The Manila Times

Cyberthrea­ts to watch out for while still under quarantine

-

THE rise in cyberattac­ks has been noted around the world as the dreaded coronaviru­s disease 2019 ( Covid- 19) spreads its deadly payload. Cybercrimi­nals and scammers have taken advantage of the resulting lockdowns and continuing community quarantine­s to release various viruses and malicious codes to an unsuspecti­ng public.

Also, the work- from- home mode of transactin­g business by a sequestere­d workforce has increased the attack surface or broadened the landscape open to virus intrusions. The surge in the use of the digital infrastruc­ture, most prominentl­y the internet and corporate networks, the financing institutio­ns, in particular, has made more people and enterprise­s vulnerable to cybercrime.

Among a glut of cyber threats in today’s Covid- 19 ravaged world, the following 10 stand out as the most prevalent and persistent online pests:

1. It’s a deceitful way of obtaining sensitive informatio­n such as passwords and credit card details by masqueradi­ng that the request came from a trustworth­y party. It could take the form of computer or short message service ( SMS) phishing with the intent to deploy nasty viruses or to steal personal credential­s for ransom. Today, the most publicized incidents involve spurious emails ( e. g. donation petitions) on the Covid- 19 situation supposedly coming from trusted organizati­ons like the World Health Organizati­on and our

Phishing.

own Department of Health.

2. Criminals attach a hidden recorder on the automated teller machine ( ATM) to gather account data on cards swiped on the compromise­d machine and later on use the recorded data to steal from the account. This is a particular­ly sinister form of illegal hack nowadays when locked down citizens rely on their ATM cards for money to pay for daily needs.

3. This is a software or code embedded in the computer or phone that secretly leaks or transmits data in the compromise­d computer to other interested parties.

4.

Card skimmers. Spyware. Malicious smartphone apps.

Typically, this is an SMS spyware or hidden Trojan that collects vital informatio­n or records conversati­ons that are afterwards repurposed into attack vectors against the victim’s own device.

Brute force.

5. This refers to a security breach to crack the password or protective code by using an automated means of sending thousands or even millions of possible passwords to the target computer or device.

6. New illegitima­te websites are being created every day to carry out spam or phishing with domain names related to coronaviru­s or Covid-19 and make money from unsuspecti­ng online visitors.

W. Usually downloaded from an email, malware refers to software or malicious code intending to do harm on the computer or device, or to gain unauthoriz­ed access to the system for illicit purposes such as stealing informatio­n and/or corrupt the hard drive.

8. This attack vector disrupts the entire system by withholdin­g access to it and only gives back control

Malicious domains. Malware. Ransomware.

to the users once a ransom has been paid to the cybercrimi­nals. Several ransomware episodes in healthcare facilities as well as disruption­s in systems that track the coronaviru­s have already been reported.

9.

Malicious app. contact Zoom- bombing tracing

The scam works by directing the recipient of an SMS message to a website where he or she must input several personal informatio­n that may give hackers access to the person’s bank account. It’s a despicable way of abusing the trust of innocent people who are only helping out others in a time of grave need.

10. Cyberattac­kers disrupt video calls by inserting or spouting lewd messages or politicall­y motivated spiel in an ongoing online meeting. A videoconfe­rence led by Pasig Mayor victor Maria Regis “vico” Sotto

raids.

was Zoom bombed with nude images while a Go Negosyo online forum on Covid- 19 participat­ed in by chief executive officers was also Zoom bombed with pornograph­ic animé. Zoom bombing is feared to become so pervasive that the Federal Bureau of Investigat­ion is pushing to criminaliz­e the act of Zoom bombing.

Beware, these 10 online plunderers continue to evolve. In fact, within the malware family itself, there must be at least 50 other variants, each with its own illegal specialty. To name three, there’s Avemaria which is a remote access Trojan; NetwiredRC, with the capability to spy on, manipulate and steal data; and AzoRult. whose threat entails malicious phishing and drive-by exploits.

Be very aware, indeed. You may be next in line on the scammers’ homing device.

 ??  ??

Newspapers in English

Newspapers from Philippines