Beware of online coronavirus scams

Hackers have increased their activity during the current pandemic crisis. It’s more important than ever for you to be extremely cautious online.

With the massive number of people working from home, hackers feel they have an opportunity to exploit the pandemic for illegal profit. The level of hacking activity has definitely risen in recent months and everyone needs to be extremely cautious, especially with links and attachments in email messages as well as messages on social media platform and even your smartphone.

There have been reports of smartphone users receiving text messages related to federal stimulus payments and COVID-19 alerts for their area. These are mostly fake messages, generated by hackers trying to get you to click on links and reveal personal information on compromised web sites in an effort to steal your identity or worse. With so many people spending significantly more time online, the target environment is quite rich for these bad actors.

Over the past couple of months there has been a surge in domain names being registered on the Internet related to COVID-19, Coronavirus and just about every related term you can think of. These domains are being used to trick users into providing information that will allow hackers to assume identities or commit outright theft. It is more important than ever that you inspect every email with a link or attachment very carefully.

One of the first scams to emerge was an email that purported to come from the WHO and contained an attachment with information to keep you safe during the pandemic. That attachment was fake and launched software code that installed malware on the recipient’s computer that could track them and steal credentials when the unsuspecting user logged in to their bank or other websites. These are common hacking tactics that you need to remain aware of.

You should always be suspect of any email that you receive with links or attachments. You should verify the sender to be sure they are who they say that are and when in doubt, delete the message without clicking the link or opening the attachment. That is always best.

With the spike in literally thousands of domain names being registered to exploit this crisis, give serious consideration to using a DNS filtering service. The government of Canada recently announced it will be making a free DNS filtering service available to all Canadian citizens in an effort to thwart these fake domains. These domains are being setup for unsuspecting users to land on and think they are legitimate web sites. Their goal, like all of these scams, is to capture credentials, solicit payments or silently install malware on the visiting user’s computer.

The amount of scams is growing so fast that there are nearly daily alerts from the FBI and FTC being issued to warn consumers of the threat. Don’t become an unknowing victim. Be sure you have up to date security software on your computers. Be sure to keep your computers and software updated with the latest versions to be sure any security issues are properly patched. Check to see if your Internet provider of your router provide any type of DNS filtering and if so, enable it. If they don’t, consider using a good DNS filtering service like Cisco Umbrella, Safe DNS, Sophos or others. You can’t be too careful, especially during this pandemic.

Hot this week

Compliance Alone Leaves You Vulnerable to Attack

Passing compliance audits doesn't prevent breaches. Learn why attackers target compliant organizations and how to build real security beyond checklists.

Your Vulnerability Management Is Broken Because of CVSS Blind Spots

Overreliance on CVSS scores creates vulnerability management blind spots that expose organizations to real risks. Learn how to prioritize based on business context and actual threats instead of arbitrary scores.

Why Perfect Security Is an Illusion and What to Do Instead

Chasing 100% vulnerability elimination creates false security. True protection comes from prioritizing business critical risks, implementing compensating controls, and building incident response resilience.

When Security Automation Creates Dangerous Blind Spots

Over reliance on security automation creates dangerous blind spots. Learn why human oversight remains irreplaceable and practical steps to balance both.

Why Over Trusting Cybersecurity AI Weakens Your Defenses

Over-reliance on AI tools degrades human security skills while creating new vulnerabilities, requiring balanced collaboration between analysts and technology.

Topics

Compliance Alone Leaves You Vulnerable to Attack

Passing compliance audits doesn't prevent breaches. Learn why attackers target compliant organizations and how to build real security beyond checklists.

Your Vulnerability Management Is Broken Because of CVSS Blind Spots

Overreliance on CVSS scores creates vulnerability management blind spots that expose organizations to real risks. Learn how to prioritize based on business context and actual threats instead of arbitrary scores.

Why Perfect Security Is an Illusion and What to Do Instead

Chasing 100% vulnerability elimination creates false security. True protection comes from prioritizing business critical risks, implementing compensating controls, and building incident response resilience.

When Security Automation Creates Dangerous Blind Spots

Over reliance on security automation creates dangerous blind spots. Learn why human oversight remains irreplaceable and practical steps to balance both.

Why Over Trusting Cybersecurity AI Weakens Your Defenses

Over-reliance on AI tools degrades human security skills while creating new vulnerabilities, requiring balanced collaboration between analysts and technology.

When More Security Tools Create More Risk

Adding security tools often increases risk through complexity. Learn how consolidation and staff training create stronger defenses than endless tool accumulation.

Firewalls Create Dangerous False Security and What to Do Instead

Firewalls create dangerous security illusions by focusing exclusively on perimeter defense while attackers exploit internal network vulnerabilities through lateral movement after inevitable breaches occur.

Why Perfect Security Is a Dangerous Illusion

Financial security teams waste resources chasing breach prevention when resilience and rapid recovery deliver better protection. Learn practical steps to shift focus from impossible perfection to manageable containment.
spot_img

Related Articles

Popular Categories