spam email inbox

Research: Americans Should Watch Out For Hacking Campaigns Related to Stimulus Bill, Economic Recovery

Cyber attackers have already attempted to profit off of spam websites selling fake coronavirus cures. Now, hackers will turn toward Americans’ thirst for information about stimulus checks and financial aid.

Now that President Trump has signed a $2 trillion stimulus package providing emergency aid to people and businesses affected by the coronavirus pandemic, internet users can expect hackers to use those topics to trick people into downloading malware.

That’s the findings of cybersecurity firm FireEye, which released a threat assessment on Friday, when Trump signed the bill into law.

“We anticipate attackers will increasingly leverage lures tailored to the new stimulus bill and related recovery efforts such as stimulus checks, unemployment compensation and small business loans,” FireEye researchers wrote. “We expect future campaigns—primarily those perpetrated by financially motivated threat actors— to incorporate these themes in proportion to the media’s coverage of those topics.”

The cybersecurity company’s findings should come as no surprise to Americans who have noticed an uptick in scam websites selling fake cures and vaccines for COVID-19 or received emails from individuals posing as health experts from the Centers for Disease Control and Prevention.

Now that more Americans will be using search engines to find information about stimulus checks or other financial assistance, hackers will likely pose as government agencies in an effort to steal credit card information or Social Security numbers.

While there have not been widespread malware campaigns yet, FireEye and other cybersecurity researchers have already identified some campaigns with economic recovery themes promising users payments or grants if they download an attachment or enter their financial information.

On March 18, the researchers report, several individuals at corporations across North America, notably many in Canada, received an email titled “COVID-19 Payment” with an attached Microsoft Word document. Once the document was opened, it would trigger the download of a .JSE file that would initiate the SILENTNIGHT banking malware, according to FireEye.

“The threat actors exploiting this crisis are not new, they are simply taking advantage of a particularly overtaxed target set that is urgently seeking new information,” the FireEye report reads. “Users who are aware of this dynamic, and who approach any new information with cautious skepticism will be especially prepared to meet this challenge.”

These campaigns may be just beginning, but the same rules apply for practicing good cybersecurity. Users should avoid opening messages or attachments from email addresses they do not recognize and resist sending any financial information by email or online. Even if the email appears to be coming from a respected colleague or friend, double check with the person before carrying out any financial transaction as their email may be “spoofed” by a hacker.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3