{"id":17613,"date":"2020-02-01T10:45:03","date_gmt":"2020-02-01T18:45:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/01\/news-11348\/"},"modified":"2020-02-01T10:45:03","modified_gmt":"2020-02-01T18:45:03","slug":"news-11348","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2020\/02\/01\/news-11348\/","title":{"rendered":"Watch Out for Coronavirus Phishing Scams"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e34771c59ec8000083f9d26\/master\/pass\/Security_Coronavirusphishing_RTS30832.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Fri, 31 Jan 2020 22:08:55 +0000<\/strong><\/p>\n<p class=\"byline bylines__byline byline--author\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\"><span class=\"byline__name byline--with-bg\"><a class=\"byline__name-link\" href=\"\/contributor\/lily-hay-newman\">Lily Hay Newma<span class=\"link__last-letter-spacing\">n<\/span><\/a><\/span> <\/span><\/p>\n<p class=\"content-header__row content-header__dek\">At least one email campaign is preying on fears by claiming to offer info about the Wuhan coronavirus.<\/p>\n<p>On Thursday, as coronavirus infections spread, the World Health Organization classified the outbreak as a <a href=\"https:\/\/www.wired.com\/story\/wuhan-china-coronavirus-global-health-emergency\/\">global emergency<\/a>. On Friday, United States officials placed 195 people in a two-week federal quarantine at a California military base after evacuating them from Wuhan, China. Amid international efforts to contain transmission of the virus, online scammers have already begun exploiting the uncertainty and fear.<\/p>\n<p>A sample phishing email from Tuesday, detected by security firm Mimecast, shows attackers disseminating malicious links and PDFs that claim to contain information on how to protect yourself from the spread of the disease. &quot;Go through the attached document on safety measures regarding the spreading of corona virus,&quot; reads the message, which purports to come from a virologist. &quot;This little measure can save you.&quot;<\/p>\n<p>Email scammers often try to elicit a sense of fear and urgency in victims. It&#x27;s not surprising that they would attempt to incorporate the coronavirus into that playbook so quickly. But the move illustrates how phishing attempts so consistently hew to certain time-tested topics and themes.<\/p>\n<p>&quot;Unfortunately we see this often in geopolitical events and world events,&quot; says Francis Gaffney, the director of threat intelligence at Mimecast. &quot;This is when cybercriminals seek opportunities to use the confusion that vulnerable people have. They\u2019ll click on links because they\u2019re not sure.&quot;<\/p>\n<p>Attackers often <a href=\"https:\/\/www.wired.com\/2017\/03\/phishing-scams-fool-even-tech-nerds-heres-avoid\/\">tailor phishing scams<\/a> to seasonal events like holidays or <a href=\"https:\/\/www.wired.com\/2017\/04\/tax-scams-absurdly-common-heres-protect\/\">tax season<\/a> in an attempt to capitalize on anxiety or eagerness. Different attackers will launch different variations of the same scam to steal login credentials, distribute spyware, or collect personal information from their victims. They&#x27;ll also try to overtake legitimate email accounts and target a specific group. If an attachment appears to come from a colleague, you&#x27;re that much more likely to open it.<\/p>\n<p>The success rate of seasonally themed phishing emails pales in comparison, though, to those pegged to a critical world event. People living through Brexit uncertainty or a natural disaster have disproportionate questions and concerns. Attackers can exploit those fears and doubts by suggesting they have answers.<\/p>\n<p>Very recent history bears that out. In the beginning of January, as <a href=\"https:\/\/www.wired.com\/story\/iran-soleimani-cyberattack-hackers\/\">tensions escalated<\/a> between the United States and Iran, scammers sent SMS text messages with malicious links claiming that recipients had been chosen for a US military draft. US Army Recruiting Command, which does not initiate or manage drafts, <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/recruiting.army.mil\/News\/Article-Display\/Article\/2051787\/urgent-news-army-recruiting-discredits-military-draft-texts\/&quot;}\" href=\"https:\/\/recruiting.army.mil\/News\/Article-Display\/Article\/2051787\/urgent-news-army-recruiting-discredits-military-draft-texts\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">issued a statement<\/a> debunking the false texts. And the Selective Service System <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/SSS_gov\/status\/1214201241183670274?s=20&quot;}\" href=\"https:\/\/twitter.com\/SSS_gov\/status\/1214201241183670274?s=20\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">warned<\/a> about fraudulent websites that urged victims &quot;register&quot; for the draft and pay a &quot;fee.&quot; The specifics of the ploys varied, but all fed on the same anxieties, attempting to trick young people into entering their information into a form and sending money directly to scammers.<\/p>\n<p>&quot;We&#x27;ve seen time and time again that cybercriminals are always looking to exploit highly visible events, because people are more likely to engage with malicious emails when the content includes themes that generate more interest,&quot; says Crane Hassold, senior director of threat research at the email security firm Agari and a former digital behavior analyst for the Federal Bureau of Investigation. &quot;Some other themes we have seen in recent campaigns are the wildfires in Australia and California.&quot;<\/p>\n<p class=\"byline summary-item__byline-authors\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\"><span class=\"byline__name\">Adam Rogers<\/span> <\/span><\/p>\n<p class=\"byline summary-item__byline-authors\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\"><span class=\"byline__name\">Eric Niiler<\/span> <\/span><\/p>\n<p class=\"byline summary-item__byline-authors\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\"><span class=\"byline__name\">Michele Cohen Marill<\/span> <\/span><\/p>\n<p>Beyond phishing scams, public health efforts to get a handle on coronavirus have already been dogged by misinformation and conspiracy theories. On Thursday, Facebook laid out <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/about.fb.com\/news\/2020\/01\/coronavirus\/&quot;}\" href=\"https:\/\/about.fb.com\/news\/2020\/01\/coronavirus\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">a plan<\/a> for dealing with the false claims, fear-mongering, fake cures, and misleading advice that flooded the platform. <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/searchliaison\/status\/1223015712362418177&quot;}\" href=\"https:\/\/twitter.com\/searchliaison\/status\/1223015712362418177\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Google<\/a>, <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.twitter.com\/en_us\/topics\/company\/2020\/authoritative-information-about-novel-coronavirus.html&quot;}\" href=\"https:\/\/blog.twitter.com\/en_us\/topics\/company\/2020\/authoritative-information-about-novel-coronavirus.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Twitter<\/a>, and other social platforms like TikTok have also committed to fighting misinformation and boosting credible reporting and advice.<\/p>\n<p>Phishers know all too well that during uncertain times\u2014whether it&#x27;s international conflict or coronavirus\u2014people become desperate for information and reassurance. Protecting yourself from falling into these traps can be difficult, but there are some helpful steps you can take. As you&#x27;ve probably heard countless times, take a moment to think before downloading attachments or clicking links in any email or message, especially from someone you don\u2019t personally know. If you have to interact, try to confirm that the email address is valid and spelled correctly, or use another method of communication to confirm that everything is above board. Most importantly, trust your gut. If something elicits strong emotions or a sense of urgency\u2014or just feels off\u2014pause to reconsider. Ultimately, though, phishing scams are designed to manipulate and deceive. There\u2019s no shame in getting tripped up.<\/p>\n<p>&quot;The coronavirus has a global audience,&quot; Mimecast&#x27;s Gaffney says. &quot;So if you say \u2018Coronavirus is now more prevalent!\u2019 people are going to think \u2018Oh my gosh, it\u2019s more contagious than has been reported in the news. The news isn\u2019t keeping up with the emails.&#x27; And they&#x27;re more likely to click on links, because they are concerned.&quot;<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/coronavirus-phishing-scams\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e34771c59ec8000083f9d26\/master\/pass\/Security_Coronavirusphishing_RTS30832.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Fri, 31 Jan 2020 22:08:55 +0000<\/strong><\/p>\n<p>At least one email campaign is preying on fears by claiming to offer info about the Wuhan coronavirus.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-17613","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17613"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17613\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}