{"id":1767,"date":"2020-07-05T14:49:13","date_gmt":"2020-07-05T14:49:13","guid":{"rendered":"http:\/\/blog.einnosec.com\/?p=1767"},"modified":"2022-02-28T11:21:53","modified_gmt":"2022-02-28T11:21:53","slug":"scammers-exploiting-covid-19-fears-stimulus-checks-fake-cures-charitable-contributions","status":"publish","type":"post","link":"https:\/\/blog.einnosec.com\/index.php\/2020\/07\/05\/scammers-exploiting-covid-19-fears-stimulus-checks-fake-cures-charitable-contributions\/","title":{"rendered":"Scammers Exploiting COVID-19 Fears, Stimulus Checks, Fake Cures"},"content":{"rendered":"\n<p style=\"font-size:18px\">Please check earlier blogs \u201cEasy Fix Remote Work Cyber Security Checklist\u201d, \u201cManagement, Director and Employee Responsibilities\u201d, \u201cCybersecurity COVID 19 Guidelines for Small and Large Businesses\u201d focused on how to secure from cyber-attack as we continue to work remotely. In today\u2019s blog post, we have a few examples of what \u2018s happening around.<\/p>\n\n\n\n<p style=\"font-size:18px\">You must have heard about the \u201cZoombombing\u201d on eLearning classes at Arizona State University and The University of Southern California. To keep it short, Zoom has published a blog post on steps to take to keep would-be crashers out of Zoom meetings. The most important one is that the host should limit the screen sharing to themselves.<\/p>\n\n\n\n<p style=\"font-size:18px\">Attackers often take advantage of current events, money concerns, or certain times of the year. The overwhelming news coverage of COVID19 has created an opportunity for scammers to trick people into sharing their personal data and credentials or spread malware through email attachments. Phishing attacks may appear to come from other types of organizations, such as charities and government agencies.<strong><span class=\"has-inline-color has-very-light-gray-color\"> <\/span><span class=\"has-inline-color has-black-color\">The areas that are likely exploited in such circumstances are:<\/span><\/strong><\/p>\n\n\n\n<ul><li><strong>Stimulus Checks<\/strong><\/li><li><strong>Free offers<\/strong><\/li><li><strong>Refunds and returns<\/strong><\/li><li><strong>Fake cures<\/strong><\/li><li><strong>Access to online platforms \u2013 Netflix, Amazon Prime, Memberships, etc.<\/strong><\/li><li><strong>Announcement from CDC, WHO, etc.<\/strong><\/li><li><strong>Charitable contributions<\/strong><\/li><\/ul>\n\n\n\n<p style=\"font-size:18px\">Phishing emails often look &#8220;official&#8221;, some recipients may respond to them and click into malicious websites resulting in financial losses, identity theft, and other fraudulent activity. <strong>Some quick checks to discover phishing emails<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Hover over Friendly FromURLs contains a misleading domain name. Contains a mismatched URL. Incorrect grammar\/selling plain text\/absence of logosMessage body is an image request for personal information suspicious attachmentsUrgency<\/strong><\/td><td><strong>Email address The message asks for personal information, the offer seems too good to be true you didn\u2019t initiate the actions you are asked to send money to cover expenses message makes unrealistic threatsDetect unusual logins<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p style=\"font-size:18px\"><strong><span class=\"has-inline-color has-black-color\">Below are the examples of phishing emails in circulation that you can take note of:<\/span><\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\"><strong><span class=\"has-inline-color has-black-color\">Email 1 &#8211; Access to online platforms<\/span><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"842\" height=\"717\" src=\"http:\/\/blog.einnosec.com\/wp-content\/uploads\/2020\/07\/scammer-1.jpg\" alt=\"\" class=\"wp-image-1769\"\/><\/figure>\n\n\n\n<p style=\"font-size:18px\"><strong><span class=\"has-inline-color has-black-color\">Email 2 \u2013 Fake Medical Supplies<\/span><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"782\" height=\"522\" src=\"http:\/\/blog.einnosec.com\/wp-content\/uploads\/2020\/07\/scammer-2.jpg\" alt=\"\" class=\"wp-image-1770\"\/><\/figure>\n\n\n\n<p style=\"font-size:18px\"><strong><span class=\"has-inline-color has-black-color\">Email 3 &#8211; World Health Organization and Center for Disease Control Emails posted on Berkeley Security Education site<\/span><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"840\" height=\"441\" src=\"http:\/\/blog.einnosec.com\/wp-content\/uploads\/2020\/07\/scammer-3.jpg\" alt=\"Coronavirus phishing email example #1\" class=\"wp-image-1771\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"841\" height=\"405\" src=\"http:\/\/blog.einnosec.com\/wp-content\/uploads\/2020\/07\/scammer-4.jpg\" alt=\"\" data-id=\"1772\" data-link=\"http:\/\/blog.einnosec.com\/?attachment_id=1772\" class=\"wp-image-1772\"\/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Please check earlier blogs \u201cEasy Fix Remote Work Cyber Security Checklist\u201d, \u201cManagement, Director and Employee Responsibilities\u201d, \u201cCybersecurity COVID 19 Guidelines for Small and Large Businesses\u201d&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2707,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[81],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1767"}],"collection":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/comments?post=1767"}],"version-history":[{"count":4,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1767\/revisions"}],"predecessor-version":[{"id":2561,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1767\/revisions\/2561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/media\/2707"}],"wp:attachment":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/media?parent=1767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/categories?post=1767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/tags?post=1767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}