Tuesday, 27th October 2020

COVID-19 spam, phishing emails, plagued users in first half of 2020

F-Secure’s attack landscape update highlights attackers’ strategies to capitalize on the COVID-19 pandemic and other developments with online threats.

While the COVID-19 outbreak has disrupted the lives and operations of many people and organizations, the pandemic failed to interrupt onslaught of spam and phishing emails targeting people’s inboxes. That’s according to an attack landscape update published recently by cyber security provider F-Secure.


According to F-Secure’s Attack Landscape H1 2020 report, which examines developments with online threats during the first half of the year, cyber criminals moved quickly to capitalize on the COVID-19 outbreak. Beginning in March and continuing through most of the spring, there was a significant increase of malicious emails utilizing various COVID-19 issues as a lure to manipulate users into exposing themselves to various email attacks and scams.

COVID-19-related campaigns included in these emails ranged from attempts to trick users into ordering face masks from phony websites, to infecting them with malware via malicious attachments. Three-quarters of attachments in these emails contained infostealers – a type of malware that steals sensitive information (such as passwords or other credentials) from an infected system.

“Cyber criminals don’t have many operational constraints, so they can quickly respond to breaking events and incorporate them into their campaigns. The earliest days of the COVID-19 outbreak left a lot of people confused or worried, and attackers predictably tried to prey on their anxieties,” said Calvin Gan, a manager with F-Secure’s Tactical Defense Unit. “Spotting malicious emails isn’t typically a priority for busy employees, which is why attackers frequently attempt to trick them into compromising organizations.”

Additional trends from the first half of 2020 discussed in the report include:

  • Finance was the most frequently spoofed industry in phishing emails; Facebook was the most frequently spoofed brand.
  • Email was the most popular way of spreading malware, and accounted for over half of all infection attempts.
  • Infostealers were the most common type of malware spread by attackers; Lokibot was the most common malware family.
  • Telnet and SSH were the most frequently scanned ports.

The report also notes that attacks leveraging cloud-based email services are steadily increasing and highlights a significant spike in phishing emails that targeted Microsoft Office 365 users in April.

“Notifications from cloud services are normal and employees are accustomed to trusting them. Attackers taking advantage of that trust to compromise targets is perhaps the biggest challenge companies need to address when migrating to the cloud,” explained F-Secure Director of B2B Product Management Teemu Myllykangas. “Securing inboxes in general is already a challenge, so companies should consider a multilayer security approach that combines protection technologies and employee education to reduce their exposure to email threats.”

Mimecast has released new research which highlights the risky behavior of employees using company-is...
New research suggests many organisations struggle to obtain high-quality threat data to guide key se...
Trustwave has released the 2020 Trustwave Data Security Index report which depicts how technology tr...
According to Venafi study, machine identity related cyberattacks grew by more than 400% between 2018...
Four out of five (83%) companies in the telecommunications & media sectors experienced a DNS attack...
Netwrix report reveals that concern about data theft by employees and IT admin mistakes has soared s...
Retail, Hospitality, Travel industries were hit with over 63 billion credential stuffing and 4 billi...
UK's leading free credit score and credit marketplace protects customer data from account takeover a...