Previous All Posts Next

How Hackers Exploit Coronavirus Fears: Stay Protected

Posted: March 27, 2020 to News.

Tags: Cloud Security, Malware, Work from Home, Data Breach

Hackers have wasted no time in exploiting the chaos being wreaked on the world by the Coronavirus by hijacking routers and changing DNS settings to redirect their targets to fake Coronavirus apps and infecting their devices with Oski malware that steals their information.  So far, over 1,000 victims have been reported. Though the scam started on March 18, it has seen a major increase in the past week, as the pandemic has worsened.  And the attacks are expected to only grow in numbers, especially here in the US, the newest Coronavirus epicenter.  In fact, according to Bitdefender's Liviu Arsene:
“We estimate that the number of victims is likely to grow in the coming weeks, especially if attackers have set up other repositories, whether hosted on Bitbucket or other code repository hosting services, as the Coronavirus pandemic remains a ‘hot topic...'"

How does it work?

Hackers target routers with brute forcing remote management credentials, especially people using Linksys routers. They then hijack the router and change the DNS IP addresses and when the victim types in web address, DNS services send them to the "fake" IP address they created to serve that domain name.  Now that the cyber criminals have control over DNS settings, tey are able to change the DNS IP addresses, and thus redirect their unknowing victims to [.]attacker-controlled sites. Some of the domains targeted by the hacker for redirection include:
  • aws.amazon[.]com
  • bit[.]ly
  • cox[.]net
  • disney[.]com
  • fiddler2[.]com
  • goo[.]gl
  • imageshack[.]us
  • pubads.g.doubleclick[.]net
  • tidd[.]ly
  • redditblog[.]com
  • ufl[.]edu
  • washington[.]edu
  • winimage[.]com
  • xhamster[.]com
The attackers are able to redirect the unwitting users  attempting to access one of the above (valid) websites to a list of their Coronavirus-themed (malicious) websites.   When the victim clicks on any of the domains, the site displays a fake WHO message instructing the target to install and download an app that pretends to offer Coronavirus information but is, in reality, carrying Oski malware.

What can you do?

With social distancing in full effect, the number of people working from home has sky-rocketed, leaving many workers vulnerable to the attack. To protect yourself, we have created a list of actions you can take that work in tandem as layers of cyber protection.  Download the guide here, and feel free to share with your coworkers and any other friends or family you have who are working from home during these difficult times.  You can also call us at 919-422-2607 or click here to schedule a free consultation with Craig about fortifying your home office.

Related Resources

Learn more about how Petronella Technology Group can help:

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Need Cybersecurity or Compliance Help?

Schedule a free consultation with our cybersecurity experts to discuss your security needs.

Schedule Free Consultation
Previous All Posts Next
Free cybersecurity consultation available Schedule Now