sb-nz logo
Story image

What will stop COVID-19 cyber attacks? Technology and education

As threats increase during the COVID-19 pandemic, businesses need to be focused on implementing technological solutions and investing in employee education to achieve basic security hygiene, according to Wavelink, a Fortinet distributor.

This time, which has brought up confusion, fear and distress for individuals and seen many businesses move to remote working, has given cyber criminals greater opportunities to succeed in various attacks and scams.

Wavelink states that scams including fake emails, text messages, phone calls and fraudulent products are all on the rise. However, social engineering scams are most likely to succeed during this time so it’s particularly important to be aware of new threat activity and protect the organisation against it.

In addition to fringe actors, professional cyber criminal organisations are also taking advantage of the situation. Wavelink has identified various attacks, including the following.

The Emotet trojan, which steals sensitive and private information such as banking details, and can cost upwards of US$1 million per incident to clean up.

BabyShark, a relatively new North Korean malware that persistently exfiltrates system information and receives additional commands.

The Ukrainian Centre for Public Health spoof, which impersonates the World Health Organisation trademark to lure users into opening a malicious Word document.

An Italian phishing attack that warns the recipient that COVID-19 cases in their region have been documented and the recipient should urgently open the attached, malicious Word document.

A FedEx customer advisory email that looks like a PDF document but is, in fact, an executable file that infects the user with the Lokibot infostealer.

Wavelink states that organisations should be investing in smart security solutions to protect against threats such as this as well as everyday scams.

For a start, organisations should look at updating their anti-virus and intrusion protection system definitions regularly. In addition, they should proactively patch with vendor updates where available.

Secure mail gateway solutions, which flags specific file types likely to be malicious, and sandbox solutions, which enables IT teams to identify if a file displays irregular behaviour, can be useful.

Furthermore, a firewall with anti-virus can also be configured to detect and block threats.

Alongside technology solutions, businesses should be looking at employee training and education.

Wavelink managing director Ilan Rubin says, “Technology can only go so far to protect an organisation against attack in such chaotic and challenging times. With more employees working outside the corporate firewall for perhaps the first time, businesses need to be more vigilant than ever in making sure these employees understand the importance of basic security hygiene.

"This includes never opening attachments from someone they don’t know and always treating emails from unrecognised senders with an abundance of caution."

When it comes to specific employee training, Rubin says, “Employees should be trained to be sceptical of instructions in emails, text messages, or even phone calls that require them to click on a link, open an attachment, provide login details, or transfer funds. If in doubt, users should contact their IT or information security department to verify if an email is legitimate."

Rubin says this is a crucial time for organisations to up their security game.

He says, “Right now there are so many legitimate pieces of communication regarding COVID-19 that it’s very easy to slip in some phishing emails and other fake communications. This has created a significant vulnerability that attackers have been quick to exploit.

“People are hungry for information while organisations are looking for products that can help protect them against the virus. This has seen a dramatic rise in attacks that put malicious links in legitimate-looking emails purporting to be from government agencies or news outlets, for example.”

Rubin says, “If people stay vigilant and refuse to trust suspicious emails, then, at worst, a business activity may be delayed. At best, an expensive and potentially devastating cyberattack could be averted. Now more than ever, individuals play a crucial role in protecting an organisation against cyberattacks.”

Story image
80% of security breaches involve exposure of customer data - IBM
The new report from IBM indicates that 80% of surveyed organisations reported having exposed customers’ personally identifiable information (PII) as a result of a breach.More
Story image
Why greater network visibility is needed to reduce the threat posed by IoT in the enterprise
At home and abroad, organisations have joined the rush to embrace Internet of Things (IoT) technology, but a new survey shows they’re only just beginning to wake up to the enormous risk those devices pose, writes ExtraHop A/NZ Regional Sales Manager Glen Maloney.More
Link image
True SASE. True zero trust. True cloud.
Secure Access Service Edge (SASE) is the new way of unifying security. Use the combined power of threat protection and data loss prevention to protect data, users, and systems safe when people are now working from almost anywhere.More
Story image
Fortinet reports total revenue of $615.5 million
Strong demand for secure SD-WAN and work-from-home capabilities helped power 18% second quarter revenue growth. More
Story image
Just 6,000 accounts responsible for over 100,000 email attacks - report
Barracuda has today released a report detailing how 6,170 malicious accounts that use Gmail, AOL, and other email services were responsible for more than 100,000 business email compromise (BEC) attacks on nearly 6,600 organisations. More
Story image
Tanium and Google Cloud bring greater security to distributed IT
“This joint solution with Chronicle gives Tanium customers access to massively scalable analytics and investigation capabilities far beyond that of other endpoint detection and response point tools."More