SlideShare a Scribd company logo
1 of 4
Download to read offline
Beware of Threats Lurking Online Related
to COVID-19
With widespread challenges faced by organizations dealing with COVID-19, cyber criminals
are among the first to prey upon the confusion and seek financial gain by creating scams and
fabricating false information in an effort to gain access to sensitive data. Ever since the
pandemic began, the number of cyber crimes has unsettlingly increased as online scammers
rushed in to target a frightened worldwide community. Owing to the global lock down in
most parts of the world, people have been left with no choice but to remain occupied and in
touch with the rest of the world online. It means we were pushed towards adopting the
complete digitization of the way we work and how we communicate, and the necessity to
share sensitive information across work channels. Such a scenario has left scammers with
ample opportunities to do what they do best.
Over the last few weeks, people around the globe have reported receiving various forms of
phishing, scam threads, misleading emails, selling counterfeit products online and false alerts.
Most common threats related to COVID-19
The most common threats lurking around can be broadly split into the following categories.
 Phishing
 Online sale of counterfeit products
 Financial relief/Donations
Phishing
Phishing is one of the most common forms of cyber attack methods. The reports of email
phishing campaigns started floating around soon after the confirmation of widespread
infections which began spiking in January. After some research it was evident, the prime
targets of impersonation were WHO and U.S. CDC. Online scammers have been spotted
luring victims with document downloads or URLs using false promises of infection maps or
safety documents.
Online sale of counterfeit products
The outbreak of the COVID-19 has led to a critical shortage of healthcare equipment.
Supplies like hand sanitizers, face masks and even the toilet paper rolls have been out of
stock at major retailers, in some cases leading to an increase of prices online in the past few
weeks. This shortage is being driven in part by the misinformation being spread around that
adds to the confusion surrounding the pandemic.
China is the world’s largest supplier of face masks owing to the manufacturing of almost
80% of the face masks. Due to the novel corona virus, production and exports from the
manufacturing hub have been severely affected over the last two months. This has indirectly
led to the creation of a large market for fake products to fill the shortage of PPE gear such as
N95 surgical masks. Hundreds of shady websites have popped up with special offers and
heavy discounts on healthcare products such as face masks.
Financial reliefs/ Donations
Financial relief aid and charitable donations are few other mediums that are being exploited
by scammers to obtain money from you. Most online scammers send such emails/ URLs to
collect money from their victims through bank transactions or even the controversial bitcoin.
Through such scams, they can even hack your bank accounts and cause issues with future
transactions as well as collect personal information. Some scam emails even go to the extent
of creating fake tax refund deductions for the donation that you may make. Scammers often
request donations for individuals or adversely affected areas by COVID-19.
How to avoid the online risk of scams and phishing
While you cannot completely get rid of those luring emails sent by scammers, there are few
steps you can follow to avoid becoming a cyber attack victim. Here are a few expert
recommended tips to follow:
 Always make it a point to verify the email sender’s name and email address before
you even click on an email. Also, ensure you look carefully at the company’s logo to
validate authenticity.
 If you process the email, and you see a URL or call-to-action clickable buttons, do not
click on any link. Instead of hover over the link to see the complete URL and you will
see where it actually leads. Redirects are common. There are hundreds of fraudulent
domains that may be interlinked but kept hidden with persuasive URL text, for
instance, a URL with ‘WHO’ could take you to the fake website.
 Avoid downloading any attachments before going through the complete email. In the
case of misleading or suspicious content, avoid any emails with download files or
images.
 If you come across an email asking you to fill a form, fields or take surveys, do not
rush into typing your personal information. Think twice and validate your steps before
entering your private details for form submission or transaction.
 If you receive any phishing emails, ensure the email content doesn’t contain
grammatical mistakes, faulty layouts or spelling errors. These are often tell-tale signs
that the email is not being sent by a credible source.
Go for the authorized source of information for COVID-19
If you want daily updates and news about the COVID-19 outbreak, it is recommended that
you go to legitimate sources for information. To help prevent caving into scam emails, follow
credible and authentic sources like the World Health Organization and US Centers for
Disease Control and Prevention (CDC). Otherwise, if you are comfortable with your daily
news online portals, e-magazines, and social channels, you may pick up pandemic
information from those sources as well.
We hope you, your family and everyone across the globe battling the virus outbreak stays
healthy and safe both from the novel corona virus as well as the growing threat from cyber
attackers.
For more news and information on how to protect your organization, visit our website.
Follow us on Facebook, & LinkedIn or Contact us, 406-646-2102 and get your questions
answered. Feel free to call us 406-646-2102 or mail sales@ExcelliMatrix.com.
Beware of threats lurking online related to covid 19

More Related Content

Recently uploaded

VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...software pro Development
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 

Recently uploaded (20)

VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 

Featured

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Beware of threats lurking online related to covid 19

  • 1. Beware of Threats Lurking Online Related to COVID-19
  • 2. With widespread challenges faced by organizations dealing with COVID-19, cyber criminals are among the first to prey upon the confusion and seek financial gain by creating scams and fabricating false information in an effort to gain access to sensitive data. Ever since the pandemic began, the number of cyber crimes has unsettlingly increased as online scammers rushed in to target a frightened worldwide community. Owing to the global lock down in most parts of the world, people have been left with no choice but to remain occupied and in touch with the rest of the world online. It means we were pushed towards adopting the complete digitization of the way we work and how we communicate, and the necessity to share sensitive information across work channels. Such a scenario has left scammers with ample opportunities to do what they do best. Over the last few weeks, people around the globe have reported receiving various forms of phishing, scam threads, misleading emails, selling counterfeit products online and false alerts. Most common threats related to COVID-19 The most common threats lurking around can be broadly split into the following categories.  Phishing  Online sale of counterfeit products  Financial relief/Donations Phishing Phishing is one of the most common forms of cyber attack methods. The reports of email phishing campaigns started floating around soon after the confirmation of widespread infections which began spiking in January. After some research it was evident, the prime targets of impersonation were WHO and U.S. CDC. Online scammers have been spotted luring victims with document downloads or URLs using false promises of infection maps or safety documents. Online sale of counterfeit products The outbreak of the COVID-19 has led to a critical shortage of healthcare equipment. Supplies like hand sanitizers, face masks and even the toilet paper rolls have been out of stock at major retailers, in some cases leading to an increase of prices online in the past few weeks. This shortage is being driven in part by the misinformation being spread around that adds to the confusion surrounding the pandemic. China is the world’s largest supplier of face masks owing to the manufacturing of almost 80% of the face masks. Due to the novel corona virus, production and exports from the manufacturing hub have been severely affected over the last two months. This has indirectly led to the creation of a large market for fake products to fill the shortage of PPE gear such as N95 surgical masks. Hundreds of shady websites have popped up with special offers and heavy discounts on healthcare products such as face masks.
  • 3. Financial reliefs/ Donations Financial relief aid and charitable donations are few other mediums that are being exploited by scammers to obtain money from you. Most online scammers send such emails/ URLs to collect money from their victims through bank transactions or even the controversial bitcoin. Through such scams, they can even hack your bank accounts and cause issues with future transactions as well as collect personal information. Some scam emails even go to the extent of creating fake tax refund deductions for the donation that you may make. Scammers often request donations for individuals or adversely affected areas by COVID-19. How to avoid the online risk of scams and phishing While you cannot completely get rid of those luring emails sent by scammers, there are few steps you can follow to avoid becoming a cyber attack victim. Here are a few expert recommended tips to follow:  Always make it a point to verify the email sender’s name and email address before you even click on an email. Also, ensure you look carefully at the company’s logo to validate authenticity.  If you process the email, and you see a URL or call-to-action clickable buttons, do not click on any link. Instead of hover over the link to see the complete URL and you will see where it actually leads. Redirects are common. There are hundreds of fraudulent domains that may be interlinked but kept hidden with persuasive URL text, for instance, a URL with ‘WHO’ could take you to the fake website.  Avoid downloading any attachments before going through the complete email. In the case of misleading or suspicious content, avoid any emails with download files or images.  If you come across an email asking you to fill a form, fields or take surveys, do not rush into typing your personal information. Think twice and validate your steps before entering your private details for form submission or transaction.  If you receive any phishing emails, ensure the email content doesn’t contain grammatical mistakes, faulty layouts or spelling errors. These are often tell-tale signs that the email is not being sent by a credible source. Go for the authorized source of information for COVID-19 If you want daily updates and news about the COVID-19 outbreak, it is recommended that you go to legitimate sources for information. To help prevent caving into scam emails, follow credible and authentic sources like the World Health Organization and US Centers for Disease Control and Prevention (CDC). Otherwise, if you are comfortable with your daily news online portals, e-magazines, and social channels, you may pick up pandemic information from those sources as well. We hope you, your family and everyone across the globe battling the virus outbreak stays healthy and safe both from the novel corona virus as well as the growing threat from cyber attackers. For more news and information on how to protect your organization, visit our website. Follow us on Facebook, & LinkedIn or Contact us, 406-646-2102 and get your questions answered. Feel free to call us 406-646-2102 or mail sales@ExcelliMatrix.com.