spam email inbox

Research: Americans Should Watch Out For Hacking Campaigns Related to Stimulus Bill, Economic Recovery

Cyber attackers have already attempted to profit off of spam websites selling fake coronavirus cures. Now, hackers will turn toward Americans’ thirst for information about stimulus checks and financial aid.

Now that President Trump has signed a $2 trillion stimulus package providing emergency aid to people and businesses affected by the coronavirus pandemic, internet users can expect hackers to use those topics to trick people into downloading malware.

That’s the findings of cybersecurity firm FireEye, which released a threat assessment on Friday, when Trump signed the bill into law.

“We anticipate attackers will increasingly leverage lures tailored to the new stimulus bill and related recovery efforts such as stimulus checks, unemployment compensation and small business loans,” FireEye researchers wrote. “We expect future campaigns—primarily those perpetrated by financially motivated threat actors— to incorporate these themes in proportion to the media’s coverage of those topics.”

The cybersecurity company’s findings should come as no surprise to Americans who have noticed an uptick in scam websites selling fake cures and vaccines for COVID-19 or received emails from individuals posing as health experts from the Centers for Disease Control and Prevention.

Now that more Americans will be using search engines to find information about stimulus checks or other financial assistance, hackers will likely pose as government agencies in an effort to steal credit card information or Social Security numbers.

While there have not been widespread malware campaigns yet, FireEye and other cybersecurity researchers have already identified some campaigns with economic recovery themes promising users payments or grants if they download an attachment or enter their financial information.

On March 18, the researchers report, several individuals at corporations across North America, notably many in Canada, received an email titled “COVID-19 Payment” with an attached Microsoft Word document. Once the document was opened, it would trigger the download of a .JSE file that would initiate the SILENTNIGHT banking malware, according to FireEye.

“The threat actors exploiting this crisis are not new, they are simply taking advantage of a particularly overtaxed target set that is urgently seeking new information,” the FireEye report reads. “Users who are aware of this dynamic, and who approach any new information with cautious skepticism will be especially prepared to meet this challenge.”

These campaigns may be just beginning, but the same rules apply for practicing good cybersecurity. Users should avoid opening messages or attachments from email addresses they do not recognize and resist sending any financial information by email or online. Even if the email appears to be coming from a respected colleague or friend, double check with the person before carrying out any financial transaction as their email may be “spoofed” by a hacker.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3