Information Security Buzz

Hackers Exploit Covid-19 Vaccine Interest As Cover For Attacks

Phishing emails with subject lines related to vaccines now being used to trick recipients into downloading malicious Windows, Word and Excel files designed to steal a person’s credentials 

Researchers  at Check Point have observed a new trend of phishing emails exploiting interest in coronavirus vaccines. The primary attack method is email, which constituted 82% of all attack vectors for malicious files in the last 30 days. In these hacking campaigns, hackers craft email subject-lines that incorporate deceptive coronavirus vaccine-related content, while simultaneously lacing malicious links into the email bodies.

After clicking the malicious link, recipients inadvertently download a malicious file, typically in file type forms of .exe, .xls or .doc. Two examples found by Check Point researchers are.

Subject: Urgent Information Letter: Covid-19 New Approved Vaccines

In the first example, Check Point researchers cite a malspam campaign they caught with the email subject “URGENT INFORMATION LETTER: COVID-19 NEW APPROVED VACCINES”. The respective emails delivered malicious .EXE files with the name “Download_Covid 19 New approved vaccines.23.07.2020.exe”, that when clicked on, installs an InfoStealer capable of gathering information, such as login information, usernames and passwords from the user’s computer.

Subject: UK coronavirus vaccine effort is progressing

In the second example, Check Point researchers point to an email phishing campaign that sends the subject-line: “UK coronavirus vaccine effort is progressing badly appropriate, recruiting consequence and elder adults”. The mail contains a malicious link “surgicaltoll\.com/vy2g4b\.html”. Further investigation revealed that it was used to redirect traffic to a medical phishing website; “thelifestillgoeson[.]su”, which was trying to imitate a legitimate Canadian pharmacy.

Coronavirus-related attacks are dropping

Although the number of general cyber-attacks remained high in July, the number of coronavirus-related attacks has dropped significantly. In July, Check Point researchers witnessed an weekly average of  61,000 coronavirus-related attacks, a decrease of over 50% when compared to the weekly average of 130,000 attacks in June.

image001 6

Omer Dembinsky, Data Manager at Check Point said:  “Lately, we’re seeing a clear trend adopted by hackers:  deceive the masses by using their interest in coronavirus vaccines. Most of the campaigns involve a person’s inbox, which is concerning. Over 80% of attacks against organizations start from a malicious email. Email is the first link in a chain of attacks. Since email attacks usually involve the human factor, employees’ email inboxes are an organization’s weakest link. Closing this security gap requires protections against various threat vectors: phishing, malware, data theft and account-takeover. I strongly urge everyone to closely read the subject lines of emails coming in. If it has the word “vaccine” in it, think twice. Chances are that you are the threshold of being tricked into giving up your most sensitive, most private information.”

How to Protect Yourself

About the Author

Exit mobile version