Emergent COVID-19 Threats

Identifying cyber security threats exploiting the COVID-19 conditions

Posted by Asa Hess-Matsumoto on Thursday, April 16, 2020

In the wake of the Coronavirus Disease 2019 (COVID-19) that has impacted people worldwide, a multitude of new cyber threats have been arisen.

Zoom

As a result of “stay at home” orders issued by governors across the United States, many people have had to adapt in interacting with their peers and coworkers from home. One prominent technology that is being widely adopted is Zoom, a video conferencing application developed by the American communications technology company Zoom Video Communications, Inc. Zoom’s use has seen a meteoric rise in the last several weeks among employees looking to work remotely, students engaging their lesson plans at a distance, and many others looking for a convenient and popular means of video conferencing with one another. However, in that same time there have been a number of security vulnerabilities publicly disclosed by security researchers.

According to Bruce Schneier, “Zoom’s problems fall into three broad buckets: (1) bad privacy practices, (2) bad security practices, and (3) bad user configurations.”. That is to say, Zoom’s problems are:

“Skilled threat actors are exploiting peoples’ concerns about Coronavirus to spread mobile malware, including Mobile Remote Access Trojans (MRATs), Banker Trojans, and Premium Dialers, via apps which claim to offer Coronavirus-related information and help for users.”

Spyware

Many people are concerned about tracking the presence (or absence) of COVID-19 cases near them. To this end, a number of cyberespionage applications are being discovered masked as information services regarding the epidemic. These include:

  • Mirrored copies of the Johns Hopkins coronavirus tracker of infection rates and deaths that contain a customized version of SpyMax.
  • A mobile app that steals social media messages, texts, contact lists, call logs, photos, location, and device information misleadingly advertised as “Coronavirus Updates”.
  • Israeli surveillance software pitched as a means to better understand how COVID-19 is spreading.

Check Point Research has reported 16 different mobile apps which claimed to serve as information resources regarding COVID-19 but instead contain malware. The researchers reported that, “Skilled threat actors are exploiting peoples’ concerns about Coronavirus to spread mobile malware, including Mobile Remote Access Trojans (MRATs), Banker Trojans, and Premium Dialers, via apps which claim to offer Coronavirus-related information and help for users.”

Phishing Schemes

In the absence of centralized federal guidance, the individual state governors have been issuing a series of their own advisories for their respective populaces. As such, attackers have been launching phishing campaigns masquerading themselves as those advisory notices, purchase orders, face mask offers, and alerts/safety recommendations from organizations such as the World Health Organization (WHO), UNICEF, and other such agencies.

While most of these phishing attempts have come in the form of emails, the National Cyber Security Centre (NCSC) also reported attempts by other means (ex: text messages). According to their report, these SMS messages – with signatures such as “COVID” and UKGOV” – allude to government payments and tax rebates (such as the trillion dollar bailout passed by U.S. Congress last week) and include links directly to the phishing site.

The FBI has issued a reminder that U.S. government agencies are not sending unsolicited emails or texts asking for private information in order to send stimulus checks. The Internal Revenue Service (IRS) will distribute payments to most Americans via direct deposit information that the agency has on file from previous tax filings.