Phishing during a global storm

“In the midst of every crisis, lies great opportunity”. Inspiring as it may sound, Einstein was probably also sending us a warning, a warning about the opportunists in our midst. Regardless of the nature of the crisis, there’s always a group of people that will look to capitalize on the misfortunes of others. Whether that be hoarding essential items during wartime rationing and selling on at an eye-watering markup, or preying on vulnerable people during a global pandemic, again, all in the name of making a quick buck.

Nobody in the cybersec industry has been surprised at the number of cyberattacks witnessed over the past month in response to Covid-19. At a time when uncertainty and instability are high, and reasoning is mired with panic, it’s the perfect time for scammers to try and trick individuals and organizations into handing over sensitive information and money. 

Examples of Covid-19 scams

Earlier this week, MediaPost reported on a large-scale phishing attack targeting the majority of office workers now working from home. These ‘credential-stealing’ scams pose as your employer, either an exec or HR representative, and advise you to follow advice via a document available on OneDrive. You’re asked to login via a link in the email, and of course, your data is then harvested by the criminals and your corporate credentials, are compromised.

There have also been multiple reports of phishing emails purporting to come from the Center for Disease Control and the World Health Organization. In a time of crisis, the public will look to their national authorities or global bodies for advice and information on the subject matter so it’s a no-brainer scam to undertake. In these instances, recipients of these faked emails were asked to use their email login to obtain vital information about the virus and keeping safe.

Taking precautions

Jumping on the bandwagon of a major global news event is not a new tactic for cybercriminals, and many people now know what checks to make to see if an email is legitimate. But this Covid-19 crisis is going to be high on the news agenda for months to come and impacts every single person, so scammers have a much wider and more vulnerable range of targets than ever before.

Whether you’re a business or an individual navigating the internet at this unprecedented time of increased digital usage at home, the potential for human error will no doubt increase, so here are some tips to help you stay safe and avoid these unscrupulous emails.

Organizations 

Protect your employees from being caught out by fake emails from the company. Deploy email protocols that will eradicate the possibility of scammers impersonating your domain. This will also safeguard your customers – if criminals can’t spoof your email addresses, customers can rely on key identifiers to weed out the legitimate from the illegitimate.

Individuals 

Check the sender’s domain against the actual website domain of the organization in question. For example, ‘@cdc-gov.org’ versus ‘@cdc.gov’ – which one is correct? There are a host of spelling and grammar checks you can make, along with tone – do you feel rushed? Pressure to ‘act fast’ is a common tactic of scammers wanting to rush you into handing over information.

Try out our free ‘Investigate’ tool below to check the status of your DMARC configuration and keep protecting your workforce wherever they may be working.

PUBLISHED BY

Red Sift

25 Mar. 2020

SHARE ARTICLE:

Recent Posts

VIEW ALL
News

Introducing DNS Guardian: Stop impersonation and spam caused by domain takeovers 

Rahul Powar

tl;dr: We’re thrilled to announce DNS Guardian — a new feature in Red Sift OnDMARC that can swiftly identify and stop domain takeovers that lead to malicious mail. Back in February, we shared updates with the community about SubdoMailing – an attack discovered by Guardio Labs. The attack was a form of subdomain takeover,…

Read more
News

Meet Red Sift Radar: The Skilled Up LLM That Finds and Fixes…

Rahul Powar

After months of beta testing and feedback, we are excited to announce that Red Sift Radar, our skilled up LLM offering seamless integration with Red Sift OnDMARC, is now commercially available.  With Red Sift Radar, security teams can detect exposures, prevent configuration drift, and classify assets or suspicious activity without adding additional headcount. By…

Read more
News

G2 Fall 2024 Report: Red Sift OnDMARC Wins Big

Francesca Rünger-Field

We’re delighted to share that Red Sift OnDMARC’s winning streak continues. This Fall, we’ve once again been named a Leader in G2’s DMARC category, achieving recognition in both the overall Leader category and Europe for the first time. This recognition is based on our high Customer Satisfaction scores and strong market presence. Red Sift…

Read more
Cybersecurity

Resilience Rising | Episode 3 with Kevin White

Red Sift

In this episode of Resilience Rising, Sean Costigan, Managing Director of Resilience Strategy at Red Sift, and Kevin White, Senior Operation Consultant with Enhanced Information Solutions, explore the critical intersection of wastewater management and cybersecurity.  The two highlight the health and operational impacts of cyber threats on water utilities, emphasizing the vulnerabilities due to…

Read more
Certificates

Your guide to PCI DSS 4.0 Cryptographic Requirements

Rebecca Warren

The Payment Card Industry Data Security Standard (PCI DSS) is a globally recognized framework designed to protect cardholder data during processing, storage, and transmission by merchants and service providers. PCI DSS outlines a set of stringent security controls that organizations handling payment card information must implement to mitigate the risk of data breaches and…

Read more