MENU MENU

Urdu Soft Books: Well-researched and Best Quality Trending Articles | Famous Urdu Books and Novels Urdu Soft Books: Well-researched and Best Quality Trending Articles | Famous Urdu Books and Novels

SEARCH
  • HOME
  • ARTICLES
  • BUSINESS
  • ENTERTAINMENT
    • GAMING
  • HOW TO
  • NOVELS
    • Nighat Abdullah
    • Sumera Sharif Toor
    • Mazhar Kaleem
    • Sumaira Hameed
    • Sadia Abid
    • Iffat Sehar Tahir
    • M.A Rahat
    • Hashim Nadeem
    • Maha Malik
    • Saheena Chanda Mehtab
    • Nimra Ahmed
    • A Hameed
    • Umera Ahmed
    • Ushna Kausar Sardar
    • Aleem ul Haq Haqqi
    • Muhammad Idrees Khan
    • Naseem Hijazi
  • TECHNOLOGY
  • ABOUT
    • ABOUT US
    • CONTACT US
    • COOKIE POLICY
    • DISCLAIMER
    • DMCA
    • PRIVACY POLICY
    • TERMS & COND
    • TERMS OF USE
    • WRITE FOR US

How Cyber-criminals are Now Exploiting Corona Fear

March 23, 2020 2020-03-23T20:46:00+05:00 Edit this post

Capture computers, steal passwords, extort money: criminals exploit the hectic reactions to the corona crisis. Newcomers to home offices ...

How Cyber-criminals are Now Exploiting  Corona Fear

Capture computers, steal passwords, extort money: criminals exploit the hectic reactions to the corona crisis. Newcomers to home offices are, particularly at risk.

How Cybercriminals Are Now Exploiting Corona Fear

Not only the average medium-sized company - even the large companies in Silicon Valley are struggling with problems when changing their work under pandemic conditions. Another branch, on the other hand, quickly adapted to the new situation: cybercriminals of all kinds are trying to take advantage of the fear and confusion among the population.

In early March, security specialist Shai Alfasi from Reason Labs discovered a program that promises to clearly present the current number of cases of the Coronavirus. In fact, the program appears to display the Johns Hopkins University infographics on the state of the pandemic, which has been cited in recent weeks - but in addition, the program also acted as malware.

"The Azorult Trojan is usually traded in Russian underground forums," Alfasi writes in his analysis. Once a user has activated it, they will search for all information that can be turned into money: passwords, for example, credit card information or even information about cryptocurrencies. Thanks to the modular principle of such Trojans, they can easily be adapted to new occasions.

Same trick, different platform: DomainTools found an Android app that also pretended to display the latest figures on the spread of the new coronavirus.

Anyone who installed the program on their smartphone was soon exposed to a blackmail attempt: the app blocked the device and offered the user the release for a payment of $ 100. Fortunately, the program was so poorly programmed that security researchers could quickly crack and publish the decryption key.

Two cases, probably hundreds. Internet criminals have been trying to exploit attention to the epidemic since January: For example, the World Health Organization (WHO) warns against fake emails that are said to contain health tips or documents with security measures but to cheer users off malicious malware or otherwise want to steal information from them.

No new attack campaigns yet exposed

Since January we have been seeing that both cybercriminals and - we assume - state-sponsored spy campaigns are using the subject of Covid-19 as bait in phishing emails," explains Jens Monrad from IT security company FireEye. In the event of phishing attacks, attachments are sent by e-mail, the opening of which triggers the downloading of malware, with the help of which attackers can gain access to a computer or even entire company networks.

Another variant tries to lure users to fake websites where the user name and password are to be entered. In view of the current uncertainty and the high level of information required by many people with regard to the new coronavirus, simple attacks like this promise success.

The Federal Office for Information Security (BSI) has so far recorded no increase in cyber attacks. "Rather, attackers use the current occasion to make their spam emails more interesting," explains a government spokesman. This is a phenomenon that occurs again and again on special occasions - such as the bargain weeks around Black Friday and Cyber ​​Monday, but also during major sporting events.

Essentially, well-known malware programs that were previously disguised as video players or sold as cell phone games are now being distributed under the guise of corona information. However, such attacks can have serious consequences. The university clinic in Brno, Czech Republic, for example, was partially paralyzed by such an attack. In recent years, several hospitals around the world have also been infected with so-called ransomware, which is software that encrypts internal databases in order to extort a ransom. "Users in unfamiliar surroundings are easier to fool"

Phishing attacks are currently particularly attractive to attackers because many companies have currently sent most of their employees to their home office to prevent infection in the workplace. In many cases, this means a radical change: Many employees who were previously only allowed to work in the office are now being sent home with company laptops or even have to use their own computers. At their desk at home, they often have to see for themselves how to cope with new video conferencing software and unusual collaboration platforms without training.

Users who have to work in an unfamiliar environment are easier to deceive," The employees who have now switched to their home office have to click through many dialogues, the number of emails has increased significantly. It is therefore understandable that they open emails that at first glance appear legitimate.

A large part of the circulating malware is still sent via this route today. And the administrators of many medium-sized companies are currently working under enormous pressure: not only do they have to come to terms with many unfamiliar programs, but they also often lack the opportunity to train their employees on how to secure communication.
Improvised security

In addition, the usual security rules that apply in many companies can only be implemented at a lower level in the current hectic anyway. For example, when it comes to virtual private networks, thanks to which the communication via unsecured Internet infrastructure is encrypted and takes place in a kind of tunnel.

Many companies have bottlenecks in VPN licenses or have to upgrade their hardware so that all employees can dial into the company network," explains Aug. The companies are therefore faced with the choice of either denying their employees access to important resources such as internal software solutions, databases or the intranet for security reasons - which, however, makes decentralized work very difficult.

IT security made to keep operations decentralized from the home office.

However, operators of critical infrastructures such as water and power plants, electricity suppliers or telecommunications companies are usually better equipped and have activated emergency plans. This shows that those who have invested in IT security concepts for exceptional cases in the long term can benefit in the current situation.

Labels:

News

SHARE:

Twitter Facebook Google Pinterest
Mary Luna author-avatar
Newer Post Older Post Home

WRITE FOR US

WRITE FOR US

Major Categories

  • Articles (184)
  • Automobiles (6)
  • Business (114)
  • CBD (11)
  • Computer Books (32)
  • Crypto (65)
  • Digital Marketing (21)
  • Ecommerce (3)
  • Entertainment (12)
  • Essay Writing (12)
  • Finance (18)
  • Fintech (4)
  • Food (1)
  • Gaming (60)
  • Health (65)
  • Home Decoration (10)
  • Home Improvements (15)
  • How To (23)
  • IT Books (9)
  • Insurance (10)
  • Internet (3)
  • Law (14)
  • Lifestyle (11)
  • News (23)
  • Personal Computer (13)
  • Psychology (11)
  • Real Estate (9)
  • Reviews (10)
  • SEO (23)
  • Smartphones (26)
  • Software (12)
  • Technology (111)
  • Traveling (2)
  • Urdu Novels (79)
  • Windows (1)

Famous Urdu Novels

  • Abdullah Novel
  • Areej Shah Novels
  • Bachpan Ka December
  • Beli Rajputan Ki Malika
  • Bin Mangi Dua
  • Darbar e Dil Novel
  • Devta Novel
  • Hum Kahan Kay Sachay Thay
  • Jannat Kay Pattay
  • Karakoram Ka Taj Mahal
  • Karakoram Ka Taj Mahal Novel
  • Khuda Aur Mohabbat
  • Mehwish Ali Novels
  • Mushaf Novel
  • Namal Novel
  • Pahari Ka Qaidi
  • Paras Novel
  • Parizad Novel
  • Peer-e-Kamil Novel
  • Sans Sakin Thi
  • Toota Hua Tara
  • Tum Akhri Jazeera Ho
  • Urdu Novels
  • Yaaram Novel
  • Zeenia Sharjeel Novels
Footer Logo
© 2015 Urdu Soft Books: Well-researched and Best Quality Trending Articles | Famous Urdu Books and Novels
All rights reserved.
  • About Us
  • Cookie Policy
  • Disclaimer
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • Terms of Use
  • Write for Us

Contact Us:

editor@urdusoftbooks.com

urdusoftbooks@gmail.com

The address element

Contact Us at urdusoftbooks@gmail.com.
Name
Email *
Message *

A Hameed,2,Aanchal Digest,43,Ahadees Books,1,Aleem ul Haq Haqqi,2,Areej Shah Novels,1,Army Jobs,1,Articles,184,Ashfaq Ahmed,3,Aslam Rahi M.A,1,Automobiles,6,Autos,5,Business,114,Casino,11,CBD,11,Celebrities,1,Children Books,1,Computer Books,32,Computer Tips,11,Computing Magazine,22,Creative Design; Business,1,Crypto,65,Dalda Ka Dastarkhwan,1,Darr Digest,7,Devta All Parts,1,Dictionaries,3,Digest,1,Digital Marketing,21,Dosheeza Digest,1,Ecommerce,3,Education,4,English Books,8,English Dictionary,2,Entertainment,12,Essay Writing,12,FIA Jobs,1,Finance,18,Fintech,4,Food,1,Forex Trading,4,Gaming,60,General Knowledge Books,1,Global Science Magazine,7,Haalim Episodes,1,Halim Novel Episodes,1,Hashim Nadeem,8,Hasrat Mohani,1,Health,65,Health Books,2,Health News,28,Health Videos,2,Hijab Digest,17,Hina Digest,20,Historical Books,3,Historical Novels,2,Home Decoration,10,Home Improvements,15,How To,23,Iffat Sehar Tahir,1,Imran Series,6,Insurance,10,Interesting News,36,Internet,3,Islamic Books,14,IT Books,9,IT Urdu Magazines,9,Jasoosi Digest,22,Job Advertisements,8,Jobs,8,Khawateen Digest,46,Kiran Digest,20,Languages Learning Books,1,Law,14,Legal,4,Lifestyle,11,M.A Rahat,1,Maha Malik,1,Marketing,8,Masala Magazine,1,Maulana Ahmad Saeed Dehlwi,1,Mazhar Kaleem,5,Mehwish Ali Novels,1,Mohiuddin Nawab,13,Muhammad Idrees Khan,1,Naseem Hijazi,1,Naye Ufaq Digest,10,News,23,Nighat Abdullah,1,Nimra Ahmed,12,Pakeeza Digest,19,Pakistan History Books,1,Personal Computer,13,Personal Development,4,Poetry,1,Poetry Books,2,Psychology,11,Quotes websites,1,Real Estate,9,Religious Urdu Books,3,Reviews,10,Rida Digest,3,Rohani Digest,1,Romantic Urdu Novels,53,Sachi Kahaniyan Digest,10,Sadia Abid,1,Saheena Chanda Mehtab,1,Sarguzasht Digest,23,Sayara Digest,3,Scientific Books,5,SEO,23,Shadi Books,1,Shayari,1,Shuaa Digest,44,Smartphones,26,Social Books,3,Software,12,Sports,2,Sultan Bashir Mahmood,8,Sumaira Hameed,2,Sumaira Sharif Toor,1,Sumera Shareef Toor,1,Sumera Sharif Toor,1,Suspense Digest,25,Syed Wasi Shah,1,Taleem o Tarbiat Magazine,8,Tariq Mehmood Majzoobi,1,Technology,111,Technology News,32,Telecom Jobs,1,top 10,1,Traveling,2,Trending,3,Tutorials,1,Ubqari Magazine,23,Umera Ahmed,19,Urdu Articles,2,Urdu Computer Books,5,Urdu Dictionary,2,Urdu Digest,3,Urdu Health Books,1,Urdu Islamic Books,10,Urdu Novels,79,Ushna Kausar Sardar,1,Wallpapers,1,Windows,1,Women Books,1,บ่อนคาสิโน,1,
ltr
item
Urdu Soft Books: Well-researched and Best Quality Trending Articles | Famous Urdu Books and Novels: How Cyber-criminals are Now Exploiting Corona Fear
How Cyber-criminals are Now Exploiting Corona Fear
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcz5zC6sCXCLwxZEt6gyvbCSO1JsH0j6jgw4n9Rz6KIkLlR8jHv1l86HidMZqeD6f5GdjqXiADogOi9P1LXVcmdWcqaEHK1OQpZKlN4j6zXVS5t3eMRgvApLXKypKSqAdC-d1ww3ANOMNm/s640/it-sicherheit-coronavirus-internetkriminalitaet-cyberangriff-krankenhaus-homeoffice-2.webp
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcz5zC6sCXCLwxZEt6gyvbCSO1JsH0j6jgw4n9Rz6KIkLlR8jHv1l86HidMZqeD6f5GdjqXiADogOi9P1LXVcmdWcqaEHK1OQpZKlN4j6zXVS5t3eMRgvApLXKypKSqAdC-d1ww3ANOMNm/s72-c/it-sicherheit-coronavirus-internetkriminalitaet-cyberangriff-krankenhaus-homeoffice-2.webp
Urdu Soft Books: Well-researched and Best Quality Trending Articles | Famous Urdu Books and Novels
https://www.urdusoftbooks.com/2020/03/how-cyber-criminals-are-now-exploiting.html
https://www.urdusoftbooks.com/
https://www.urdusoftbooks.com/
https://www.urdusoftbooks.com/2020/03/how-cyber-criminals-are-now-exploiting.html
true
5663797177417284559
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content