Computer security

WHO reports fivefold increase in cyberattacks and theft of data

The World Health Organization (WHO) is experiencing a substantial amount of pressure due to this global pandemic. They are already taking enough measures, warning countries about the pandemic, and are already working with other health agencies in several different ways to reduce the spread of the pandemic. However, now WHO needs to worry about the humongous increase in cyberattacks. On April 23rd, WHO reported fivefold increase in cyberattacks.

WHO mentioned that around 450 active email addresses have been leaked online, along with several other personnel’s working on this coronavirus pandemic. Although, the leaked data does not include any recent information, but confessed that the attack had impacted their older extranet which is now used by the retired staff and their partners. However, considering the threats, WHO is moving to a more secured authentication system that will ensure increased security for their data.

Download a e-book titled ‘Securing endpoint to improve IT security‘ to enhance your corporate security.

Cyber criminals have become hyperactive during this pandemic, and they are launching sophisticated attacks on critical enterprises. Healthcare industry is at high alert, as any information on the discovery of a vaccine could be a huge new for the world. Hackers could be acting individually, or through their organized dark web groups, or at times this could be a state sponsored cyber espionage.

“Ensuring the security of health information for Member States and the privacy of users interacting with us a priority for WHO at all times, but also particularly during the COVID-19 pandemic. We are grateful for the alerts we receive from Member States and the private sector. We are all in this fight together,” 

– Bernardo Mariano, WHO’s Chief Information Officer. 

WHO will do its best to improve its security by partnering with several security vendors and other cyber agencies to establish robust cybersecurity frameworks, configurations and policies. In the last week of March, WHO was attacked by cyber criminals by mimicking WHO’s internal email system. However, it was a failure, but now it appears that hackers have infiltrated the network and have accessed the WHO’s data. With more robust cyber strategies, WHO hopes to reduce the quantity of cyberattacks in the future.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

View Comments

  • You made some good points there. I did a search on the subject matter and found most persons will agree with your site. Sioux Massimiliano Wiencke

  • Hello, I enjoy reading through your article. I wanted to write a little comment to support you. Petronia Tibold Gunn

  • Fantastic website. A lot of useful info here. I am sending it to a few pals ans additionally sharing in delicious. And of course, thank you on your sweat! Emmalyn Valentine Michaud

  • I happen to be writing to let you be aware of what a notable discovery our child found visiting your web site. She noticed a lot of pieces, with the inclusion of what it is like to possess a great helping nature to make folks with ease understand a variety of tricky subject areas. You undoubtedly exceeded her expected results. I appreciate you for imparting such practical, healthy, informative as well as easy thoughts on that topic to Gloria. Sydney Dolph Sackman

  • Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor ut labore et dolore magna aliqua. Iseabal Teodoor Forras

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago