Phishing attacks with vaccine lies

Phishing attacks with vaccine lies

Share post

Just as cyber criminals have exploited the pandemic with corona-related phishing attacks, they are now trying to abuse the vaccine issue to steal money and personal information.

The FBI issued a warning about emerging fraud attempts related to COVID-19 vaccines back in December. A Barracuda analysis conducted between October 2020 and January 2021 found that hackers are increasingly using vaccine-related emails in their targeted spear phishing attacks.

Attack increase since November 2020

Barracuda Vaccine-themed Mail Phishing

Phishing attacks related to vaccine fraud attempts (Image: Barracuda).

After pharmaceutical companies like Pfizer and Moderna announced the availability of vaccines in November 2020, the number of vaccine-related phishing attacks rose by 12 percent. By late January, the average number of vaccine-related spear phishing attacks had increased 26 percent since October. The number flattened out over the holidays, as is typically the case with corporate attacks.

While most of the vaccine-related phishing attacks analyzed were fraudulent, there were two predominant types of spear phishing attacks using vaccine-related themes: branded impersonation attacks and compromise of business emails.

Brand impersonation attacks

Cyber ​​criminals used vaccine-related phishing emails to impersonate a well-known brand or organization. The messages contained a link to a phishing website promoting early access to vaccines, offering vaccines for a fee, or even posing as a healthcare professional requesting personal information to verify eligibility for a vaccine.

Business email compromise

Attackers use Business Email Compromise (BEC) to impersonate people within an organization or their business partners. In the past few years, it has been one of the most harmful email threats, costing businesses over $ 26 billion. Recently, these very targeted attacks have centered on vaccine-related issues. Barracuda uncovered attacks in which cybercriminals posed as employees who need an urgent favor while getting vaccinated or as a human resources specialist who announced that the company had secured the vaccines for its employees.

Misuse of hijacked accounts

Barracuda Mail Lateral Phishing

Misuse of hijacked accounts for lateral phishing attacks (Image: Barracuda).

Cyber ​​criminals use phishing attacks to compromise and hijack business accounts. Once inside the company, sophisticated hackers conduct intelligence activities before launching targeted attacks. Most of the time, they use these legitimate accounts to send bulk phishing and spam campaigns to as many people as possible before their activity is detected and an account locks them out.

Barracuda not only has visibility into email messages coming from outside the organization, but also internal communications. As a result, it is possible to trace fraudulent messages that are sent internally - usually from compromised accounts. The research found that lateral vaccine-related phishing attacks were increasing at the same time that key COVID-19 vaccines were announced and approved worldwide.

Protective measures against vaccine-related phishing

1. Skepticism about all vaccine-related emails

Some email scams include offers to get the COVID-19 vaccine early, put yourself on a waiting list, or have the vaccine sent direct to you. Users should not click links or open attachments in these emails as they are typically malicious.

2. Use of artificial intelligence

Scammers are adapting their email tactics to bypass gateways and spam filters. It is therefore important to have a security solution that detects and protects against spear phishing attacks, including branded impersonation attacks, compromising business emails, and taking over email accounts. Organizations should employ specially designed technology that doesn't rely on just looking for malicious links or attachments. Using machine learning to analyze normal communication patterns across the organization, the solution can identify anomalies that could indicate an attack.

3. Account transfer protection

Organizations shouldn't focus their protections on external email messages alone. Some of the most devastating and successful spear phishing attacks involve compromised internal accounts. Therefore, it should be ensured that fraudsters do not use the company as a base for these attacks. Again, we recommend technology that uses artificial intelligence to detect when accounts have been compromised and remedies in real time by alerting users and removing malicious emails sent from compromised accounts.

4. Employee training to identify and report attacks

Organizations should provide up-to-date training to employees on phishing related vaccinations, seasonal scams, and other potential threats. It should be ensured that employees can identify the latest attacks and know how to report them immediately to the IT department. The use of phishing simulations for e-mail, voicemail and SMS is also recommended in order to train users to detect cyberattacks, to test the effectiveness of the training courses and to identify the most vulnerable users.

5. Strong internal fraud prevention policies

Companies should establish guidelines for the correct handling of personal and financial information and review them regularly. You can help your employees avoid costly mistakes by establishing procedures to confirm all email requests for transfers and payment changes. All financial transactions should require multiple personal or telephone confirmation and / or approval.

The flood of new phishing campaigns will not level off in the near future either. However, with the above measures, organizations can build a strong, layered defense consisting of employee training and security technology to significantly mitigate the risk of these attacks.

More at Barracuda.com

 

[starboxid=5]

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more