As the current pandemic crisis has scaled across the globe, there has already been a surprisingly large number of cyber crime related incidents. Cybercriminals are using the novel COVID-19 issue as a base for their attacks, which includes spreading malware through files containing information about Coronavirus, fake news to spread worldwide fear, panic, and even scams related to masks or cures.

Researchers have found pdfs, mp4s and Docx files camouflaged as documents connected with the virus. The files are advertised to have some instructions or advice about the virus and even remedies that are completely false.

The malicious files can destroy, block, modify, or copy the data of victims’ machines. Moreover, these threats are capable of interfering with the operation of computers and their networks.

Following are the names detected for the malicious files:

  •  Worm.VBS.Dinihou.r
  •  Worm.Python.Agent.c
  •  UDS:DangerousBoject.Multi.Generic
  •  Trojan.WinLNK.Agent. gg
  •  Trojan.WinLNK.Agent.ew
  •  HEUR:Trojan.WinLnk.Agent.gen
  •  HEUR:Trojan.PDF.Badur.b

A recent campaign had been identified, where the attackers target industries such as manufacturing, industrial, finance, transportation, pharmaceutical and cosmetics.

Attackers, in this case, are sending malicious emails to the victims warning them about the impact of the coronavirus on their respective industries. The emails contain a Word document attachment that will help in exploiting a Microsoft Office vulnerability discovered back in 2017 which drops AZORult information-stealing malware.

For further details, click the download button below!

DOWNLOAD ATTACHMENT