The Courier & Advertiser (Angus and Dundee)

Perth firm battles rising virus scams

COVID-19: List of 100,000 suspect sites made available for free

- ROB MCLAREN

Cyber criminals trying to capitalise on coronaviru­s have been exposed by a Tayside tech firm.

More than 100,000 online scams were revealed by Perth-based M3 Networks.

The company discovered masses of suspect website addresses linked to Covid-19-themed phishing emails.

And they have made the list available for free so they can be blocked by companies.

The most common trick is emailing links to websites that ask people to buy goods that do not exist.

At other times, the sites instal malicious code on to people’s machines that can encrypt data and steal passwords.

It comes as the volume of cyber attacks on British businesses soared by almost a third in the first three months of the year.

A Perth cyber security firm has exposed more than 100,000 online scams by criminals looking to exploit the Covid-19 pandemic.

M3 Networks said there had been a huge increase in corona virus themed phishing attacks, where fraudulent emails are sent in order to induce individual­s to reveal personal informatio­n such as passwords and credit card numbers.

Over the past five weeks the tech firm has identified 100,000 suspect website addresses linked to Covid-19 phishing emails.

M3 has made the list of domain addresses available for free so they can be blocked by companies.

Managing director Mark Riddell said: “Cyber criminals are very quick to change tactics and target the current hot topic, whether that be the Olympic Games or World Cup, the death of a famous celebrity or a global health crisis.

“Overall we don’t see that cyber attacks in general have increased, but there has been a massive shift towards Covid-19-themed attacks.

“We are publishing weekly email blacklists containing lists of domains that have been identified in phishing attacks and other online scams.”

Mr Riddell said email was the most successful method, accounting for more than 90% of cyber attacks.

Sometimes the links can lead to websites that ask people to purchase goods that don’t exist. At other times the websites install malicious code on to people’s machines that can encrypt data or steal passwords.

The volume of Covid-19 email scams has increased each month, accounting for 6% of email traffic in May.

He said the dangers had been heightened by more people working from home throughout the pandemic.

“In an office environmen­t staff can easily ask a colleague for a second opinion if they’re not sure if an email is genuine, but with people working from home they don’t have that and so are much more likely to take the risk

and click on a link or download a dodgy attachment,” he added.

“Worse still, they may even forward the email to a colleague, so now the business is further exposed as there is another possibilit­y for someone else to fall for the phishing attack.

“Trying to clean up an infection at the moment, with staff all spread out, is a nightmare for IT department­s. It’s bad enough when everyone is in the same office.

“When you go to a website you are basically giving it permission to run code on your machine through your web browser.”

He said attackers were also pretending to be from a company’s IT department or Microsoft and asking people to change their email passwords as part of their heightened security procedures.

Mr Riddell explained: “What’s the first thing you do when you change password? Enter your old password and you’ve just given them access to your email account.

“They can look for payment informatio­n and do things like send fake invoices. It might be they see a genuine invoice come in and then send an email purporting to be from that firm saying the bank details have changed and can you send the money to another account.”

M3 specialise­s in monitoring the “dark web” where passwords and credit card details are traded. Many firms are oblivious that their informatio­n had been compromise­d.

The Perth company has identified the criminal behaviour using the email security and filter service it provides to clients and also from informatio­n shared by the threat intelligen­ce communitie­s.

The effects of a cyber attack can be devastatin­g, with 60% of small companies going out of business within six months of an attack. The volume of cyber attacks on UK businesses increased by almost a third in the first three months of this year, according to new analysis from Beaming.

Companies with internet connection­s experience­d 157,000 attacks each, on average, in the first quarter, the equivalent of more than one a minute.

This rate of attack was 30% higher than the same period last year when UK businesses received 120,000 internet-borne attempts to breach their systems each.

Beaming’s analysts identified 394,000 unique IP addresses used to attack UK businesses in the first quarter of this year and traced 48,000 of them to locations in China.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from United Kingdom