How Attacks are Being Launched from Jack prabha's blog

As usual, cyber attackers are already on the job even before we could type WFH! History will vouch that every disaster witnesses the unscrupulous targeting those in greatest need in a suddenly uncertain economy. Devious operators have sought to capitalize on the coronavirus outbreak in multiple ways. Employees struggling to cope with new and unfamiliar ways of accessing enterprise resources have become soft targets for phishing attacks. Such attacks usually invite them to click on guidance, download new network configurations, and other enticements to execute malicious content in messages, according to latest research.


Some attackers are preying upon expectations of support such as government assistance, directing the unsuspecting to malicious sites where victims will supposedly receive guidance on accessing disbursements or handling money transfers. Cybercriminals are also exploiting our hunger for information in this crisis to target us using malicious emails. Palo Alto Networks have identified malicious emails using subjects containing COVID-19 and related keywords carrying Remote Administration Tools (RATs) like NetWire, NanoCore, LokiBot, as well as other malware. Some mails promise coronavirus updates and business continuity plans, mimicking enterprise communication. Even the names of trusted global organizations are being used to send phishing emails, like Unicef Covid19 Tips app.


Read more information about the cyber security consultants.


The users of virtual collaboration platforms aren’t protected either. Malicious parties have reportedly "crashed" accessible online meeting venues to disrupt virtual gatherings of those seeking to remain productive and in contact with each other, as hosts scramble to learn new platforms and configure their meetings to prevent such intrusion.


Previous post     
     Next post
     Blog home

The Wall

No comments
You need to sign in to comment