MENU MENU

Urdu Books & Novels, Business Creation & Development, Health, Technology and Games Articles Urdu Books & Novels, Business Creation & Development, Health, Technology and Games Articles

SEARCH
  • HOME
  • ARTICLES
  • HEALTH
  • ENTERTAINMENT
    • GAMING
  • TECHNOLOGY
  • BUSINESS
  • NOVELS
    • Nighat Abdullah
    • Sumera Sharif Toor
    • Mazhar Kaleem
    • Sumaira Hameed
    • Sadia Abid
    • Iffat Sehar Tahir
    • M.A Rahat
    • Hashim Nadeem
    • Maha Malik
    • Saheena Chanda Mehtab
    • Nimra Ahmed
    • A Hameed
    • Umera Ahmed
    • Ushna Kausar Sardar
    • Aleem ul Haq Haqqi
    • Muhammad Idrees Khan
    • Naseem Hijazi
  • ABOUT
    • ABOUT US
    • CONTACT US
    • WRITE FOR US
    • PRIVACY POLICY
    • COOKIE POLICY
    • TERMS OF USE
    • TERMS AND CONDITIONS
    • DISCLAIMER
    • DMCA
    • SITEMAP

How Cyber-criminals are Now Exploiting Corona Fear

SHARE:

Twitter Facebook Google Pinterest
March 23, 2020 Edit this post

Capture computers, steal passwords, extort money: criminals exploit the hectic reactions to the corona crisis. Newcomers to home offices ...

How Cyber-criminals are Now Exploiting  Corona Fear

Capture computers, steal passwords, extort money: criminals exploit the hectic reactions to the corona crisis. Newcomers to home offices are, particularly at risk.

How Cybercriminals Are Now Exploiting Corona Fear

Not only the average medium-sized company - even the large companies in Silicon Valley are struggling with problems when changing their work under pandemic conditions. Another branch, on the other hand, quickly adapted to the new situation: cybercriminals of all kinds are trying to take advantage of the fear and confusion among the population.

In early March, security specialist Shai Alfasi from Reason Labs discovered a program that promises to clearly present the current number of cases of the Coronavirus. In fact, the program appears to display the Johns Hopkins University infographics on the state of the pandemic, which has been cited in recent weeks - but in addition, the program also acted as malware.

"The Azorult Trojan is usually traded in Russian underground forums," Alfasi writes in his analysis. Once a user has activated it, they will search for all information that can be turned into money: passwords, for example, credit card information or even information about cryptocurrencies. Thanks to the modular principle of such Trojans, they can easily be adapted to new occasions.

Same trick, different platform: DomainTools found an Android app that also pretended to display the latest figures on the spread of the new coronavirus.

Anyone who installed the program on their smartphone was soon exposed to a blackmail attempt: the app blocked the device and offered the user the release for a payment of $ 100. Fortunately, the program was so poorly programmed that security researchers could quickly crack and publish the decryption key.

Two cases, probably hundreds. Internet criminals have been trying to exploit attention to the epidemic since January: For example, the World Health Organization (WHO) warns against fake emails that are said to contain health tips or documents with security measures but to cheer users off malicious malware or otherwise want to steal information from them.

No new attack campaigns yet exposed

Since January we have been seeing that both cybercriminals and - we assume - state-sponsored spy campaigns are using the subject of Covid-19 as bait in phishing emails," explains Jens Monrad from IT security company FireEye. In the event of phishing attacks, attachments are sent by e-mail, the opening of which triggers the downloading of malware, with the help of which attackers can gain access to a computer or even entire company networks.

Another variant tries to lure users to fake websites where the user name and password are to be entered. In view of the current uncertainty and the high level of information required by many people with regard to the new coronavirus, simple attacks like this promise success.

The Federal Office for Information Security (BSI) has so far recorded no increase in cyber attacks. "Rather, attackers use the current occasion to make their spam emails more interesting," explains a government spokesman. This is a phenomenon that occurs again and again on special occasions - such as the bargain weeks around Black Friday and Cyber ​​Monday, but also during major sporting events.

Essentially, well-known malware programs that were previously disguised as video players or sold as cell phone games are now being distributed under the guise of corona information. However, such attacks can have serious consequences. The university clinic in Brno, Czech Republic, for example, was partially paralyzed by such an attack. In recent years, several hospitals around the world have also been infected with so-called ransomware, which is software that encrypts internal databases in order to extort a ransom. "Users in unfamiliar surroundings are easier to fool"

Phishing attacks are currently particularly attractive to attackers because many companies have currently sent most of their employees to their home office to prevent infection in the workplace. In many cases, this means a radical change: Many employees who were previously only allowed to work in the office are now being sent home with company laptops or even have to use their own computers. At their desk at home, they often have to see for themselves how to cope with new video conferencing software and unusual collaboration platforms without training.

Users who have to work in an unfamiliar environment are easier to deceive," The employees who have now switched to their home office have to click through many dialogues, the number of emails has increased significantly. It is therefore understandable that they open emails that at first glance appear legitimate.

A large part of the circulating malware is still sent via this route today. And the administrators of many medium-sized companies are currently working under enormous pressure: not only do they have to come to terms with many unfamiliar programs, but they also often lack the opportunity to train their employees on how to secure communication.
Improvised security

In addition, the usual security rules that apply in many companies can only be implemented at a lower level in the current hectic anyway. For example, when it comes to virtual private networks, thanks to which the communication via unsecured Internet infrastructure is encrypted and takes place in a kind of tunnel.

Many companies have bottlenecks in VPN licenses or have to upgrade their hardware so that all employees can dial into the company network," explains Aug. The companies are therefore faced with the choice of either denying their employees access to important resources such as internal software solutions, databases or the intranet for security reasons - which, however, makes decentralized work very difficult.

IT security made to keep operations decentralized from the home office.

However, operators of critical infrastructures such as water and power plants, electricity suppliers or telecommunications companies are usually better equipped and have activated emergency plans. This shows that those who have invested in IT security concepts for exceptional cases in the long term can benefit in the current situation.

Labels:

News

SHARE:

Twitter Facebook Google Pinterest
Newer Post Older Post Home
Magenet


Contact Us: urdusoftbooks@gmail.com

Subscribe For Latest Posts

Major Categories

  • Articles
  • Computer Books
  • Computer Tips
  • Computing Magazine
  • Digital Marketing
  • Entertainment
  • Food
  • Gaming
  • Hashim Nadeem
  • Health
  • Health Books
  • Health News
  • Health Videos
  • Home Improvement
  • Imran Series
  • Interesting News
  • Internet
  • Islamic Books
  • IT Books
  • IT Urdu Magazines
  • Lifestyle
  • Mazhar Kaleem
  • Mohiuddin Nawab
  • News
  • Nimra Ahmed
  • Psychology
  • Reviews
  • Romantic Urdu Novels
  • Scientific Books
  • Shayari
  • Smartphones
  • Social Books
  • Sultan Bashir Mahmood
  • Technology
  • Traveling
  • Umera Ahmed
  • Urdu Computer Books
  • Urdu Health Books
  • Urdu Islamic Books
  • Urdu Novels

Blog Archive

  • ►  2021 (23)
    • ►  January (23)
  • ▼  2020 (166)
    • ►  December (23)
    • ►  November (9)
    • ►  October (3)
    • ►  September (10)
    • ►  August (3)
    • ►  July (15)
    • ►  June (1)
    • ►  May (1)
    • ►  April (15)
    • ▼  March (53)
      • Jannat Kay Pattay Novel Written by Nimra Ahmed | C...
      • Yaaram Novel Written by Sumaira Hameed | Complete ...
      • Abdullah Novel Written By Hashim Nadeem | Part 2 |...
      • Abdullah Novel Written By Hashim Nadeem | Part 1 |...
      • New York Personal Injury Law Explained
      • Analysts Talked About The Magnitude Of The Decline...
      • Virus Protection: How To Teach Your Child To Wash ...
      • Best Data Recovery Software of 2020
      • Major Causes of Ageing in the Brain
      • One Charger For All Apple Products
      • Top 5 Most "Raw" Games of Recent Years
      • HUAWEI P40 Series Total Breaking News Finishing | ...
      • Tamko Heritage Vintage vs GAF Timberline HD Roofin...
      • Best Car Leasing Tips: Get The Best Deals
      • New York Workers Compensation Laws Clarified
      • Kingston HyperX FURY DDR4 RGB HX432C16FB3AK2 / 16 ...
      • How Cyber-criminals are Now Exploiting Corona Fear
      • Xbox Series X For 10 Years
      • Which Flagship Is Now The Most Affordable
      • Huawei Has Found A Way To Look For Applications Th...
      • Google Developers Conference is Completely Cancele...
      • Where And What Games Can I Buy Now With A Big Disc...
      • How to Install an SSD In A Laptop Do It Yourself
      • YouTube Reduces Video Quality Following Netflix
      • Top 7 Little-Known Non-Fiction Films
      • Scientists Are Developing A Quantum Sensor Capable...
      • How Apps Spy On Us
      • WM Casino
      • The New Version Of Android 11 Developer Preview Ha...
      • Is Your Company Ready To Move To Remote Work?
      • Google Blocks Non-Play Apps For Android
      • Xiaomi Discontinues The Release Of Mi Note 10 And ...
      • Popular Iphone Apps Suspected Of Stealing User Data
      • Windows 10 Has Crossed The Line: Os Installed On M...
      • Sony Has Set A Presentation Date For The Playstati...
      • Doom Eternal | Requirements And First Reviews
      • Everything You Need To Know About Google Stadia
      • Apple Itunes, Upscaling And HDR: What Technologies...
      • Apple Arcade Has Huge Potential | 5 Pros And Cons
      • Everything You Need To Know Before You Watch Netfl...
      • Top 5 Most Anticipated Games of 2020
      • Seven Best Survival Video Games
      • Top 7 Video Game Films
      • The Future Of Open World Games
      • Interesting Facts About The Original Doom
      • Top 7 Video Game Sequels That We’re Unlikely To See
      • Budgeting Basics for Small Business Owners
      • Suspense Digest March 2020
      • How Improved Self-Esteem Eliminates Stress
      • Visit Dallas Museum of Art, Dallas World Aquarium,...
      • Khawateen Digest March 2019
      • Don't Perform These Five Things With Your Hair Oth...
      • Khawateen Digest August 2019
    • ►  February (25)
    • ►  January (8)
  • ►  2019 (97)
    • ►  December (7)
    • ►  November (8)
    • ►  October (4)
    • ►  September (14)
    • ►  August (9)
    • ►  July (11)
    • ►  June (15)
    • ►  April (1)
    • ►  March (1)
    • ►  February (17)
    • ►  January (10)
  • ►  2018 (231)
    • ►  December (1)
    • ►  November (5)
    • ►  October (3)
    • ►  September (17)
    • ►  August (12)
    • ►  July (20)
    • ►  June (13)
    • ►  May (34)
    • ►  April (19)
    • ►  March (53)
    • ►  February (35)
    • ►  January (19)
  • ►  2017 (138)
    • ►  December (13)
    • ►  November (16)
    • ►  October (20)
    • ►  September (19)
    • ►  August (8)
    • ►  July (10)
    • ►  May (5)
    • ►  April (18)
    • ►  March (21)
    • ►  January (8)
  • ►  2016 (126)
    • ►  December (2)
    • ►  November (4)
    • ►  October (2)
    • ►  September (10)
    • ►  August (1)
    • ►  July (6)
    • ►  June (16)
    • ►  May (13)
    • ►  April (14)
    • ►  March (21)
    • ►  February (16)
    • ►  January (21)
  • ►  2015 (78)
    • ►  December (27)
    • ►  November (12)
    • ►  October (10)
    • ►  September (13)
    • ►  August (7)
    • ►  July (2)
    • ►  June (3)
    • ►  May (2)
    • ►  January (2)
  • ►  2014 (18)
    • ►  December (7)
    • ►  October (2)
    • ►  August (1)
    • ►  July (6)
    • ►  June (2)
  • ►  2012 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  February (1)
  • ►  2007 (2)
    • ►  July (1)
    • ►  June (1)
Footer Logo
© 2015 Urdu Books & Novels, Business Creation & Development, Health, Technology and Games Articles
All rights reserved.
  • Home
  • About Us
  • Contact Us
  • Write for Us
  • Cookie Policy
  • Privacy Policy
  • Terms of Use
  • Disclaimer
  • Sitemap
  • Terms and Conditions
  • DMCA

The address element

Contact Us at urdusoftbooks@gmail.com.
Name
Email
Message

A Hameed,2,Aanchal Digest,40,Ahadees Books,1,Aleem ul Haq Haqqi,2,Army Jobs,1,Articles,38,Ashfaq Ahmed,3,Aslam Rahi M.A,1,Business,31,Casino,5,Children Books,1,Computer Books,32,Computer Tips,11,Computing Magazine,22,Dalda Ka Dastarkhwan,1,Darr Digest,7,Devta All Parts,1,Dictionaries,3,Digest,1,Digital Marketing,5,Dosheeza Digest,1,English Books,7,English Dictionary,2,Entertainment,10,FIA Jobs,1,Food,2,Forex Trading,1,Gaming,17,General Knowledge Books,1,Global Science Magazine,7,Haalim Episodes,1,Halim Novel Episodes,1,Hashim Nadeem,8,Hasrat Mohani,1,Health,26,Health Books,2,Health News,28,Health Videos,2,Hijab Digest,17,Hina Digest,19,Historical Books,3,Historical Novels,2,Home Improvement,2,How To,3,Iffat Sehar Tahir,1,Imran Series,6,Interesting News,36,Internet,1,Islamic Books,14,IT Books,9,IT Urdu Magazines,9,Jasoosi Digest,20,Job Advertisements,8,Jobs,8,Khawateen Digest,42,Kiran Digest,20,Languages Learning Books,1,Lifestyle,2,M.A Rahat,1,Maha Malik,1,Masala Magazine,1,Maulana Ahmad Saeed Dehlwi,1,Mazhar Kaleem,5,Mohiuddin Nawab,13,Muhammad Idrees Khan,1,Naseem Hijazi,1,Naye Ufaq Digest,10,News,13,Nighat Abdullah,1,Nimra Ahmed,10,Pakeeza Digest,18,Pakistan History Books,1,Poetry,1,Poetry Books,2,Psychology,7,Quotes websites,1,Religious Urdu Books,3,Reviews,4,Rida Digest,3,Rohani Digest,1,Romantic Urdu Novels,54,Sachi Kahaniyan Digest,10,Sadia Abid,1,Saheena Chanda Mehtab,1,Sarguzasht Digest,22,Sayara Digest,3,Scientific Books,5,Shadi Books,1,Shayari,1,Shuaa Digest,43,Smartphones,12,Social Books,3,Sultan Bashir Mahmood,8,Sumaira Hameed,2,Sumaira Sharif Toor,1,Sumera Shareef Toor,1,Sumera Sharif Toor,1,Suspense Digest,23,Syed Wasi Shah,1,Taleem o Tarbiat Magazine,8,Tariq Mehmood Majzoobi,1,Technology,26,Technology News,32,Telecom Jobs,1,top 10,1,Traveling,1,Tutorials,1,Ubqari Magazine,23,Umera Ahmed,19,Urdu Articles,2,Urdu Computer Books,5,Urdu Dictionary,2,Urdu Digest,3,Urdu Health Books,1,Urdu Islamic Books,10,Urdu Novels,71,Ushna Kausar Sardar,1,Wallpapers,1,Women Books,1,บ่อนคาสิโน,1,
ltr
item
Urdu Books & Novels, Business Creation & Development, Health, Technology and Games Articles: How Cyber-criminals are Now Exploiting Corona Fear
How Cyber-criminals are Now Exploiting Corona Fear
https://1.bp.blogspot.com/-rwB53YPzcxA/XnjWE5Z2BhI/AAAAAAAAJqM/UmiNBAAlQxwclphS6a8WJfVDnLMwcQjjgCLcBGAsYHQ/s640/it-sicherheit-coronavirus-internetkriminalitaet-cyberangriff-krankenhaus-homeoffice-2.webp
https://1.bp.blogspot.com/-rwB53YPzcxA/XnjWE5Z2BhI/AAAAAAAAJqM/UmiNBAAlQxwclphS6a8WJfVDnLMwcQjjgCLcBGAsYHQ/s72-c/it-sicherheit-coronavirus-internetkriminalitaet-cyberangriff-krankenhaus-homeoffice-2.webp
Urdu Books & Novels, Business Creation & Development, Health, Technology and Games Articles
https://www.urdusoftbooks.com/2020/03/how-cyber-criminals-are-now-exploiting.html
https://www.urdusoftbooks.com/
https://www.urdusoftbooks.com/
https://www.urdusoftbooks.com/2020/03/how-cyber-criminals-are-now-exploiting.html
true
5663797177417284559
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy