Phishing During COVIDBy
The name phishing owes its misspelling to hackers who sometimes rewrite an initial f as ph, as in “phone phreaking.” The metaphoric reference, though, is much more accurate. Phishing involves dropping a line (email, voice mail, or SMS) to an individual for the purpose of angling for personal information or getting a victim to bite on a malware download.
COVID-19 has offered hackers a whole new set of schemes for their phishing attacks, and 2020 was a record year for phishing. More than 60,000 phishing websites were reported in March 2020, and by mid-April 2020, Google’s Threat Analysis Group reported 18 million COVID-19-themed malware and phishing emails per day. What’s even more unfortunate, Security Boulevard’s blog reports, “97% of the users are unable to recognize a sophisticated phishing email.”
What once were simply email requests, often with laughable grammar and spelling, have morphed into a variety of sophisticated attacks. Among the specialized types, spear phishing targets individuals or specific groups such as a company’s system administrators. Whaling targets the biggest fish in the tank, CEOs and CFOs. Smishing uses text messaging (SMS), and vishing uses voice calls instead of email.
The most effective phishing emails are carefully designed to look authentic and sometimes create fear over a matter falsely created by the attacker. A panic response is ideal because it bypasses both thought and suspicion.
In a recent blog posting, the Cupertino, Calif., cybersecurity company Armorblox examined examples of tailored COVID phishing attacks. Here are three of them:
- IRS COVID relief phishing: The subject in the email was “IRS Covid Relief Fund Update,” and it claimed to have an important document about your relief fund check. When you clicked on the link, you were presented a SharePoint form that asked for personal information—Social Security number, driver’s license number, and tax numbers. The SharePoint page was legitimate, and email security filters didn’t block it. The page belonged to an employee of the Reproductive Medicine Associates of Connecticut, which Armorblox said was likely compromised by the attackers. The page has since been taken down.
- IMF COVID compensation scam: Similar to the IRS scam, this attack used an email with the subject line, “Re: IMF Compensation/REF27453.” The body read, “You have been shortlisted for the 2020 IMF COVID-19 Compensation, reply for more details.”
This time, the International Money Fund is cited. Instead of a link, a request is made for an email reply that bypasses email security filters that might catch and block unknown suspicious links. The attackers added a fake email thread of some 125 other beneficiaries who are sharing your good fortune. Some clues about authenticity that might be overlooked are grammatical errors and misspellings and a “reply-to” address that’s different from the “from” address. The errors are: “I understand these is your work email” and “You should proceed and effect further communication towards there compensation rewards (those on the thread).”
- COVID test results scam: This email claims to be an automated message from a doctor’s office with your test results. The email body reassures the victims by including a fake password/PIN that will allow only them to see the results when they click on its link. When they do, however, they’re asked to “update” their information, and a malware-infected RAR (compressed) file is downloaded onto their computer.
Armorblox ends the review of the phishing emails with some advice. Set up two-factor authentication on all personal and business accounts, and subject questionable emails to careful scrutiny. When unsure, verify via phone call or text.