Select Page

Coronavirus & Ransomware Infection – What’s the Connection?

Coronavirus claims more lives with each passing day. The pandemic has affected more than 200 countries with thousands of cases appearing daily.  While the world worries over health concerns, preventive and protective measures from Coronavirus, scammers and hackers have already begun to make their move in the form of phishing emails.

Every time something “global” happens, for instance the finale of a popular TV show or a natural disaster, scammers capitalize on it using socially engineered email attacks (phishing scams).

 

What are phishing emails and how are they related to Coronavirus?

Phishing emails (or phishing scams) are socially engineered email attacks that engage readers into clicking on links, download attachments, or sharing login credentials.

As everyone is concerned about Coronavirus, scammers are using this as an opportunity to send emails that pose vital information about preventive measures. This email is tailor-made to strike nerves and get the recipient to download an attachment or click on a link.

The damage dealt by phishing emails vary. Clicking on a link in or downloading an attachment from a phishing email can lead to the following scenarios:

  • Compromise login credentials of the server, workstation, and email account, etc.
  • Successful ransomware attack – ransomware infection that compromises all systems and servers connected to the network
  • Compromise Personally Identifiable Information (PII) such as social security information, account information, credit card information, etc.

Such type of phishing emails aren’t just related to the Coronavirus. As mentioned earlier, similar attacks have been witnessed in the past. In fact, phishing emails are one of the primary reasons of data breaches, malware or ransomware infection, and data loss.

Damage Dealt by Phishing Emails in the Past

Here are some phishing email statistics that are sure to raise some serious concerns:

  • 70% nation-state or state-affiliated data braches involve phishing (Source)
  • 66% of successful malware infections are caused via email attachments (Source)
  • 64% organizations have experienced phishing attacks in the past year (Source)
  • 21% ransomware attacks involved phishing scams (Source)

You can find information about how to protect yourself from coronavirus from authentic sources such as the World Health Organization (WHO) and stay safe.

 

Recent COVID-19 Scam Attempts

Here’s a brief list of COVID-19 scam attempts experienced by businesses worldwide:

COVID-19 Scam Email that says “You Might be Infected”

Coronavirus & Ransomware Infection – What’s the Connection?

Screenshot of the COVID-19 Scam Email with Excel Attachment (Source: KnowBe4)

Email that says “you’re infected” with an excel sheet email attachment. When downloaded, the sheet prompts users to enable contact to see the sheet details. When allowed, the sheet infects the system with a virus using a Trojan downloader.

COVID-19 Scam Email Disguised as Official Correspondence from SBA

Coronavirus & Ransomware Infection – What’s the Connection?

Screenshot of the COVID-19 Scam Email Disguised as Official Correspondence from SBA (Source: IBM X-Force)

Email disguised as official correspondence from the Small Business Association (SBA). This is a particularly socially engineered scam that follows the same procedure as the SBA. It claims to provide SMBs with application number with which they can apply for a “small business disaster assistance grant”. All they needed to proceed was sign an attached document. When complied however, the email downloads a sample of the Remcos remote access Trojan (RAT).

COVID-19 Scam Email Targeted at Canadian Businesses

Coronavirus & Ransomware Infection – What’s the Connection?

Screenshot of COVID-19 Scam Email Disguised as a Grant for Canadian Businesses (Source: IBM X-Force)

Scam email targeted at Canadian businesses. This COVID-19 scam disguised itself as a grant from Justin Trudeau for businesses who decided to stay at home during the Coronvairus crisis. The email prompts users to download an attachment that is to be submitted as a voucher to claim the grant. When downloaded however, the macro code in the document infects the system with Zeus Sphinx malware.

Coronavirus-themed Wiper

Coronavirus & Ransomware Infection – What’s the Connection?

Screenshot of coronavirus.bat (Source: SonicWall)

While many nefarious individuals focused on phishing scams to collect personal information others simply made business data inaccessible for their victims. Such was the case with the coronavirus-themed wiper: “coronavirus.bat”. This particular coronavirus installer disabled access to the Windows Task Manager, User Access Control (UAC), and options for modifying the desktop. When installed and the system rebooted, the wiper loaded a binary responsible for overwriting the MBR.

But how can you, as a business owner or data owner, make sure that your data is safe from such phishing emails and ransomware attacks? StoneFly can help you with that.

How to protect data from Coronavirus phishing emails & ransomware attacks?

There are two major ways to protect your data from Coronavirus phishing emails and consequent ransomware attacks:

  1. Educate your staff
    • Everyone should have basic knowledge of phishing emails and how to identify them.
    • Write and share a “dos and donts” instruction manual that clearly defines what people need to do when they get a phishing email
    • Hold regular webinars and training sessions updating everyone about the latest types of phishing attempts
  2. Back up your mission-critical data
    • Use reliable enterprise backup software: Veeam, Acronis, etc.
    • Store redundant backup copies on multiple locations and multiple storage media
    • Set up disaster recovery for production environments

How StoneFly can Help

We offer purpose-built backup and Disaster Recovery (DR) solutions that include:

As the leading innovator in the backup and disaster recovery industry, we take pride in our ability to build economical, high performance, and robust systems custom-built for enterprise workloads.

To learn about how StoneFly can help you with your data protection needs, contact us.

Conclusion – Don’t Let Coronavirus become the Reason for a Successful Ransomware Attack

Coronavirus is a real worldwide concern. Opportunistic scammers and hackers are using it to attack enterprise infrastructure using phishing emails and ransomware.

While this is the time to focus on your care and stay safe from Coronavirus; you cannot allow scammers to hold your data for ransom or compromise your business data in any other way.

So start taking pre-emptive measures right away! Educate your staff and back up critical information using StoneFly’s enterprise-grade backup and disaster recovery solutions.

Related Resources:

Listen to the StoneCast Session about COVID-19 Scams

Download Audio | Play in New Window

StoneFly, Inc COVID-19 Response

Read Press Release

Zero Trust: Enterprise Security for Ransomware Protection

Zero Trust: Enterprise Security for Ransomware Protection

Zero Trust is a fundamental shift in cybersecurity, challenging conventional notions of trust within organizational networks. As ransomware attacks and cyber threats evolve in complexity and scope, the Zero Trust model emerges as a critical strategy to ensure...

Malvertising: The Dark Side of Online Advertising

Malvertising: The Dark Side of Online Advertising

Malvertising—once a shadowy threat lurking on the fringes of cybersecurity discourse—has emerged as a formidable adversary, directly targeting enterprises in the digital arena. As businesses increasingly rely on online advertising to connect with their audience,...

Conti Ransomware: In-Depth Technical Breakdown

Conti Ransomware: In-Depth Technical Breakdown

Conti ransomware has earned notoriety, notably for its involvement in the Costa Rican government hack. Operating as a ransomware-as-a-service (RaaS) group, Conti specializes in infiltrating networks, encrypting crucial data, and extorting exorbitant sums of money. In...

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply chain attacks have emerged as a formidable threat vector in the landscape of cybercrime, posing significant risks to enterprises of all sizes and industries. Among the various tactics employed by threat actors, ransomware attacks leveraging supply chain...

How to Set Up S3 Object Storage for Veeam Data Platform

How to Set Up S3 Object Storage for Veeam Data Platform

Veeam v12 introduced Direct-to-Object storage, enabling S3 object storage as the primary backup repository. Prior to this, S3 object storage integration relied on Veeam's Scale-Out Backup Repository (SOBR), using a performance tier and a capacity tier, which extended...

You May Also Like

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email