Connect with us

Hi, what are you looking for?


Back to Basics: Pandemic Cybersecurity Trends and Solutions

Back to Basics: Pandemic Cybersecurity Trends and Solutions


Because of the short transition to distant work as a result of present world pandemic – coupled with cybercriminals’ penchant for profiting from worry, uncertainty, and doubt – safety researchers have seen a surge in cybersecurity points. Cybercriminals have been fast to take advantage of newly deployed entry units, novice teleworkers, susceptible residence computer systems and networks, and overworked IT groups. Many have even quickly shelved conventional network-centric assaults to focus on new safety gaps and vulnerabilities that permit them to take advantage of and acquire entry to precious knowledge and sources. In April alone, for instance, the FBI acquired 3,000-4,000 each day cybersecurity-related complaints from US companies and customers, a steep incline from the typical of 1,000 per day.

After all, risk researchers know that vital social occasions are normally a catalyst for brand spanking new threats to emerge. Whether or not it’s a pandemic, the World Cup, or another vital occasion, there are at all times dangerous actors trying to exploit others throughout instances of disaster. Over the previous few months, FortiGuard Labs has been actively monitoring world risk telemetry and assault campaigns associated to the pandemic, together with data stealers, trojans, ransomware, and the effectiveness of social-engineered lures. This has revealed the next latest developments:

• The most important spike in electronic mail assaults was April 2, which noticed 330 separate COVID-19 electronic mail campaigns.

• April additionally noticed the very best quantity of malicious electronic mail campaigns, with over 4,250 COVID-19-related occasions in whole.

• Most emails have malicious .DOCX and .PDF information (.DOCX being the very best) hooked up, with ransomware being essentially the most prevalent attachment.

• Curiously, the numbers of those assaults have been steadily declining since April, with 3,590 electronic mail campaigns in Could and a couple of,841 in June.

Three of the important thing dangerous actor actions I’ve seen these previous few months are the exploitation of feelings to commit cyber fraud, the rise of spear phishing, and the elevated dangers introduced on by working distant.

Exploiting Feelings for Monetary Acquire

From a social engineering standpoint, cybercriminals are maximizing the panic part of this pandemic – and particularly the scarcity of medical gear and provides. Our risk researchers have seen campaigns targeted on hospitals, medical gear producers, and medical health insurance corporations. The Facilities for Illness Management (CDC) and the World Well being Group (WHO) each reported in April that malicious actors had been spoofing cellphone calls and perpetrating electronic mail campaigns designed to look as in the event that they had been coming from them.

Cellphone campaigns both solicited donations or pretended to be promoting important medical provides. And phishing emails included ersatz invoices for provides by no means ordered, or claimed to be offering essential medical data or updates. As a substitute, after all, these emails included contaminated paperwork or hyperlinks to compromised web sites.

Spear-phishing is Additionally on the Rise

Along with generic, broad spectrum assaults, we have now additionally seen a surge in extremely focused campaigns, with assaults notably preying on the medical provide scarcity. One malicious spear-phishing marketing campaign we lately noticed focused a medical system provider. On this assault, slightly than providing provides on the market, that attacker inquired about numerous supplies wanted to deal with the COVID-19 pandemic as a consequence of excessive demand. With a purpose to create a stronger sense of urgency, the e-mail included a compelling assertion that the sender had already tried to achieve the recipient by way of phone.

On this case, the e-mail contained a number of misspellings, equivalent to within the topic line, “Inquiry on Medical Sipplies – [company name].” It additionally contained an attachment purporting to comprise particulars of the inquiry, which was misspelled as nicely. Misspellings and poor grammar are sometimes telltale indicators of scams. The aim on this case was clearly to interrupt the provision chain of medical items wanted to save lots of lives.

Distant Work Introduces New Assault Vectors

Cybercriminals are nicely conscious that instances of fast transition may cause critical disruptions for organizations. Within the rush to make sure enterprise continuity, issues like safety protocols can get neglected or put aside for the sake of expediency. And as at all times, cybercriminals are searching for any alternative to reap the benefits of inadvertent safety gaps.

On this case, as soon as the world instantly discovered itself in lockdown, an unprecedented variety of unprotected customers and units had been instantly on-line all on the similar time. In any residence, there are seemingly two or extra folks connecting remotely to work by means of their residence web connection. There can also be a number of kids engaged in on-line faculty, not to mention collaborating in on-line gaming communities or different social actions.

One other complicating issue is that not each group was capable of purchase sufficient laptops for each worker who now must work remotely. Consequently, many teleworkers had been pressured to make use of their private units to hook up with the company community – units which are nearly by no means as safe as their corporate-issued counterparts.

What makes this so harmful is that these units don’t even must be attacked on to be compromised. They’re additionally hooked up to unsecured residence networks, which allow attackers to take advantage of different assault vectors, together with exploiting susceptible IoT units or gaming consoles related to the house community. The aim is then to discover a manner again into the company community and its precious digital sources the place knowledge will be stolen, and malware will be unfold to different distant employees. That is particularly damaging as distant employees don’t have the posh of strolling over to the assistance desk to get their computing system restored. If system points can’t be resolved by troubleshooting an issue over the cellphone, it must be mailed in, leaving the worker offline for days.

Getting Again to Fundamentals

As a safety skilled, you perceive the significance of coaching and cyber hygiene. It’s important, nevertheless, that within the present heightened risk panorama we will’t let our guard down. Listed below are 4 key areas to strengthen in your group:

• Implement cybersecurity hygiene: I like to recommend that each one IPS and AV definitions are stored updated on a continuing foundation. Additionally keep a proactive patching routine every time vendor updates turn out to be accessible. If patching a tool is just not possible, we suggest conducting a threat evaluation to find out extra mitigation safeguards.

• Replace essential safety expertise: The best safety technique is to engineer threat out of the system. Be certain that safe electronic mail gateways and internet utility firewalls are geared up with sandboxing and content material disarm and restoration (CDR) applied sciences to determine and block particular file sorts, together with phishing assaults, and disarm threats earlier than they attain the person. And be certain that endpoint units have the most recent endpoint detection and response (EDR) software program to stop lively threats from executing.

• Speed up end-user coaching: Conduct ongoing worker coaching periods to tell them concerning the newest phishing/spear-phishing assaults, and to remind them to by no means open attachments from somebody they don’t know. Finish customers additionally must be educated to identify social engineering assaults, and evaluated utilizing impromptu check emails despatched surreptitiously from the safety workforce by way of electronic mail.

It’s superb how foundational safety rules, constantly applied, may also help defeat the craftiest assault vector. And it’s equally superb how few organizations really do this stuff with any consistency. Nonetheless, by committing to specializing in the three actions laid out above, your group can be significantly better ready to defend in opposition to attackers trying to exploit the pandemic.

Back to Basics: Pandemic Cybersecurity Trends and Solutions
Back to Basics: Pandemic Cybersecurity Trends and Solutions
Back to Basics: Pandemic Cybersecurity Trends and Solutions

Derek Manky is Chief of Safety Insights and International Menace Alliances at Fortinet’s FortiGuard Labs. Derek formulates safety technique with greater than 15 years of cyber safety expertise behind him. His final aim to make a optimistic affect within the world warfare on cybercrime. Manky gives thought management to business, and has offered analysis and technique worldwide at premier safety conferences. As a cybersecurity professional, his work contains conferences with main political figures and key coverage stakeholders, together with regulation enforcement. He’s actively concerned with a number of world risk intelligence initiatives together with NATO NICP, INTERPOL Knowledgeable Working Group, the Cyber Menace Alliance (CTA) working committee and FIRST – all in effort to form the way forward for actionable risk intelligence and proactive safety technique.

Earlier Columns by Derek Manky:
Back to Basics: Pandemic Cybersecurity Trends and SolutionsTags:

internet cyber attack,cyber pandemic,cyber pearl harbor,checkpoint firewall emulator,demopoint,covid-19 cybersecurity,covid-19 cybersecurity statistics,cyber crime during pandemic,coronavirus and cybersecurity,data breach covid-19

You May Also Like


The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of...


On Thursday, April 23rd, 2020, Canonical Ltd, the makers of Ubuntu Linux distribution officially released the long-awaited Ubuntu 20.04 version code-named “Focal Fossa”, it...


As the robot process automation (RPA) market becomes more and more dynamic, more and more companies are trying to integrate RPA into their business...


Virtual Machine Manager is one of the best hypervisors available for the Linux desktop. This is well-designed and well-functioning QEMU/KVM virtualization software that takes...