An Interpol assessment of the impact of COVID-19 on cybercrime has shown a significant target shift from individuals and small businesses to major corporations, governments and critical infrastructure.
The report shows that, with organisations and businesses rapidly deploying remote systems and networks to support staff working from home, criminals are also taking advantage of increased security vulnerabilities to steal data, generate profits and cause disruption.
In one four-month period (January to April) some 907,000 spam messages, 737 incidents related to malware and 48,000 malicious URLs, all related to COVID-19, were detected by one of Interpol’s private sector partners.
Key findings from the assessment of the cybercrime landscape in relation to the COVID-19 pandemic include:
- online scams and phishing: threat actors have revised their usual online scams and phishing schemes. By deploying COVID-19-themed phishing emails, often impersonating government and health authorities, cybercriminals entice victims into providing their personal data and downloading malicious content. Around two-thirds of member countries that responded to the global cybercrime survey reported a significant use of COVID-19 themes for phishing and online fraud since the outbreak.
- disruptive malware (ransomware and DDoS): cybercriminals are increasingly using disruptive malware against critical infrastructure and healthcare institutions, due to the potential for high impact and financial benefit. In the first two weeks of April 2020, there was a spike in ransomware attacks by multiple threat groups who had been relatively dormant for the past few months. Law enforcement investigations show the majority of attackers estimated quite accurately the maximum amount of ransom they could demand from targeted organisations;
- data harvesting malware: the deployment of data harvesting malware such as Remote Access Trojan, info stealers, spyware and banking Trojans by cybercriminals is on the rise. Using COVID-19-related information as a lure, threat actors infiltrate systems to compromise networks, steal data, divert money and build botnets;
- malicious domains: taking advantage of the increased demand for medical supplies and information on COVID-19, there has been a significant increase of cybercriminals registering domain names containing keywords, such as “coronavirus” or “COVID”. These fraudulent websites underpin a wide variety of malicious activities including C2 servers, malware deployment and phishing. From February to March 2020, a 569% growth in malicious registrations, including malware and phishing, and a 788% growth in high-risk registrations were detected and reported to Interpol by a private sector partner;
- misinformation: an increasing amount of misinformation and fake news is spreading rapidly among the public. Unverified information, inadequately understood threats and conspiracy theories have contributed to anxiety in communities and in some cases facilitated the execution of cyberattacks. Nearly 30% of countries, which responded to the survey, confirmed the circulation of false information related to COVID-19. Within a one-month period, one country reported 290 postings of which the majority contained concealed malware. There are also reports of misinformation being linked to the illegal trade of fraudulent medical commodities. Other cases of misinformation involved scams via mobile text-messages containing “too good to be true” offers such as free food, special benefits, or large discounts in supermarkets.
Future primary areas of concern highlighted by the report include:
- a further increase in cybercrime is highly likely in the near future. Vulnerabilities related to working from home and the potential for increased financial benefit will see cybercriminals continue to ramp up their activities and develop more advanced and sophisticated modi operandi;
- threat actors are likely to continue proliferating coronavirus-themed online scams and phishing campaigns to leverage public concern about the pandemic;
- Business email compromise schemes will also likely surge due to the economic downturn and shift in the business landscape, generating new opportunities for criminal activities; and
- when a COVID-19 vaccination is available, it is highly probable that there will be another spike in phishing related to these medical products as well as network intrusion and cyberattacks to steal data.
To read Interpol’s summary on its website and to access the full report, click here.