Malicious COVID-19 Surge



COVID-19 ATTACKS THE WEB




COVID-19 is being used in a variety of malicious campaigns including email spamBEC, malware, ransomware, and malicious domains.  As the number of those afflicted continue to surge by thousands, campaigns that use the disease as a lure likewise increase.


TYPES OF THREATS USING COVID-19:

1.Spam

Coronavirus-related emails with malicious attachments sent to users as early as February 2020



Detected emails claiming to be relief or health organizations asking for donations in bitcoin. The emails were sent by a group claiming to be “COVID19Fund,” which is supposedly associated with legitimate health organizations. They ask for aid and provide a cryptocurrency wallet where people can donate.


                            

2.Malware that Overrides Master Boot Record (MBR)

A coronavirus-themed malware that overrides a systems’ master boot record (MBR), making it unbootable. The malware was detailed in a public report published by the Czech cybersecurity agency (NUKIB). The malware file has "Coronavirus Installer" in the description.

When the malware executes, it will automatically restart the machine and then display a virus-themed window that cannot be closed. The usual exit button on the top right side of the window does not function

The malware also creates a hidden folder named “COVID-19,” which contains several secondary modules. Manually restarting the system will execute another binary file and display the grey screen.


        


3.Malicious Websites

A fake government website has been spotted luring users with the promise of aid or relief. The domain uk-covid-19-relieve[.]com imitating legitimate "gov.uk" sites. It will ask for personal information and collect users’ bank account credentials if they enter a correct postcode.

Virus-related domains hosting malicious files are also still active. The site hxxps://corona-map-data[.]com/bin/regsrtjser346.exe loads the DanaBot banking trojan, which is capable of stealing credentials and hijacking infected systems.

Another recent example is hxxp://coronaviruscovid19-information[.]com/en. The site encourages you to download a mobile application called “Ways To Get Rid of Coronavirus,” promising a cure.



 They use fake streaming sites, or sites offering entertainment promotions to appeal to users. It is spotted the domain hxxps://promo-covid19-neftlix[.]ml, which is actually a phishing site that steals Netflix account credentials. As always, users should always be mindful of websites they regularly use, and to keep credentials to online accounts as private as possible


4.Malicious Social Media Messaging

A scam and phishing tactic circulating online via Facebook Messenger
 
The URL sent through Facebook Messenger is in the form of Short URL, hxxps://bit[.]ly/34phlJE which then redirects to two possible pages. 

First Scenario

If the user is already logged in to their Facebook account, it will simply continue and redirect to a fake Netflix page


This page captures the victim’s Facebook login credentials and creates an active subscription to an app in Facebook named “NeTflix”. The app is simply an indicator that the user has already been compromised. If a user already subscribed to the fake app and clicks on the malicious link again, they will be redirected to a second page, detailed in the next section


Second Scenario

This is the second possibility for would-be victims. Users who have not logged in to their Facebook accounts will be redirected to the Facebook login page


If the user enters their account credentials, it will redirect to the fraud page seen in the first scenario. If the user clicks the “Not now” button, it will redirect to the fake Netflix page, as seen below. The page contains a fake Netflix offer and a survey on the right side with questions about COVID-19 and cleanliness habits. The scammers used free, newly created domains unrelated to Netflix.


Regardless if users click the ‘Send’ or ‘Continue’ button at the end of the survey, it will redirect users to the same page — a Facebook share prompt. In this next step, users are urged again to spread malicious links by clicking a “Share” button for Facebook contacts. Then the user will be prompted to log in to Facebook

Users that enter their Facebook login credentials will be taken to an automatically generated post. Clicking on the “Post” button will post a status about the malicious link on the user’s Facebook page

These two scenarios show that whether the user is already logged in or refuses to give their credentials, they will be pressured into sharing fraudulent links.

These evidences are enough to show that how easily you can breach websites and steal credentials by malicious URL redirects and use Credential stuffing attacks to gain even more control over user's other accounts. So try to be extra cautious while making payments especially to a COVID relief fund, make sure that you fully trust it and shows you a proof of donation.


I shall come up with more cyber tech contents soon

Connect with me on
 LinkedIn
 !!!

 ----------------------------------------------------------------------------------

REFERENCES




0 Comments