Our Plan For Coronavirus

Gone Phishing – Coronavirus update

Phishing advice from PAAC IT

Corona Virus Update

There has been a recent uptick in the number of phishing scams related to the Corona virus and the Covid-19 disease it causes. It seems there are many people in our world with few morals. So we have updated this post from a while ago to include some specific pointers relating to Corona virus phishing emails.

According to recent report there have been more than 500 corona virus related scams, more than 2,000 phishing emails which have defrauded people out of around £1.6m!

  • Emails from disease control centers such as the American CDC. The email might falsely claim to link to a list of corona virus cases in your area. “You are immediately advised to go through the cases above for safety hazard,” the text of one phishing email reads.
  • Health advice emails from organisations purporting to offer help and encouraging you to  “Use the link below to download Safety Measures.”
  • Messages supposedly from the Government fining the recipient £250 for leaving their home more than once during the lockdown;
  • Emails from scammers claiming to offer a list of Covid-19 infected residents in your area in exchange for Bitcoin payment;
  • Workplace Policy Emails. The bad guys have been hacking company accounts and sending out emails that appear to come from Directors. One phishing email begins, “All, Due to the corona virus outbreak, [company name] is actively taking safety precautions by instituting a Communicable Disease Management Policy.” If you click on the fake company policy, you’ll download malicious software.
  • Email encouraging people to donate to a fake World Health Organisation COVID-19 Response Fund

All the precautions to take and ways to avoid getting stung are in our post below.

Keep current with our “How to” guides and top tips through our IT Insights newsletter.

Covid 19 virus image

Introduction

Fraudsters have been using so called phishing attacks for over 3 decades now, and they have got pretty good at it.  As email users have got wise to the ‘Nigerian prince’ and ‘my friend is stuck abroad’ fraudsters have upgraded their scams to look and behave like the rest of the emails hitting your inbox.  The goal is simple, get you to click on a link and enter some personal details or transfer funds.  To achieve this goal, they must convince you that the email sent is genuine and there is a good reason for you entering your details.  Once they have captured your personal information, they may use it to launch further attacks on you or your contacts, or simply sell the information on the dark web- for a hack to use another day.

Victims may be employees of an enterprise or simply individuals. The emails often target people’s emotions –  in previous years, PhishMe reported that fear, urgency and curiosity were the top emotional motivators behind successful phishes. Now they’re closer to the bottom, replaced by entertainment, social media and reward/recognition.

We’ve written this article to help you understand how fraudsters operate so you can protect yourself and your organisation. We have presented a few real examples below followed by the different types of attack and wrap up with actions you can take yourself. Security software can be added to the defensive arsenal, but in this article, we have focused on things individuals can do to protect themselves.

You’ve won!!! .. or maybe not

  • A WhatsApp message has been doing the rounds across the world over several years and in different languages suggesting that Adidas is offering 5000 pairs of shoes to celebrate its xxx anniversary, followed by a link from which to obtain the free shoes. Unfortunately the victims just provided their contact details and payment arrangements to the scammers.
  • The BBC reported in November 2018 “University students have been bombarded with fake tax refund emails in the last month, HM Revenue and Customs (HMRC) has warned. It is estimated that hundreds of thousands of students have been targeted in a bid to steal their banking and personal details.”
  • A member of staff at one of our clients received an email from his boss instructing him to transfer £20k to a specified bank account. The email looked genuine, but the staff member followed protocol and checked with his boss by phone. Disaster averted.
  • An interior decorator emailed their customer an invoice for services rendered. Before their customer could pay, the customer received a second email purportedly from the interior decorator specifying a different account. Unfortunately, they paid, despite the new bank account being in Mexico – money gone!
  • While at my previous employer, I received an email from “UPS” about a parcel delivery. As I was expecting a parcel I clicked on the link – bad mistake. My PC was totally infected by malware and I received and mail from corporate security “disconnect from the network and take your PC to IT support NOW for a complete rebuild”.

Phishing Examples from PAAC IT

How to Phish

Just like real fishing, phishing has become very sophisticated with lots of different techniques, baits and lures.

Standard Phishing Attacks

Standard phishing attacks are broad and not personalised using general email messages to carry out the attacks. They use very common themes or lures in a generalised way in conjunction with a large enough pool of targets. The idea is that by chance some percentage of the phishing emails will look legitimate enough to the recipient to be successful. Hence using a giveaway or prizes from well known brands such as the Adidas example above.

Spear Phishing Attacks

Like its name implies, spear phishing is a more refined and targeted form of phishing. Fraudsters use themes or lures that are in some way relevant or appropriate to the victim – an individual, specific employees in an organisation or an organisation itself. The fraudsters have often done their homework to learn about their intended victim. For example, the email could appear to come from organisations (such as banks, your mobile provider or TV service provider) you trust and contain some information about you. Because the malicious email has a context for the target, you are more likely to trust it and open the email message and any attachments.

Conversation Hijacking

This approach involves a fraudster hacking someone’s email account. For example, Sharon and Jim are conducting an email conversation. A bad guy, Charlie, carries out an attack and gains complete control of Jim’s email account, often by theft of login credentials, such as a password. Once Charlie has access to Jim’s email account, he can continue the email discussion as if he were Jim with Sharon being totally unaware and prepared to trust anything she receives from “Jim”.

This is a highly sophisticated, labour intensive, focused attack, so its not something that most individuals need to worry about. But it has happened to another of our business clients.

Man in the middle attacks

In this case you may receive an email apparently from your bank or service provider, asking you to log in to your account to confirm your contact information. You click on a link in the email and are taken to what appears to be your bank’s / service provider’s website, where you log in and perform the requested task. Scammed!!

In such a scenario, the man in the middle sent you the email, making it appear to be legitimate. (This attack also involves phishing, getting you to click on the email appearing to come from your bank.) The attacker also created a website that looks just like your bank’s website, so you wouldn’t hesitate to enter your login credentials after clicking the link in the email. But when you do that, you’re not logging into your bank account, you are handing over your credentials to the attacker.

What can you do?

There are so many of these scams around today and they all look so real it can be very difficult to differentiate from genuine emails.

Here are ten key things to look out for:

  1. Generic and informal greetings – a lack of personalisation and formality is typical of phishing scams;
  2. A request for personal information – the core element in most phishing scams;
  3. Poor grammar – spelling mistakes, typos and unusual phrasing is indicative of a fraud. In one version of the Adidas scam for example, Adidas was spelt without the “dot” on the “i” – very subtle;
  4. Shortened links – fraudsters often use Bitly and other URL shortening services to make you think you are clicking a legitimate link. Hover your mouse of the link in the email to see where you are really being directed to;
  5. Out of the blue correspondence – unsolicited contact from your bank or a service provider, for example, is highly unusual;
  6. Unexpected attachments – as with above, if you’re not expecting something, think twice before you open – and even if you are expecting the mail, is it something you would expect to be asked?
  7. A sense of urgency or fear – be wary of statements like “click today” “get in touch asap” or “you owe HMRC”;
  8. Striking gold – if it is too good to be true, then it is too good to be true
  9. Peculiar domain names – Why would an English bank send you emails from Peru or a UK firm ask for a deposit to a Mexican bank account?
  10. HTTPS websites are not necessarily genuine – we have been taught the websites showing “HTTPS” are secure – they are and the traffic between your device and the website is encrypted. But the fraudster may have set up their own fake “HTTPS” website.

A classic defense strategy in football is “if in doubt, kick it out”. Very sage advice if you are unsure of the email pedigree you are about to click on.

Be safe out there!

Keep current with our “How to” guides and top tips through our IT Insights newsletter.

About Us

We provide supportive leadership enabling our business community to succeed and prosper through effective use of IT and Technology. PAAC IT is an IT Company in Surrey offering small businesses the personal attention and care that their IT systems deserve. If your company has between 1 and 100 employees and need a IT Company in Surrey we would love to hear from you!

Find out more