In addition to the well-known phishing and ransomware, cybercriminals are using voice and resume to obtain information from companies.
The cyber threat will still take many nights of sleep of executives. A survey by security company Kaspersky, released in June, showed that cyber-attacks using remote access grew by 330% in Brazil.
Another report by the same company, also reported in June, pointed to Brazil as the leader in ransomware attacks on companies during the pandemic.
This increase in attacks has everything to do with the moment experienced by companies from different sectors that needed to enable a remote operation in the name of business continuity.
And do you know why? Because it's not uncommon for employees to have to use their own devices to work.
Here, it is noteworthy that, although the company has offered a workstation, some use a personal smartphone to access internal files, respond to e-mails or interact through productivity applications adopted in the pandemic.
This opens up room for vulnerabilities, and if the team is not trained in security best practices, an intrusion into internal systems can happen. Even more, hackers have adopted new attack methodologies, adapting them to the moment lived during the new coronavirus pandemic.
1. Donation scams
Since social isolation began, there have been many e-mails fraud campaigns. They all asked for pretty much the same thing: donations to health organizations and other frontline entities in combating the new coronavirus.
The problem is that these organizations and entities when they did not exist, had their marks falsified by the scammers. An example was the triggering of campaigns on behalf of the World Health Organization (WHO), which also suffered an attempt to hack into systems.
Still, in the midst of the pandemic, the Black Lives Matter movement also became a target for scammers, who started shooting various SPAM content to different audiences in the initiative's name.
2. Mobile apps
Here we have two situations.
The first is about companies like Google and Apple that have developed tracking applications to identify people who have been close to another infected with the new coronavirus.
However, hackers wasted no time, and 12 malicious apps were made available on the Play Store (Google) and App Store (Apple), according to the InformationWeek website. All of them were only meant to download malware onto users' devices.
This type of attack is already well known here at Mundo + Tech. From the beginning of the pandemic until May, DDoS attacks increased 67%, as discussed in the Embratel Talks on cybersecurity.
DDoS attacks work like this: Cybercriminals drive much traffic to a website, which cannot respond. As this attack generates an “error” in the DNS server (domain name system), the system is unavailable.
Because many people are more connected because of social isolation, these distributed attacks can go unnoticed by the security team. A DDoS attack is one of the biggest threats to the privacy of a company's data and operations.
Phishing is a cyber threat, quite an ally of dependency type l. With the home office, many employees exchange emails for solving some demands and daily business.
Some of these malicious emails are fired with contamination maps and even other content related to the new coronavirus during the pandemic as if they were legitimate. However, in the small details (a changed letter, for example), the danger lies.
When an employee inadvertently clicks on any link within these emails, the chances of him having sensitive information (CPF, ID, credit card number, login, and passwords) stolen are great.
5 . Spear Phishing
If phishing we have the mass firing of emails in a generic way, spear-phishing brings greater complexity because it is a targeted attack – whether to a person, an institution or even a state or country.
This type of cyber threat will gather as much information as possible from the target and then fire off emails that will look legitimate in an attempt to deceive the target. Not long ago, the WHO also suffered this attempted attack.
Even though many people are more connected, they are not just victims of “digital” attacks. For example, did you know that even before email, the use of voice was quite common in an attempt to steal someone's information?
This practice is called vishing -combines words voice (voice) and phishing - and she received an update from the remote work that gained momentum in the business. Criminals pretend to be the company's technical support to convince employees to disclose login and password or enter them on a fake website.
It is also worth highlighting the increasing smishing (phishing made from SMS) with information about COVID-19, which, in fact, has a malicious link to install malware on the smartphone.
With organizations increasingly dependent on the digital world to maintain their operations, it's no surprise that ransomware attacks have increased during the new coronavirus pandemic.
With a greater vulnerability in companies' security — the result of the rapid and necessary migration to a remote operation — cybercriminals have started to look to companies that have the critical infrastructure to lock digital systems until a ransom is paid.
How is this done? We've talked about the same tactic in other topics: fake COVID-19- related emails and websites aimed at employees who now work from home. All it takes is a download of malicious content for attackers to hijack the entire company's system.
8. Malicious Resumes
Perhaps this is one of the most “peculiar” cyber threats right now. The rise in unemployment meant that many companies started to receive resumes from possible candidates.
According to a publication by Check Point, a security solution company, the number of resumes and sick leave forms with some hidden malware has doubled since the beginning of the pandemic – usually in Word or Excel spreadsheet format.
9. COVID-19 malicious websites
Many people search the internet for information about COVID-19. This has become an opportunity for cybercriminals: 86,000 domains with keywords related to the pandemic are “high risk” or “malicious,”
According to the cybersecurity company's publication, "1,767 'high risk' and 'malicious' domain names (C2, malware or phishing) about the new coronavirus are created daily."
Not every cyberattack has an independent hacker behind it. According to a report by The Washington Post, there are suspicions of countries that ordered raids on hospitals and health entities present in other nations.
Usually, these forays seek information about research related to the cure of COVID-19. However, cyber-attacks are more sophisticated and difficult to prevent and mitigate.