Attorney General Directs Department of Justice to Crack Down on Coronavirus Scammers, Cyber Criminals

In a memo to attorney’s offices across the country, William Barr said that federal law enforcement should prioritize investigating and prosecuting crimes related to the pandemic.

Under the direction of Attorney General William Barr, federal attorney’s offices will focus on prosecuting scammers seeking to profit from growing panic over the coronavirus pandemic.

Barr sent a memo to all U.S. attorneys on Monday that stated the Department of Justice’s mission of “detecting, investigating and prosecuting wrongdoing” related to the COVID-19 crisis. In addition to laying out steps the department is taking to keep federal law enforcement officers, attorneys and judges safe, Barr instructed attorneys to go after cybercriminals trying to take advantage of unsuspecting Americans.

In the memo obtained by CyberScoop, Barr pointed to reports of businesses selling fake coronavirus cures online, phishing campaigns from scammers pretending to be the Centers for Disease Control and Prevention or the World Health Organization, and criminals inserting malware on mobile apps claiming to track the spread of COVID-19.

“The pandemic is dangerous enough without wrongdoers seeking to profit from public panic and this sort of conduct cannot be tolerated,” Barr wrote. “Every U.S. Attorney’s Office is thus hereby directed to prioritize the detection, investigation, and prosecution of all criminal conduct related to the current pandemic.”

Read More: High Number of Recently Created Coronavirus Websites Linked to Scamming Operations

Attorneys were advised to work closely with local and state authorities to ensure that federal law enforcement is informed about “misconduct as quickly as possible” and that enforcement tools are available to punish those crimes.

The memo was sent shortly after cybersecurity researchers and journalists reported on apps pretending to offer information on the virus that actually just infected users’ phones with malware. One Android app even downloaded ransomware to the user’s phone, only unlocking the device if the owner sent $100 in Bitcoin within 48 hours, according to Forbes.

Americans are advised to not click on links from emails or users they do not recognize, and only download apps from official app stores, which have likely been vetted by Apple or Google. Both companies have said they have cracked down on malicious apps in the weeks since the coronavirus pandemic sprouted scams and cybercrime.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3