Monday, September 20 2021

Cyber criminals use information about the coronavirus outbreak as bait to spread ‘Emotet’ malware, Researchers at IBM X-Force warn that there are cyber criminals who are spreading ‘Emotet’ malware in Japan via emails with links related to the coronavirus outbreak.

Cyber criminals take advantage of global events to expand their malware. 20M Cyber criminals exploit any vulnerability to spread their attacks. With the world overwhelmed by the possible effects of Wuhan’s coronavirus, researchers from entities such as IBM warn that other dangers are lurking emails are being identified with links infected with ‘Emotet’ malware that use information about the outbreak as bait.

Cyber attacks in 2020

Now cyber-attacks have occurred in Japan, but experts do not rule out that the offensive with this hard-to-crack Trojan expands to the rest of the world, so they ask citizens to be vigilant. ‘Emotet’ is a type of malware originally designed as a banking Trojan aimed at stealing financial data, but it has evolved to become a major threat to users worldwide. It was first identified in 2014 and according to the US it is one of the most expensive and destructive malwares known to date. This computer virus has a history of having devastatingly effective in its attacks on governments and financial institutions. The practice of taking advantage of global events to send malicious emails has become common among cyber criminals: “This strategy is able to trick more victims into clicking links or opening malicious files, which ultimately increases the effectiveness of a malware campaign,” IBM researchers report. According to TechRepublic, Javvad Malik, a security awareness advocate with KnowBe4, said attempts have also been made to spread the ‘Emotet’ malware by exploiting the unfortunate helicopter accident that claimed the life of Kobe Bryant, his daughter and the other passengers. The Super Bowl and Greta Thunberg were also used as bait for the computer virus. How do you identify these fraudulent emails? IBM discovered that cyber criminals sent emails under the pretext of being part of a social assistance service provider for the disabled in Japan. The emails falsely claim that there are “reports of patients with coronavirus in Gifu, Tottori and Osaka prefectures in Japan, urging victims to read an attached Microsoft Word document containing the Emotet Trojan inside,” they claim from the TechRepublic portal Facebook, Twitter and Google join the fight against the coronavirus fighting the ‘fake news’. “The messages are particularly dangerous because they were made to seem like official government emails, equipped with legitimate addresses, phone numbers and emails,” they add.

Any email that has the attachment of type pdf, .mp4 and .docx files that claim to have information on how people can protect themselves from 2019-nCoV, and updates on their spread and even detection procedures, should not be opened and the email attachment should not be downloaded. The incident must be reported to the network team or cyber experts for action.

Previous

Cyber Response Plan for Cyber Security – Need of the Hour - 2/4

Next

Cyber Security in 2020! Be cyber aware!

Check Also

Widget

Don’t Miss

Cyber Deal Update: Upstream Security, Hunters, build.security

Khushi Arora

Upstream Security and Hunters complete Series C and Series A funding rounds, respectively. Elastic NV acquires build.security. Funding Upstream Security, an Israeli provider of automotive cybersecurity and a data analytics platform for connected vehicles, has closed a $62 million Series C funding round led by Mitsui Sumitomo Insurance, along with new investors I.D.I. Insurance, NextGen […]

Cyber Deal Update: Loop Secure, Intelligent Automation, Blumira

Khushi Arora

Tesserent acquires Loop Secure to complement its own services, and BlueHalo merges with Intelligent Automation. Blumira completes a Series A funding round. Mergers and Acquisitions Tesserent, an Australian network security company, has announced its intent to acquire Loop Secure, a provider of managed security services, governance risk and compliance, and offensive security services also based […]

Cyber Deal Update: FHIRBlocks, InfoSum

Khushi Arora

Healthcare cybersecurity company ConsenSys Health acquires FHIRBlocks. InfoSum and Monte Carlo close a Series B and Series C funding round, respectively. Mergers and Acquisitions Otava, a Michigan-headquartered cloud solutions provider, has announced its acquisition of NewCloud Networks, a Colorado-based cloud computing services provider. The acquisition provides Otava a product portfolio that includes security services, cloud […]

Cyber Deal Update: Carve Systems, Baffle, Certik

Khushi Arora

iVision acquires Carve Systems, Baffle closes a Series B funding round, and CertiK closes adds to its Series B funding round announced last month. Mergers and Acquisitions iVision, a Georgia-based provider of IT infrastructure and application solutions, has acquired Carve Systems, a New York-based cybersecurity company that provides security testing, security engineering, and security strategy […]

Cyber Executive Moves: Aegon Asset Management, Tego Cyber

Khushi Arora

Aegon Asset Management hires former COO of MN and Tego Cyber gains a new CISO. Aegon Asset Management, based in The Netherlands, has appointed Nicole Grootveld-Sandig as its chief technology officer. Grootveld-Sandig joins Aegon from the Dutch specialist pensions management company MN NV. Tego Cyber, a Nevada-based developer of cyber threat intelligence solutions, has hired […]

Cyber Deal Update: Appriss Insights, Espagon

Khushi Arora

Equifast acquires data analytics company Appriss Insights, while Cisco acquires observability provider Espagon. Mergers and Acquisitions Equifax, an Atlanta-based global data, analytics and technology company, has announced its acquisition of Appriss Insights, a Kentucky-based information technology company providing customized solutions to enhance security and financial processes for businesses, for $1.825 billion. “We are extending the […]