Covid-19 Virus Impacts Home Working

As the global Coronavirus epidemic hits economies worldwide many employees are working from home, forcing organisations to allow mass remote connections to internal work networks and resources. This  is increasing cyber-criminal behaviour, which is now focusing on the effects of the virus and working from home on less secure networks. 

The C-19 virus is being increasingly used as a subject to engage readers and then used for phishing emails and deliver a range of other attack vectors.

Global Computer Emergency Response Teams (CERTs) have doubled down on their warnings for the public to be wary of scams and cyber-attacks referencing the coronavirus pandemic.Attackers ranging from cyber criminals to suspected spies have cynically used alarm about the global health emergency as bait for phishing or malware-based attacks.

The UK’s National Cyber Security Centre (NCSC) put out a similar warning that elaborates on the range of attacks being carried out by cyber criminals seeking to exploit Covid-19. “These attacks are versatile and can be conducted through various media, adapted to different sectors and monetised via multiple means, including ransomware, credential theft, bitcoin or fraud,” according to the NCSC.

The rationale behind the increase in these attacks is simple. Mass working over remote connection equals mass remote login activity, mostly over private insecure machines with user accounts that have never done so before, making remote login credentials an easy target for attackers.

A study by Cynet has found a correlation between rising cases of COVID-19 in Italy and increasing cyber-attacks on remote workers.

Cynet analysed its aggregate company data in Italy and found that companies with higher proportions of employees working remotely due to COVID-19 cases saw a rise in phishing attacks, compared to countries with fewer attacks.These phishing attacks include those targeting remote user credentials, as well as weaponised email attacks. 

  • 35% of personal email systems encountered attacks involving exploitation of or redirection to malicious websites,
  • 32% were affected by malicious macros,
  •  21% by more simplistic means involving malicious links embedded in the email body.
  • Malicious remote login attempts have also been found to increase in a similar fashion to phishing attacks among Cynet customers.

Malware and email viruses that use Coronavirus-themed messages are aimed at tricking people into fake information and get them to give security data has now spread to over a dozen countries, according to security firm Proofpoint. The company also reported that attackers are beginning to register URLs and create fake websites relating to Coronavirus in order to carry out malicious activity.

The advice from the NCSC is that organisations should prepare for increased remote working and ensure staff are vigilant with work devices that may contain sensitive data. It warns that employees are more likely to have their devices stolen or lost when they are away from the office or home, so efforts must be made to ensure data is encrypted while in a resting state.

Means of Protection
In regards to how cyber-attacks were prevented from infiltrating company systems, over 40% were nullified by behavioural analysis, while almost 30% were stopped by static analysis on the part of machine learning,

Memory monitoring, meanwhile, did the trick for nearly 20%, and slightly over 10% by identification and blocking attacks using the user’s signature. “The fact that only 10% of the malware attacks were identified by their signature indicates that the attackers behind these campaigns are using advanced attacking tools to take advantage of the employees working in non-secure home computing environments,” said Eyal Gruner, CEO and co-founder of Cynet. “Our recommendation is for those employees to request enhanced offsite security and support to protect malicious access to sensitive IT systems and data.”

Cynet's blog post that the findings serve as a warning for CISOs worldwide in regards to possible vulnerabilities as a result of the COVID-19 pandemic. 

CyNet:     Information-Age:      Independent:   Portswigger:     Evening Express

You Might Also Read:

Cyber Crime Methods Are Evolving:

 

 

 

« Remote Working Is On Suddenly On Trend
How Effective Is Your Threat Intelligence? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Socama Group

Socama Group

Socama Group is an innovative firm providing high-value electronic payment and security solutions for enterprises and individuals.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

Cyber@StationF

Cyber@StationF

Cyber@StationF is an up to 6 months international startup acceleration programme, whose members provide solutions for the Cybersecurity industry.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

BITSCore

BITSCore

BITSCore stands as a leading service in cyber-security, provenance and supply-chain tracking. We provide unique and powerful solutions utilising our patented private blockchain platform.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

Difenda

Difenda

Difenda Shield is a fully integrated and modular cybersecurity suite that gives your organization the agility it needs to implement a world-class cybersecurity system.