{"id":17916,"date":"2020-03-17T20:33:47","date_gmt":"2020-03-18T04:33:47","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11649\/"},"modified":"2020-03-17T20:33:47","modified_gmt":"2020-03-18T04:33:47","slug":"news-11649","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11649\/","title":{"rendered":"Attackers Taking Advantage of the Coronavirus\/COVID-19 Media Frenzy"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><b><a href=\"https:\/\/fortiguard.com\">FortiGuard Labs<\/a> Threat Analysis Report<\/b><\/p>\n<p>For the first quarter of 2020, coverage on the Coronavirus\/COVID-19 outbreak has dominated the 24-hour global news cycle. Government leaders, scientists, and health professionals worldwide suggest that this is not merely an epidemic, but a potential pandemic crisis. As individuals worldwide fixate on this global health emergency, combining legitimate sources and news feeds with rampant rumors and amateur reports on social media, bad actors know that events like this are the perfect opportunity for exploitation.\u00a0<\/p>\n<p>And the easiest and fastest way to exploit a target, whether an individual or an organization, is through social engineering attacks. These attack vectors are the fastest to spin up, and have the highest rate of return. This is especially true as drive-by downloads become less common due to security vendors improving response times and security posture by the timely patching of vulnerabilities. And social engineering attacks are especially attractive because, regardless of whatever technological security measures in place, the human psyche is the weakest link in any security systems as it is the easiest to exploit.<\/p>\n<h2>Coronavirus-related Threat Activity<\/h2>\n<p>Over the past several weeks, FortiGuard Labs has been observing a significant increase in both legitimate and malicious activity surrounding the Coronavirus. We\u2019ve seen benign emails containing documents with guidance from HR departments, to emails from distribution companies selling masks, gloves, and other protective equipment that at first appeared to contain suspicious links, but in fact have been benign as well.\u00a0<\/p>\n<p>And we and other threat researchers have documented malicious attacks leveraging the Coronavirus outbreak theme. Threat findings via OSINT channels have yielded multiple themes, such as those appearing to be reports from trusted sources, such as governmental agencies, news outlets, etc. but that were actually malicious. It is also important to note that we are likely only scratching the surface on observable attacks as this is a global outbreak, and most of our observations have been in English or languages utilizing ASCII (ISO-8859) characters.\u00a0<\/p>\n<p>The issue has now become so problematic that the World Health Organization (WHO) recently issued a statement on their website titled,\u00a0<a href=\"https:\/\/www.who.int\/about\/communications\/cyber-security\"><i>Beware of criminals pretending to be WHO<\/i><\/a><i>.\u00a0<\/i>The UN also recently added an\u00a0<a href=\"https:\/\/news.un.org\/en\/story\/2020\/02\/1058381\">advisory<\/a>\u00a0on the 29<sup>th<\/sup>\u00a0of February as well reminding citizens to be vigilant of such scams.<i><\/i><\/p>\n<h3><b>First Wave of Attacks<\/b><\/h3>\n<p>As the news cycle continues to accelerate, there have been reports of ranging from phishing and SMS phishing attacks to a host of others too many to list in this blog. For the purpose of this blog, we are going to stick to the more well-known actors and their campaigns to highlight that even the professionals are getting in on the frenzy.\u00a0<\/p>\n<p>First reported at the end of January by various security vendors, Emotet was one of the first campaigns to have leveraged the Coronavirus scare to spread itself further. Other recent attacks discovered by security researcher\u00a0<a href=\"https:\/\/twitter.com\/issuemakerslab\">@issuemakerslab<\/a>\u00a0include a malicious Word doc written in Korean by the threat actors behind BABYSHARK, (North Korea):<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy\/_jcr_content\/root\/responsivegrid\/image.img.png\/1583352231407\/picture1.png\" alt=\"Figure 1. Tweet by @issuemakerslab\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 1. Tweet by @issuemakerslab<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Another observation discovered by security researcher\u00a0<a href=\"https:\/\/twitter.com\/RedDrip7\/status\/1230683740508000256\">@RedDrip7<\/a>\u00a0highlights an attack that uses social engineering techniques to masquerade as the Center for Public Health in Ukraine, along with impersonating the WHO trademark as a decoy to lure unsuspecting users into opening a malicious Word Doc file with a back door:<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy\/_jcr_content\/root\/responsivegrid\/image_1030971287.img.png\/1583352363228\/picture2.png\" alt=\"Figure 2. Tweet by @RedDrip7\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2. Tweet by @RedDrip7<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h3><b>Attacks Targeting Italy<\/b><\/h3>\n<p>During the course of our investigations, we recently observed a Coronavirus-themed spear phishing attack targeting Italy. The email, written in Italian, tries to compel the reader into opening an attached document, which was observed to have several attachment names, but what all use the same nomenclature (f216785352XX.doc).\u00a0<\/p>\n<p>Name: f21678535239.doc<br \/> Size: 544266 bytes (531 KiB)<br \/> SHA256: 8EB57A3B520881B1F3FD0073491DA6C50B7284DD8E66099C172D80BA33A5032<\/p>\n<p>Additional variant seen ITW:<\/p>\n<p>Name: f21678535350.doc<br \/> Size: 544266 bytes (531 KiB)<br \/> SHA256: 3461B78384C000E3396589280A34D871C1DE3AE266334412202D4A6A85D02439<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy\/_jcr_content\/root\/responsivegrid\/image_57950538.img.png\/1583352434505\/picture3.png\" alt=\"Figure 3. Example of Attack Targeting Italy using WHO Trademark\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3. Example of Attack Targeting Italy using WHO Trademark<\/span>         <\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 8pt; line-height: 15.693333625793457px; font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span class=\"MsoIntenseEmphasis\" style=\"color: #5b9bd5; font-style: italic;\"><span style=\"font-size: 8pt; line-height: 11.413333892822266px;\">&ldquo;Dear Lord\/Lady,<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0.0001pt; line-height: normal; font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span class=\"MsoIntenseEmphasis\" style=\"color: #5b9bd5; font-style: italic;\"><span style=\"font-size: 8pt;\">Due to the fact that cases of coronavirus infection are documented in your area, the World Health Organization has prepared a document that includes all necessary precautions against coronavirus infection. We strongly recommend that you read the document attached to this message!<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0.0001pt; line-height: normal; font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span class=\"MsoIntenseEmphasis\" style=\"color: #5b9bd5; font-style: italic;\"><span style=\"font-size: 8pt;\">Sincerely<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0.0001pt; line-height: normal; font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span class=\"MsoIntenseEmphasis\" style=\"color: #5b9bd5; font-style: italic;\"><span style=\"font-size: 8pt;\">Dr. Penelope Marchetti (World Health Organization &ndash; Italy)&rdquo;<\/span><\/span><\/p>\n<\/div><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The letter suggests that Coronavirus cases in the reader\u2019s region have been documented and that the reader should urgently open the attachment for further guidance. The contents of the Word document try to compel the user into enabling macros with an official Office looking template that uses the familiar Microsoft Word trade dress color of blue: <\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy\/_jcr_content\/root\/responsivegrid\/image_233497610.img.png\/1583352598934\/picture4.png\" alt=\"Figure 4. Malicious Word Document Containing Macros\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 4. Malicious Word Document Containing Macros<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Once the reader opens the attachment, the file then connects to the following URI(s):<\/p>\n<p>45.128.134.14<br \/> insiderppe.cloudapp.net<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy\/_jcr_content\/root\/responsivegrid\/image_642130448.img.png\/1583352656268\/picture5.png\" alt=\"Figure 5. List of Macros Used\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 5. List of Macros Used<\/span>         <\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy\/_jcr_content\/root\/responsivegrid\/image_292568577.img.png\/1583352685460\/picture6.png\" alt=\"Figure 6. Example of IOC\u2019s showing file names\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 6. Example of IOC\u2019s showing file names<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Embedded in that document, however, are over 9000 lines of obfuscated JavaScript:<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy\/_jcr_content\/root\/responsivegrid\/image_270288812.img.png\/1583352722903\/picture7.png\" alt=\"Figure 7. JavaScript of 9000 lines of obfuscated code\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 7. JavaScript of 9000 lines of obfuscated code<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>After further analysis, given the nomenclature of the files, techniques, and network IOC\u2019s used in this campaign, it appears highly likely that it is the work of the actors behind Trickbot.<\/p>\n<h2>Another Campaign Using a Trusted Trademark<\/h2>\n<p>Another campaign that leverages the trusted FedEx trademark as a decoy to gain the trust of recipient so they will open an included attachment. The attachment appears to be a PDF, but it has been compressed. However, when decompressed we learn that the file is not a PDF, but an executable:\u00a0<b><\/b><\/p>\n<p>Name: Customer Advisory.PDF.exe<br \/> Size: 838144 bytes (818 KiB)<br \/> SHA256: 906EFF4AC2F5244A59CC5E318469F2894F8CED406F1E0E48E964F90D1FF9FD88<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy\/_jcr_content\/root\/responsivegrid\/image_1771149944.img.png\/1583352826550\/picture8.png\" alt=\"Figure 8. Spearphishing email leveraging FedEx trademark\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 8. Spearphishing email leveraging FedEx trademark<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Once the user runs the executable file, they are infected with the Lokibot infostealer that exfiltrates data to the following URI:<\/p>\n<p>kbfvzoboss.bid\/alien\/fre.php<\/p>\n<h2>Mitigation<\/h2>\n<p>FortiGuard Labs recommends that all AV and <a href=\"https:\/\/www.fortinet.com\/products\/ips.html?utm_source=blog&amp;utm_campaign=2018-q2-ips-landing-page\">IPS<\/a> definitions are kept up to date on a continual basis, and that organizations maintain a proactive patching routine when vendor updates are available. If it is deemed that patching is not feasible, it is recommended that a risk assessment is conducted to determine additional mitigation safeguards within an environment.<\/p>\n<p>In the meantime, organizations are encouraged to conduct ongoing training sessions to educate and inform personnel about the latest phishing\/spearphishing attacks. They also need to encourage their employees to never open attachments from someone they don\u2019t know, and to always treat emails from unrecognized\/untrusted senders with caution.<\/p>\n<p><b>Initial Access Mitigation:<\/b>\u00a0<a href=\"https:\/\/www.fortinet.com\/products\/email-security\/fortimail.html?utm_source=blog&amp;utm_campaign=2018-q2-fortimail-main-page\">FortiMail<\/a> or other secure mail gateway solutions can be used to block specific file types such as the ones outlined in this blog. FortiMail can also be configured to send attachments to our <a href=\"https:\/\/www.fortinet.com\/products\/sandbox\/fortisandbox.html?utm_source=blog&amp;utm_campaign=2018-q2-fortisandbox-main-page\">FortiSandbox<\/a> solution (ATP), either on-premises or in the cloud, to determine if a file displays malicious behavior. FortiGate firewalls with anti-virus enabled alongside a valid subscription are also able detect and block this threat if configured to do so.<\/p>\n<p><b>Execution:<\/b>\u00a0Since it has been reported that this threat has been delivered via social engineering distribution mechanisms, it is crucial that end users within an organization are made aware of the various types of attacks being delivered via social engineering. This can be accomplished through regular training sessions and impromptu tests using predetermined templates by internal security departments within an organization. Simple user awareness training on how to spot emails with malicious attachments or links could stop initial access into the network.<\/p>\n<p><b>Fortinet Solutions:\u00a0<\/b>If user awareness training fails and a user opens a malicious attachment or link,\u00a0<a href=\"https:\/\/www.fortinet.com\/products\/endpoint-security\/forticlient.html?utm_source=blog&amp;utm_campaign=2018-q2-endpoint-web-page\">FortiClient<\/a><b>\u00a0<\/b>running the latest this-to-date virus signatures will detect and block this file and associated files.<b>\u00a0<\/b>The file(s) highlighted in our report are currently being detected with the current definitions:\u00a0<b><\/b><\/p>\n<p style=\"margin-left: 40.0px;\">File Name: f21678535239.doc\u00a0<br \/> [SHA 256: 8eb57a3b520881b1f3fd0073491da6c50b7284dd8e66099c172d80ba33a5032f]<br \/> <b>Detected as: VBA\/Agent.BLN!tr<\/b><\/p>\n<p style=\"margin-left: 40.0px;\">File Name: f21678535350.doc\u00a0<br \/> [SHA 256: 8eb57a3b520881b1f3fd0073491da6c50b7284dd8e66099c172d80ba33a5032f]<br \/> <b>Detected as: VBA\/Agent.BLN!tr<\/b><\/p>\n<p style=\"margin-left: 40.0px;\">File Name: Customer Advisory.PDF.exe<br \/> [SHA256: 906EFF4AC2F5244A59CC5E318469F2894F8CED406F1E0E48E964F90D1FF9FD88]<br \/> <b>Detected as:\u00a0W32\/Agent.AJFK!tr<\/b><\/p>\n<p><b>Exfiltration and C&amp;C:<\/b>\u00a0A <a href=\"https:\/\/www.fortinet.com\/products\/next-generation-firewall.html?utm_source=blog&amp;utm_campaign=2018-q2-fortigate-main-page\">FortiGate<\/a> located at each of your ingress and egress points. with its Web Filtering service enabled with up-to-date definitions and\/or Botnet Security enabled will detect and block any observable outbound connections if configured correctly.<\/p>\n<p>It is important to note that as attacks continue to become more sophisticated they can sometimes circumvent your security defenses. This is why it is important to ensure in addition to a layered security strategy that you also have the ability to detect anomalous activity that could be malicious.<\/p>\n<p>Lastly, our Enterprise Bundle addresses this and similar attacks. This Enterprise Bundle consolidates all the cybersecurity services you need to protect and defend against all cyberattack channels, from the endpoint to the cloud, including IoT devices, providing you with the integrated defense you need to tackle today\u2019s advanced threats and address today&#8217;s challenging risk, compliance, management, visibility, and Operational Security (OT) concerns.<\/p>\n<p><b>Web Filtering:<\/b>\u00a0All network IOC\u2019s in this report have been blacklisted by the FortiGuard Web Filtering service.<\/p>\n<p><b>Malicious Word Document Protection:<\/b>\u00a0FortiGuard CDR (Content Disarm &amp; Reconstruction) processes all incoming files, deconstructs them, and strips all active content from those files in real-time to create a flat, sanitized file. CDR fortifies zero-day file protection strategies by proactively removing any possibility of malicious content in your files.<\/p>\n<p><b>MITRE ATT&amp;CK<\/b><\/p>\n<p><b>Spearphishing Attachment<\/b><\/p>\n<p>ID: T1193<br \/> Tactic: Initial Access<br \/> Platform: Windows, macOS, Linux<\/p>\n<p><b>Scripting<\/b><\/p>\n<p>ID:\u00a0T1064<br \/> Tactic:\u00a0Defense Evasion, Execution<br \/> Platform:\u00a0Linux, macOS, Windows<\/p>\n<p><b>Defense Evasion<\/b><\/p>\n<p>ID:\u00a0T1064<br \/> Tactic:\u00a0Defense Evasion, Execution<br \/> Platform:\u00a0Linux, macOS, Windows<\/p>\n<p><b>Standard Application Layer Protocol<\/b><\/p>\n<p>ID:\u00a0T1071<br \/> Tactic:\u00a0Command And Control<br \/> Platform:\u00a0Linux, macOS, Windows<\/p>\n<p><b>Standard Cryptographic Protocol<\/b><\/p>\n<p>ID:\u00a0T1032<br \/> Tactic:\u00a0Command And Control<br \/> Platform:\u00a0Linux, macOS, Windows<\/p>\n<h2>Indicators of Compromise<\/h2>\n<p><b><i>Trickbot<\/i><\/b><\/p>\n<p>File Name: f21678535239.doc\u00a0<br \/> [SHA 256: 8eb57a3b520881b1f3fd0073491da6c50b7284dd8e66099c172d80ba33a5032f]<br \/> <b>Detected as: VBA\/Agent.BLN!tr<\/b><\/p>\n<p>Network IOCs:<br \/> 45.128.134.14<br \/> insiderppe.cloudapp.net<br \/> hxxps:\/\/45.128.134.14\/C821al\/vc2Tmy.php?h=m2&amp;j=ffd38fb8&amp;l=NQDPDE@@NQDPDE@@FD1HVy@@*192.168.0.136%3A%3A%5B00000003%5D%20Intel%28R%29%2082574L%20Gigabit%20Network%20Connection&amp;40521390<\/p>\n<p>File Name: f21678535350.doc\u00a0<br \/> [SHA 256: 8eb57a3b520881b1f3fd0073491da6c50b7284dd8e66099c172d80ba33a5032f]<br \/> <b>Detected as: VBA\/Agent.BLN!tr<\/b><\/p>\n<p>Network IOCs:<br \/> 45.128.134.14<br \/> insiderppe.cloudapp.net<\/p>\n<p><b><i>Lokibot<\/i><\/b><\/p>\n<p>File Name: Customer Advisory.PDF.exe<br \/> [SHA256: 906EFF4AC2F5244A59CC5E318469F2894F8CED406F1E0E48E964F90D1FF9FD88]<br \/> <b>Detected as:\u00a0W32\/Agent.AJFK!tr<\/b><\/p>\n<p>Network IOCs:\u00a0<br \/> kbfvzoboss.bid\/alien\/fre.php<\/p>\n<h2>Empowering CTA\u00a0<\/h2>\n<p><i>FortiGuard Labs has shared the findings in this report with fellow Cyber Threat Alliance members, including file samples and indicators of compromise. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. For more information on the Cyber Threat Alliance, visit <a href=\"https:\/\/www.cyberthreatalliance.org\">cyberthreatalliance.org<\/a>.<\/i><\/p>\n<p><i>Find out about the FortiGuard Security Services\u00a0<a href=\"https:\/\/www.fortinet.com\/support\/support-services\/fortiguard-security-subscriptions.html?utm_source=blog&amp;utm_campaign=2018-blog-security-services\">portfolio<\/a>\u00a0and <a href=\"https:\/\/www.fortinet.com\/fortiguard\/threat-intelligence\/threat-research.html?utm_source=nreleaseblog&amp;utm_campaign=2018-q2-fortiguardlabs-cta\">sign up<\/a>\u00a0for our weekly FortiGuard Threat Brief.<\/i><\/p>\n<p><i>Discover how the FortiGuard\u00a0<a href=\"https:\/\/www.fortinet.com\/support\/support-services\/fortiguard-security-subscriptions\/security-rating.html?utm_source=blog&amp;utm_campaign=2018-blog-security-rating-service\">Security Rating Service<\/a>\u00a0provides security audits and best practices to guide customers in designing, implementing, and maintaining the security posture best suited for their organization.<\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-qxx1b0gslklfu2kjckea-holder\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/fortinet\/blog\/threat-research\/~3\/3qB4Tkd5qQU\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy.html\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"\/blog\/threat-research\/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy\/_jcr_content\/root\/responsivegrid\/image.img.png\/1583352231407\/picture1.png\"\/><br \/>Over the past several weeks, FortiGuard Labs has been observing a significant increase in both legitimate and malicious activity surrounding the Coronavirus. Read more.&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/fortinet\/blog\/threat-research\/~4\/3qB4Tkd5qQU&#8221; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-17916","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17916"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17916\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17916"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}