spam email inbox

Research: Americans Should Watch Out For Hacking Campaigns Related to Stimulus Bill, Economic Recovery

Cyber attackers have already attempted to profit off of spam websites selling fake coronavirus cures. Now, hackers will turn toward Americans’ thirst for information about stimulus checks and financial aid.

Now that President Trump has signed a $2 trillion stimulus package providing emergency aid to people and businesses affected by the coronavirus pandemic, internet users can expect hackers to use those topics to trick people into downloading malware.

That’s the findings of cybersecurity firm FireEye, which released a threat assessment on Friday, when Trump signed the bill into law.

“We anticipate attackers will increasingly leverage lures tailored to the new stimulus bill and related recovery efforts such as stimulus checks, unemployment compensation and small business loans,” FireEye researchers wrote. “We expect future campaigns—primarily those perpetrated by financially motivated threat actors— to incorporate these themes in proportion to the media’s coverage of those topics.”

The cybersecurity company’s findings should come as no surprise to Americans who have noticed an uptick in scam websites selling fake cures and vaccines for COVID-19 or received emails from individuals posing as health experts from the Centers for Disease Control and Prevention.

Now that more Americans will be using search engines to find information about stimulus checks or other financial assistance, hackers will likely pose as government agencies in an effort to steal credit card information or Social Security numbers.

While there have not been widespread malware campaigns yet, FireEye and other cybersecurity researchers have already identified some campaigns with economic recovery themes promising users payments or grants if they download an attachment or enter their financial information.

On March 18, the researchers report, several individuals at corporations across North America, notably many in Canada, received an email titled “COVID-19 Payment” with an attached Microsoft Word document. Once the document was opened, it would trigger the download of a .JSE file that would initiate the SILENTNIGHT banking malware, according to FireEye.

“The threat actors exploiting this crisis are not new, they are simply taking advantage of a particularly overtaxed target set that is urgently seeking new information,” the FireEye report reads. “Users who are aware of this dynamic, and who approach any new information with cautious skepticism will be especially prepared to meet this challenge.”

These campaigns may be just beginning, but the same rules apply for practicing good cybersecurity. Users should avoid opening messages or attachments from email addresses they do not recognize and resist sending any financial information by email or online. Even if the email appears to be coming from a respected colleague or friend, double check with the person before carrying out any financial transaction as their email may be “spoofed” by a hacker.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3