Criminal and Government hackers around the world are allegedly exploiting the current coronavirus pandemic to spy on unsuspecting individuals. Cybercriminals are also targeting industries like aerospace, transport, manufacturing, hospitality, healthcare, and insurance.
Security blogger Brian Krebs reports that the interactive Covid 19 map on John Hopkins University’s website is being targeted with malware. According to Brian, hackers are selling malware claiming to compromise the map and also infect its users.
Johns Hopkins’ spokeswoman Jill Rosen confirms that the university is aware of the malware that impersonates its COVID-19 site. She also warns users to only trust the maps on its own site and one maintained by ArcGIS. According to Jill, the malware requires its users to download software to enable them to generate the fake map.
“If you receive an email containing a link to download such an item or come across the code for the malicious app please report it immediately to the Esri incident response team through ArcGIS Trust Center security concern page,” She warned.
Also Read:
– US Department Of Defense Reconsiders JEDI Multi-Billion Contract Awarded To Microsoft
– Coronavirus: Apple To Suspend iPhone 9 And 12 Release Date Indefinitely
– New Coronavirus Precaution: Apple Says You Can Clean Your Smartphones With Disinfectants
Two hacking groups with alleged ties to the Chinese government have targeted Vietnam, the Philippines, Taiwan, and Mongolia, according to cybersecurity firms FireEye and Check Point.
Hackers lacing emails with genuine health information about coronavirus
They also warned that hackers are sending email attachments with genuine health information about coronavirus while the emails are laced with malware like Sogu and Cobalt Strike. A senior intelligence analyst at FireEye Ben Read made this warning known.
“The lures were legitimate statements by political leaders or authentic advice for those worried about the disease, likely taken from public sources,” Read explains.
A Russian group that identifies as TEMP.Armageddon also sent spear-phishing emails to Ukrainian targets. Spear-phishing involves sending specially crafted malicious links tricking the target into clicking. This allows hackers to infect them without their knowledge.
Therefore, while the coronavirus’ threat still exists and there is need to get information updates regularly; individuals should remember that hackers are lying around in wait.
You can follow the security instructions in the following articles for precautions: Eight Cyber Security Tips Everyone Should Remember At All Times and Why Using Your Smartphone While In Transit Leaves You More Vulnerable.
For your daily dose of tech, lifestyle and trending content, make sure to follow Plat4om on Twitter @Plat4omLive, on Instagram @Plat4om, on LinkedIn at Plat4om, and on Facebook at Plat4om. You can also email us at info@techtalkwithtdafrica.com. Finally, don’t forget to subscribe to our YouTube channel HERE.