself safe from any such attacks. Following are some of the most precarious cyberattacks that made the world jitter in the past week:

Continue reading “Cybersecurity Updates For The Week 37” »

Data Breaches Are Going to Cost How Much by 2024?

Data Breaches Are Going to Cost How Much by 2024?

Data breaches are big business. Everywhere you turn you hear about another organization getting hit by a data breach.

We also know from recent events that recovering from a data breach can be expensive. Whether you choose to pay the ransom like this South Korean web host or resolve it internally like the city of Baltimore did, the cost can run into the millions or tens of millions of dollars.

Continue reading “Data Breaches Are Going to Cost How Much by 2024?” »

Cybersecurity Updates For The Week 36

Cybersecurity Updates For The Week 36

Nowadays, phishing prevention has become the biggest challenge that the cyber world is facing. By taking advantage of each progress in IT, and by sheer cunning and intelligence, adversaries make sure that they always remain ahead of the good actors. The good actors function, but often too slow, giving the attackers opening to hit them with new and innovative cyber attacks. Such events take place every day, and it can be challenging to keep track of the latest techniques used by hackers. But it is pertinent that to prepare ourselves to face these attacks, we are aware of the latest technologies used by cybercriminals. Here, we have a list of the most recent and biggest cybersecurity news to help you update yourself:

Continue reading “Cybersecurity Updates For The Week 36” »

Get Free Access to Phishing Protection Best Practices

  • Learn why hosted solutions like Office 365 are vulnerable to phishing.
  • Discover why you must protect both your employees AND your customers.
  • Read why checking reputation databases once a day is a waste of time.
  • Learn what real-time website scanning should look for.
  • Get strategies for saving time and money on email protection.

Sign Up Below... and Get Instant Access to the Report

Please Enter Your Business Email Below to Continue

232325