Healthcare


  • State-backed phishing targets U.S. Government employees with fast food lures

    April 22, 2020

    More than a dozen state-backed hacking groups are actively targeting U.S. Government employees and healthcare organizations in phishing campaigns that use lures designed to take advantage of the fears surrounding the COVID-19 pandemic. “TAG has specifically identified over a dozen government-backed attacker groups using COVID-19 themes as lure for phishing and malware attempts—trying to get their targets to ...

  • APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management

    April 22, 2020

    From at least January to April 2020, suspected Vietnamese actors APT32 carried out intrusion campaigns against Chinese targets that Mandiant Threat Intelligence believes was designed to collect intelligence on the COVID-19 crisis. Spear phishing messages were sent by the actor to China’s Ministry of Emergency Management as well as the government of Wuhan province, where COVID-19 ...

  • German government might have lost tens of millions of euros in COVID-19 phishing attack

    April 18, 2020

    The government of North Rhine-Westphalia, a province in western Germany, is believed to have lost tens of millions of euros after it failed to build a secure website for distributing coronavirus emergency aid funding. The funds were lost following a classic phishing operation. Cybercriminals created copies of an official website that the NRW Ministry of Economic Affairs had set ...

  • Gamaredon APT Group Use Covid-19 Lure in Campaigns

    April 17, 2020

    Gamaredon is an advanced persistent threat (APT) group that has been active since 2013. Their campaigns are generally known for targeting Ukrainian government institutions. From late 2019 to February of this year, researchers published several reports on Gamaredon, tracking the group’s activities. In March, we came across an email with a malware attachment that used the ...

  • Malicious Attackers Target Government and Medical Organizations With COVID-19 Themed Phishing Campaigns

    April 14, 2020

    Despite prior reporting by various sources indicating that some cyber threat attacker activity may subside in some respects during the COVID-19 pandemic, Unit 42 has observed quite the opposite with regard to COVID-19 themed threats, particularly in the realm of phishing attacks. While the various COVID-19 themed phishing campaigns observed by Unit 42 are numerous, this blog ...

  • Hackers struggle morally and economically over Coronavirus

    April 9, 2020

    With the Coronavirus pandemic in full swing, threat actors are torn about how they should operate during the pandemic, and like everyone else, are also seeing a downturn in the underground hacker marketplace. In mid-March, BleepingComputer asked numerous ransomware operators whether they would stop targeting health care companies during the Coronavirus pandemic. Some operators stated they would no ...

  • Europol: Catching The Virus Cybercrime, Disinformation And The COVID-19 Pandemic

    April 6, 2020

    Cybercriminals have been among the most adept at exploiting the COVID-19 pandemic for the various scams and attacks they carry out. With a record number of potential victims staying at home and using online services across the European Union (EU) during the pandemic, the ways for cybercriminals seeking to exploit emerging opportunities and vulnerabilities have multiplied. Read ...

  • Spearphishing Campaign Exploits COVID-19 To Spread Lokibot Infostealer

    April 3, 2020

    Researchers have discovered threat actors once again capitalizing on the COVID-19 pandemic and current attention on the World Health Organization (WHO) with a new spearphishing email designed to spread the LokiBot trojan sent using the WHO trademark as a lure. Researchers at FortiGuard Labs on March 27 first observed the malicious COVID-19-themed scam, which claims to ...

  • Zeus Sphinx Banking Trojan Arises Amid COVID-19

    March 30, 2020

    According to researchers Amir Gandler and Limor Kessem at IBM X-Force, Sphinx (a.k.a. Zloader or Terdot) began resurfacing in December. However, the researchers observed a significant increase in volume in March, as Sphinx’s operators looked to take advantage of the interest and news around government relief payments. First seen in August 2015, Sphinx is a modular ...

  • Social Engineering Based on Stimulus Bill and COVID-19 Financial Compensation Schemes Expected to Grow in Coming Weeks

    March 27, 2020

    Given the community interest and media coverage surrounding the economic stimulus bill currently being considered by the United States House of Representatives, we anticipate attackers will increasingly leverage lures tailored to the new stimulus bill and related recovery efforts such as stimulus checks, unemployment compensation and small business loans. Although campaigns employing themes relevant to ...

  • Cyber criminals shift focus to target remote workers

    March 27, 2020

    Criminals are only just getting started when it comes to exploiting the global spread of coronavirus to profit from hacking and cybercrime, and the number of attacks is likely to rise, Europe’s law enforcement agency Europol has warned. The new report on how criminals profit from the COVID-19 pandemic details the increase in coronavirus-themed attacks, including phishing emails and spam ...

  • Ryuk Ransomware Keeps Targeting Hospitals During the Pandemic

    March 26, 2020

    The Ryuk Ransomware operators to continue to target hospitals even as these organizations are overwhelmed during the Coronavirus pandemic. Last week BleepingComputer contacted various ransomware groups and asked if they would target hospitals and other healthcare organizations during the pandemic. With the amount of strain healthcare organizations are under during this pandemic, I was hoping that ransomware operators would ...

  • Paging A Joint Task Force: Cyber Defense Of Pandemic Medical Infrastructure

    March 24, 2020

    The ongoing global response to COVID-19 infections has become a critical public health, economic, and national security priority. The crisis has been made worse by ransomware and other disruptive intrusion incidents, threatening the continued provision of healthcare services to patients affected by the disease. U.S. Health and Human Services disclosures of known data breaches — even prior ...

  • Developing Story: Coronavirus Used in Malicious Campaigns

    March 20, 2020

    The coronavirus disease (COVID-19) is being used in a variety of malicious campaigns including email spam, BEC, malware, ransomware, and malicious domains.  As the number of those afflicted continue to surge by thousands, campaigns that use the disease as a lure likewise increase. Trend Micro researchers are periodically sourcing for samples on coronavirus-related malicious campaigns. This report also includes ...

  • UK Department for Business, Energy and Industrial Strategy is looking for organisations who can support in the supply of ventilators and ventilator components

    March 20, 2020

    The Department for Business, Energy and Industrial Strategy (BEIS) is looking for organisations who can support in the supply of ventilators and ventilator components across the United Kingdom as part of the Government’s response to COVID-19. These questions aim to identify the suitability and readiness of organisations to be involved in the initiative. There are three ...

  • APT36 Taps Coronavirus as ‘Golden Opportunity’ to Spread Crimson RAT

    March 17, 2020

    A Pakistani-linked threat actor, APT36, has been using a decoy health advisory that taps into global panic around the coronavirus pandemic to spread the Crimson RAT. The functionalities of the Crimson RAT include stealing credentials from victims’ browsers, capturing screenshots, collecting anti-virus software information, and listing the running processes, drives and directories from victim machines. The ...

  • Oxford University infectious disease experts provide evidence for a coronavirus mobile app for instant contact tracing

    March 17, 2020

    For Immediate Release Oxford University – 17 March 2020: A team of medical research and bioethics experts at Oxford University are supporting several European governments to explore the feasibility of a coronavirus mobile app for instant contact tracing. If rapidly and widely deployed, the infectious disease experts believe such an app could significantly help to contain the ...

  • Hackers attacked a US health agency’s computer system in an attempt to slow down its COVID-19 response

    March 16, 2020

    As the US ramps up its response to the spread of COVID-19, the Health and Human Services Department was hit with a cyberattack, according to a new report from Bloomberg. Citing three unnamed sources familiar with the matter, Bloomberg reported that the cyberattack aimed to slow down HHS computer systems Sunday night, but were unsuccessful in ...

  • Dutch government loses hard drives with data of 6.9 million registered donors

    March 11, 2020

    The Dutch government said it lost two external hard disk storage devices that contained the personal data of more than 6.9 million organ donors. The hard drives stored electronic copies of all donor forms filed with the Dutch Donor Register between February 1998 to June 2010, officials from the Dutch Minister of Health, Wellness, and Sport ...

  • Nasty phishing scams aim to exploit coronavirus fears

    March 6, 2020

    Cyber criminals are aiming to take advantage of fears over coronavirus as a means of conducting phishing attacks and spreading malware, along with stealing login credentials and credit card details. Cybersecurity companies have identified a number of campaigns by hackers who are attempting to exploit concerns about the COVID-19 outbreak for their own criminal ends. Crooks often use ...