| Literature DB >> 34192113 |
Saqib Hakak1, Wazir Zada Khan2, Muhammad Imran3, Kim-Kwang Raymond Choo4, Muhammad Shoaib5.
Abstract
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.Entities:
Keywords: COVID-19; cyberattacks; mitigation; potential solutions; security and privacy; taxonomy
Year: 2020 PMID: 34192113 PMCID: PMC8043498 DOI: 10.1109/ACCESS.2020.3006172
Source DB: PubMed Journal: IEEE Access ISSN: 2169-3536 Impact factor: 3.367
FIGURE 1.Effects of COVID-19 Pandemic.
Examples of COVID-19-Related Cyber Incidents
| Sources | Summary |
|---|---|
| Hammersmith Medicines Research, a London-based coronavirus vaccine testing facility, was reportedly affected by ransomware. Given that the facility did not pay the ransom amount, personal records of thousands of patients’ information were published online. | |
| Distributed denial of service (DDoS) attacks were launched against the US Health and Human Services departmental servers. | |
| The World Health Organization (WHO) was reportedly targeted by an advanced persistent threat (APT) actor called DarkHotel, who attempted to steal the passwords of WHO members. | |
| E-mail accounts of several employees of Monte dei Paschi, an Italian state-owned bank, was reportedly hacked to gain access to sensitive information. | |
| Johns Hopkins University created a map to track global COVID-19 cases, but it was reportedly abused by cyber criminals to infect users and steal their passwords as soon as a user clicks on the map. | |
| A spyware campaign was reportedly launched through fake applications, such as corona live 1.1, to carry out surveillance activities. |
Key Security Terms
| Terms | Definition |
|---|---|
| Adversary | Individuals or groups with the aim of carrying out inimical activities |
| Threat | Any event or situation with the potential of adversely affecting information system sources |
| Risk | Measure of probability loss resulting from an attack |
| Attack | Threat carried out by an adversary to collect, disrupt, or damage information system sources |
| Vulnerability | Any weakness spot within information system resources that can be exploited by an adversary |
| Security policy | Set of guidelines to maintain the security provisions of an information system resource |
| Assets | Entity to be protected from attacks and includes hardware, software, data, and networks |
| Countermeasures | Approaches to mitigate or prevent attacks to secure assets |
FIGURE 2.Relationship among threat, vulnerability, and risk.
Existing COVID-19 Related Studies
| Cyberattacks | Security and Privacy Concerns | Role of Emerging Technologies for Tracking and Monitoring | Prediction and Diagnosis | |
|---|---|---|---|---|
| Z. Allam et al. | ✘ | ✘ | ✔ | ✘ |
| H. Cho et al. | ✘ | ✔ | ✘ | ✘ |
| A. De Carly et al. | ✘ | ✔ | ✘ | ✘ |
| P. Gupta et al. | ✘ | ✔ | ✘ | ✘ |
| Z. Yang et al. | ✘ | ✘ | ✘ | ✔ |
| B. Pirouz et al. | ✘ | ✘ | ✘ | ✔ |
| A. Kumar et al. | ✘ | ✘ | ✔ | ✘ |
| L. Wynants et al. | ✘ | ✘ | ✘ | ✔ |
| X. Meng et al. | ✘ | ✘ | ✔ | ✘ |
| M. Javaid et al. | ✘ | ✘ | ✔ | ✘ |
| C. J. Wang et al. | ✘ | ✘ | ✔ | ✔ |
| V. Chamola et al. | ✘ | ✘ | ✔ | ✘ |
| This Study | ✔ | ✔ | ✘ | ✘ |
FIGURE 3.Taxonomy of the COVID-19-themed Cyber incidents.
FIGURE 4.Surge of Cyberattacks amid COVID-19.
Examples of COVID-19-Themed Malware
| Malware | Summary | Sources |
|---|---|---|
| Maze | Ransomware | |
| Mummy Spider | Utilizes e-mail-thread hijacking techniques to trick victims to download malware samples, such as Emotet. | |
| AZORult | Information-stealing malware targeting coronavirus online map trackers. | |
| Zloader | Users (tricked into) download(ing) Zloader will result in their system being infected with the Zeus malware. | |
| Remote Access Trojan (RAT) | Attempts to take over administrative control of victims’ devices to carry out surveillance or other nefarious activities. | |
| AndroidOS-ProjectSpy.HRX and IOS-ProjectSpy.A | Steals messages from popular messaging platforms and information related to WiFi and SIM. |
FIGURE 5.Potential solutions to mitigate cyberattacks during pandemics.
Potential Solutions and Guidelines
| Solutions | Causes | Guidelines |
|---|---|---|
| Trusted Information Source Validation | (a) Downloading new low-rated pandemic-related applications, (b) trusting unauthenticated news sources | (a) Evaluate application ratings and reviews, (b) user education for identifying pandemic-related information from trusted and reputable sources, (c) mitigation of ransomware attacks through sophisticated third-party apps |
| Detection and Blockage of Scam Calls | (a) No single reliable solution available for the detection and mitigation of scam calls, (b) provide personal details through phone and other VoIP-related services | (a) User awareness for identifying and blockage of fraudulent or scam callers, (b) free educational campaigns for not providing any personal and financial information, such as social security number and bank details, through voice calls, (c) avoid or disregard free offers for pandemic testing and vaccination |
| International Collaboration | (a) Lack of international collaboration to combat pandemic-themed cyberattacks | (a) Establishment of an international task force to facilitate the sharing of current cyber threat intelligence (e.g., threat vectors and techniques), (b) international cyber hygiene educational and training programs, (c) financial support from such organizations as the International Monetary Fund (IMF) can be used to develop tools and skills to mitigate these cyber threats |
| Countering Infodemic Campaigns | (a) Fake information spreading through social media for panic and financial gains | Identification and classification of fake or misleading news through human-in-loop machine learning techniques. |
| Secure and Updated Systems | Increase of system usage at home owing to social distancing | (a) Patching of operating systems and applications, (b) free of charge reliable security products (e.g., anti-malware and anti-viruses) during pandemics |
Security Guidelines for Users Working From Home
| Tips | Reasons |
|---|---|
| Increase your awareness related to cyberattacks | Extensive information is available to equip individuals, whether new or technical computer users, with the necessary and basic cybersecurity knowledge. Such information as creating strong passwords, identifying vulnerable malware links, and using social media wisely, can help users mitigate numerous cyberattacks. A few of the related popular guidelines are available on |
| Update installed anti-virus and anti-malware products through original vendors | Given that attacks evolve over time, anti-malware products should be updated to quarantine/counter the effects of new attacks. Different strategies to update anti-virus products are provided by |
| Be cautious to e-mails from unfamiliar sources and the following categories: promotional/special offers, surveys or announcements of any kind, charity-based, bank-related and employers. | These malicious e-mails crafted by scammers encourage users to provide personal information by clicking on links and downloading attachments, and lure users through lucrative offers, such as free entertainment subscriptions, lottery tickets, and cash rewards. The intention is either to damage the system or steal money. |
| Consistently back-up data | In worst-case scenario of data being compromised, corrupted, or stolen, backing up your data to external devices, such as USBs and hard disks, is recommended. |
| Do not provide bank/personal details via phone/email for any of the system maintenance services | In the majority of cases, new computer users are tricked by scammers through telephone calls or e-mails. They pretend to update the host system remotely with the intention of hacking it and stealing bank account details. |
| Be vigilant while clicking online meeting platform links, such as Zoom, Google Meets, and Microsoft Teams | Attackers can impersonate such links as well. A recent example in which a victim pretending it to be from Microsoft teams clicked the following link |
| Use virtual private network (VPN) | VPN provides a private tunnel for users, in which information is encrypted and cannot be accessed by hackers. Hence, organizations can secure the home networks of employees using VPN. |
| Consistently shutdown laptop or home computer | Some software updates, such as firewall settings and Windows-patch updates, require system restart to be effective. Moreover, system shutdown flashes temporary and unimportant data and stops memory leaks. |
| Change passwords frequently | A good practice for employees is to frequently change their passwords while accessing online services from their homes. This practice can substantially reduce the impact of passive attacks. |
| Avoid public WiFi spots | Never use public WiFi spots to access information of your organization or any banking related transactions owing to unencrypted network traffic and legitimacy of these spots. |
| Strictly follow bring-your-own-device (BYOD) policy | Organizations that allow employers to use their own devices for work provide BYOD policies. These policies include certain security guidelines that aid employees secure their respective devices. Further general guidelines on protecting information while working from home can be found at |
https://www.comtact.co.uk/blog/6-steps-of-a-successful-cyber-security-user-awareness-programme
https://www.iiroc.ca/industry/Documents/CybersecurityBestPracticesGuide_en.pdf
https://www.enisa.europa.eu/publications/archive/copy_new-users-guide/at_download/fullReport
https://www.us-cert.gov/sites/default/files/recommended_practices/Recommended Practice Updating Antivirus in an Industrial Control System_S508C.pdf
http://loginmicrosoftonline.com-common-oauth2-eezylnrbmedyacamcom/common/oauth2/
https://www.us-cert.gov/ncas/current-activity/2020/04/02/fbi-releases-guidance-defending-against-vtc-hijacking-and-zoom
https://www.oipc.bc.ca/guidance-documents/1447