coronavirus illustration

High Number of Recently Created Coronavirus Websites Linked to Scamming Operations

Americans need to be on the lookout for malicious domains created by scammers as well as widespread disinformation and conspiracy theories being spread online.

Hackers are increasingly using the coronavirus to lure people seeking information about the epidemic into entering their personal information on spam sites.

Since January, over 4,000 coronavirus-related domains have been registered around the world, according to findings from security researchers for Check Point Research. Of those websites, 3 percent were found to be malicious and 5 percent were termed “suspicious.”

While these numbers may not sound startling at first, the malicious rate for these coronavirus-related domains is 50 percent higher than all other domains registered in the same time period. Check Point also found that the malicious rate was higher for these sites than for domains centered around seasonal themes, like Valentine’s Day.

Malicious coronavirus sites are likely designed for phishing, or taking the information of users to steal money from them or take over their accounts. Some of the websites claimed to sell face masks, cures, vaccines or home tests for the virus. Others featured discussions of the virus to lure in potential victims, according to the researchers.

The findings follow the Federal Trade Commission’s February warning to consumers to watch out for scams related to the coronavirus. The FTC noted that malicious email attachments or fake crowdfunding campaigns for supposed coronavirus victims are also threats to consumers.

“Scammers are taking advantage of fears surrounding the Coronavirus,” the Feb. 10 alert reads. “They’re setting up websites to sell bogus products, and using fake emails, texts, and social media posts as a ruse to take your money and get your personal information.”

There have also been reports of scam emails purporting to be the Centers for Disease Control (CDC) or, as Check Point recently discovered, the World Health Organization in Italy. The WHO phishing campaign hit over 10 percent of all organizations in Italy, according to Check Point.

The English text for the Italian email campaign reads: “Due to the number of cases of coronavirus infection that have been documented in your area, the World Health Organization has prepared a document that includes all the necessary precautions against coronavirus infection. We strongly recommend that you read the document attached to this message.”

Once the email recipient opens the document, they are instructed to click “enable editing” or “enable content,” allowing the malicious file to start downloading malware.

Check Point recommends that consumers are cautious with emails from unknown senders and do not click on promotional links in emails or take actions that they would not usually do. Consumers should also watch out for “special” offers for cures, vaccines or tests related to the coronavirus.

In addition to the phishing threats, Americans should be aware of widespread disinformation campaigns. State Department officials are linking online disinformation about the virus to a Russian operation behind “swarms of online, false personas” spreading conspiracy theories on line, The Washington Post reported.

Nearly 2 million tweets over a three-week period were found to have amplified coronavirus-related conspiracy theories around the world, according to a State Department estimate revealed by the Post. Legislators are calling on the department to release more detailed findings from its investigation.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

  • In The Clouds

    Video data storage in the cloud was a novel concept when Dean Drako founded Eagle Eye Networks back in 2012. While cloud was being used for almost all other business systems at that time, the physical security industry took a cautious and measured approach to cloud adoption. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3