Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

We’re Seeing an Increase in COVID-19-Related Cyberattacks

We’re Seeing an Increase in COVID-19-Related Cyberattacks

Since the beginning of the COVID-19 situation in March, creating a vaccine has been a major priority. True to form, hackers have begun targeting the very organizations responsible for the vaccine trials. There’s a lesson to be learned, today we’ll discuss it.

Cozy Bear

According to the UK’s National Cyber Security Centre, a group with the moniker “APT29” (who is also known as “Cozy Bear” or as “the Dukes”) has started to relentlessly hack organizations tabbed with creating a vaccine for COVID-19. These claims have been corroborated by both US and Canadan authorities, and present a significant roadblock to the progress of COVID-19 vaccine production. 

In fact, the National Cyber Security Centre released a report that goes on to describe APT29’s use of several exploits in conjunction with spear phishing attacks to gain access to CSC’s network and infrastructure. Once network security is breached the organization gets busy deploying malware known as WellMess or WellMail.

CSC has been working with software vendors to patch vulnerabilities. Software that has been patched doesn’t provide the exploitable pathways that often lead to problems. 

Experts believe that this is not the first time APT29 has struck and that this threat should be taken very seriously. The organization is believed to be behind the 2016 hack that broke into the Democratic National Committee’s systems. The group has also been suspected of attacks against various healthcare, energy, government and other organizations.

Spear Phishing 

We relentlessly discuss phishing in our blog, because it is one of the biggest threats to maintaining network security. Most phishing attacks are messages sent randomly, but the spear phishing attack is one that is planned and executed deliberately to target one person. Hackers look for a weak link and try to take advantage of it. 

While your organization probably won’t be targeted by major hacking collectives, it is still important that you and your staff know how to identify a phishing attack and what to do if you suspect you are being attacked. Here are a few tips:

  • Always check the details. Legitimate emails are sent from legitimate email addresses. Take a look at the email address of suspect emails and you’ll likely see a potential ruse. 
  • Proofread the message. Most business correspondence is proofread before it is sent. If the spelling and grammar looks as suspect as the email is, it’s likely illegitimate.
  • Reach out. If there is any question, reach out to the organization/person sending the message. The more you know, the less likely you will fall for a scam. 

Identifying phishing attacks has to be a major point of emphasis for your company. Call Central Technology Solutions today at 1-844-237-4300 for help with getting the resources you need to properly train your team. 

Data Services Your Business Should Be Using
Your Business Needs a Well-Structured Mobile Devic...

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Network Security Privacy Hosted Solutions IT Services Email Data Backup Internet Malware Hackers Software Efficiency IT Support Business Innovation Outsourced IT Microsoft Hardware Data Recovery Computer Mobile Devices Productivity Managed IT Services Google Smartphone Small Business Business Continuity Cybersecurity Upgrade IT Support Phishing Collaboration Cloud Computing Backup Ransomware Disaster Recovery User Tips Communication Tech Term Workplace Tips Business Management Managed IT Services Mobile Device VoIP Managed Service Provider Android Windows 10 Smartphones Internet of Things Managed Service Social Media Data Management Quick Tips Paperless Office Remote Monitoring communications Browser Encryption Saving Money Network Managed IT Facebook Server BDR Windows 10 Windows Office 365 Covid-19 Artificial Intelligence Save Money Miscellaneous Business Technology Remote Work Virtualization Wi-Fi BYOD Risk Management Compliance Apps Passwords Holiday Document Management Users Help Desk Windows 7 Training Health Vendor Management Office Password Healthcare Microsoft Office Analytics App Automation Mobile Device Management Government Chrome Bandwidth Money Robot Bring Your Own Device Going Green Applications Employer-Employee Relationship Laptops Content Filtering Gmail Data Security Recovery Big Data Firewall Unified Threat Management Blockchain Avoiding Downtime IT Management Information Redundancy Hosted Solution Tip of the week Processor Scam Computing Website Data storage Antivirus Project Management SaaS Telephone Systems Information Technology Regulations Mobility Infrastructure Wireless Two-factor Authentication File Sharing Computers Data loss Vulnerability Storage Gadgets Files Apple Mobile Office Customer Service IoT Work/Life Balance Downtime Virtual Reality OneDrive Company Culture RMM Budget VPN Printing Machine Learning IT Service Software as a Service Operating System Customer Relationship Management Proactive Virtual Private Network Router Maintenance Tablet Remote Computing Employee-Employer Relationship Meetings Settings Unified Communications Flexibility Access Control Hard Drive Social Politics Mobile Security Digital Payment YouTube Word Search Payment Cards Solid State Drive WiFi Current Events Websites Identity Theft Wireless Technology Legal Licensing Electronic Health Records Co-Managed IT Upgrades Employees Monitoring Twitter Administration LiFi Professional Services Managed Services Education Data Storage Display Augmented Reality Recycling Dark Web IT solutions Time Management Networking End of Support Utility Computing Consulting Patch Management Bitcoin The Internet of Things Instant Messaging Remote Worker Data Breach Monitors Mouse Outlook Sports Network Management Electronic Medical Records Managed Services Provider Alert Smart Technology Net Neutrality Google Drive Assessment Remote Monitoring and Management Server Management Management How To Business Growth Social Network How To Samsung Internet Exlporer Private Cloud Remote Workers Uninterrupted Power Supply Consultation File Management Chromebook HIPAA Mobile Computing Tech Support Spam Hacker Cooperation GDPR Superfish Outsourcing Deep Learning Voice over Internet Protocol Black Market Specifications Point of Sale Geography Authorization Permissions Nanotechnology Fleet Tracking Procurement PowerPoint Bluetooth Value of Managed Services Writing Emoji Legislation IT Technicians Cybercrime Mobile Favorites 5G IT Test PCI DSS Windows Server Proactive IT Network Congestion Alt Codes SharePoint Staff Sync Cache Spyware Course Break Fix Telephony Social Networking Outsource IT Video Conferencing Computer Repair Unified Threat Management Hotspot Public Cloud Star Wars Shortcut Telephone Cryptocurrency Black Friday Law Enforcement Roanoke — Central Technology Solutions High-Speed Internet Fraud Botnet Screen Reader Asset Tracking Retail Cortana Mirgation Travel Conferencing Firefox Wireless Internet Business Telephone Physical Security MSP Security Cameras Heating/Cooling User Management IT Consulting Typing Downloads Mobile Device Managment Software Tips Virtual Desktop Cyberattacks Manufacturing Optimization 3D Printing Hacks Motherboard Development Zero-Day Threat Laptop Biometric Best Practice User Error Language Automobile Computer Care WannaCry Transportation Mobile VoIP Processors Cyber Monday Gadget technology services provider Smart Tech OneNote Virtual Assistant Hacking Vendor Migration Managing Stress Employer/Employee Relationships IT Assessment Office Tips Tech Terms Servers CRM Batteries Update Operations eWaste Read Only Hard Disk Drives Virtual Machines Unsupported Software Virus Data Warehousing GPS Cables Backup and Disaster Recovery Remote Working Projects Gamification Computing Infrastructure Cyber security Windows 8 Save Time Technology Assurance Group ’s 18 Digitize Supercomputer Disaster Wasting Time Trending Smart Devices Social Engineering USB Identities Technology Tips Crowdsourcing Chatbots Marketing Enterprise Content Management Finance Proactive Maintenance Buisness Theft ROI Remote Technology Laws Multi-Factor Security Wearable Technology G Suite History Solid State Drives Mail Merge Credit Cards Mobile Data Microsoft Excel Modem Tracking Wires Human Error Touchscreen Return on Investment Techology Printer Google Wallet Alerts Google Maps Cost Management E-Commerce VoIP Teamwork Sponsor Distributed Denial of Service Annual Convention Taxes Database Management Lenovo Shadow IT Dark Data Personal Information IT Budget Connectivity Database Sensors Safety Hard Drives Comparison Google Docs Identity Vulnerabilities Authentication Humor Cookies WPA3 Financial Notes Statistics Banking Google Calendar Cabling Enterprise Resource Planning Bookmarks Options Address Holidays Permission Peripheral Active Directory Disaster Resistance Drones Features Digital Shared resources Obstacle Windows Server 2008 Notifications Managed IT Service Backups San Diego Error Regulation Hard Disk Drive Web Server Cameras Motion Sickness Emergency CrashOverride Administrator Students CCTV Relocation Printers Webcam IT Consultant