Hackers Are Targeting Coronavirus Research

The UK and US have warned that state-backed cyber attackers are trying to steal data from universities, pharmaceuticals and research institutes involved in coronavirus vaccine research. 

The UK's National Cyber Security Centre (NCSC) and its US counterpart, the US Cybersecurity and Infrastructure Security Agency (CISA), urged workers in healthcare and medical research to change easy-to-guess passwords. China is among hostile states believed to be trying to steal secrets during pandemic.

In May, the NCSC created the Suspicious Email Reporting Service after seeing an increase in coronavirus-related email scams. In its first week, the service received more than 25,000 reports, resulting in 395 phishing sites being taken down.
Now Britain’s intelligence agencies are working urgently to prevent hackers from hostile states, including China, trying to steal the secrets of a potential coronavirus vaccine.

The head of GCHQ has said that hackers, including those from hostile states, were targeting the UK’s health infrastructure and some of its world-leading research labs, often by using simple techniques.

The chief of GCHQ did not directly name China or any other country as being behind the cyber-attacks on the NHS and British research labs, but sources indicated that Beijing was often believed to be involved.

Britain’s intelligence agencies have been pressing for both a reassessment of the UK’s relationship with Beijing, arguing that Britain needs to reduce its dependence on Chinese technology and medical supplies, and a more realistic appreciation of the intelligence threat

Others, however, have gone further, claiming that coronavirus may have leaked from a high-security disease research lab in Wuhan, and that, in contrast to the prevailing research, it may be human made. Sir Richard Dearlove, who was in charge of the British MI6 spy agency in the run up to the Iraq war, told reporters he had seen “very important” research suggesting that “inserted sections” had been placed on the structures of the virus that bind it to human cells.

British government sources reacted with dismay to Dearlove’s statements, the latest in a campaign though to be aimed at justifying a laboratory leak theory promoted by US president Trump. They are reported as saying that they see no evidence to justify the claim by the former MI6 boss.

Yahoo:        Endgadget:         Yahoo:     Daily Mirror:       Guardian:

You Might Also Read: 

Covid-19 Is Working Well For Criminals:
 

 

« Your Phone Is Spying On You
Blame The Boss For Cyber Attacks »

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Square

Square

Square, Inc. develops and provides payment processing, point-of-sale (POS), financial, and marketing services worldwide.

KPN

KPN

KPN is a leading supplier of ICT services including Cyber Security, Identity & Privacy, Secure Communications and Business Continuity.

RadarServices

RadarServices

RadarServices provide early detection of IT security risks for corporations and public authorities, offered as a Solution or a Managed Service.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

Securicy Data Solutions

Securicy Data Solutions

Securicy allows businesses to easily build and maintain their Information Security and Privacy Compliance program.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Measured Insurance

Measured Insurance

Measured Insurance are bridging the gap between technology and Insurance using AI-Powered analytics that track clients’ exposure in real time to create smarter insurance products.