Breaking

Coronavirus themed cyberattacks continues to evolve: Malware and Booby-trapped URLs

Cyber industry is concerned about the new threats leveraging the corona virus anxiety. A few days back, The Cybersecurity Times published an article on the phishing campaign that clouted into people’s fear and made them open malicious attachments disguised to be corona-based advisories and precautions. This week, security professionals have identified substantial amount of new threats like booby-trapped URLs, coronavirus themed malware, and credential stuffing manoeuvres.

On March 3rd, researchers identified two new malware campaigns linked to the corona virus, first one spreads via phishing email to deploy Remcos RAT and malware, while the second one through Microsoft Office document dropping a backdoor into the victim’s computer. 

The former disguises as a corona virus safety measures PDF, with a EXE file for Remcos RAT deployment which can run with a VBS file. This is found to be a sophisticated move, as the malware can clearly evade detection by firewalls as it establishes a TLS protection, thanks to Zlab-Yoroi Cybaze for sharing this with the cyber community. 

Once the systems are infected, the victims are asked to download and install two EXE files, and then the VBSscript is used for initiating the attack. On the other hand, MalwareHunterTeam, discovered a corona virus themed MS Office document which was pretended to be from Public Health Centre of Ukraine. This malicious document comes with macros that is designed to drop a backdoor into victim’s computers and can steal clipboard information, key-logging and even take screenshots of the infected computer.

Something even more threatening is, as per Check Point’s report there have been 4,000 corona virus related domains registered world wide. Among them, 3% of the domains are found to be malicious and 5% are suspicious. More fake emails pretending to be from Centre of Disease Control (CDC) are being broadcasted to take advantage of people’s anxiety and fear. A phished page is used for obtaining the credentials and when the user types in the password, the browser navigates the user to the legitimate CDC website keeping the attack absolutely sneaky.

How to stay safe against Corona Virus based cyber scams?

It’s surprising to see how attackers are taking advantage of such a concerning situation, this pandemic is already driving people crazy and employees have started working remotely. Cyberthreats like corona virus themed malware, booby-trapped URLs, back doors, and phishing campaigns are going to be around for a while, and users are advised to check their emails with caution, do not download unknown attachments from anonymous senders, and always look for pushing content in the emails.

While IT departments need to force strong data security policies like browser isolation, automated patch management, security information and event management (SIEM), log management, user and entity behavior analytics (UEBA), blacklisting and whitelisting applications, email security management, content management, device management and more to keep their employees, clients and partners secured and safe from corona virus themed cyberattacks.

Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago