According to the DoD, recently many emails have been going around claiming to have information about COVID19 (or coronavirus, the Wuhan Flu, or any of several other names). Reason Labs in coordination with the Health Sector Cybersecurity Coordination Center (or HC3) reviewed several of these emails containing links to malicious sites. Let’s take a look at some of the ways people are trying to spread malware via email.
They are claiming to be legitimate websites with maps from John Hopkins University about the COVID19 virus
Websites such as corona-virus-map[dot]com (please do not search for that!) put malware-laden code inside what appears to be a legitimate COVID19 tracker. It has a map that appears to be tracking the virus but is heavily infested with malware!
They make an official-looking email!
One of the most common ways people get malware onto their computers is through email. Since most individuals today are aware of the threat, they try to look at their email a little more carefully. The problem is many of these emails look to be from legitimate sources. Pay close attention to the originating email. Even if it is the correct spelling, use common sense to determine if the email should be opened (i.e. you’re not expecting one).
They post in links that seem legitimate
Many email spammers will post hyperlinks into an email that says one thing, but points in a different direction. An example would be a hyperlink to google.com point to obviouslyavirus.net. They can edit the text to point wherever they want. Never click on links you’re not 100% sure are legitimate.
Scammers will always try to gain the upper hand in Cybersecurity. Through due diligence, common sense, and attention to detail, you can ensure they don’t get the best of you! Always check websites before going to them, check the sender, and check any links sent out!