| Literature DB >> 35765301 |
Heba Saleous1, Muhusina Ismail1, Saleh H AlDaajeh1, Nisha Madathil1, Saed Alrabaee1, Kim-Kwang Raymond Choo2, Nabeel Al-Qirim1.
Abstract
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic, to identify opportunities that target vulnerable individuals, organizations (e.g., medical facilities), and systems. In this paper, we examine the various cyberthreats associated with the COVID-19 pandemic. We also determine the attack vectors and surfaces of cyberthreats. Finally, we will discuss and analyze the insights and suggestions generated by different cyberattacks against individuals, organizations, and systems.Entities:
Keywords: COVID-19; Cyberattacks; Mitigation; Potential solutions; Security and privacy
Year: 2022 PMID: 35765301 PMCID: PMC9222023 DOI: 10.1016/j.dcan.2022.06.005
Source DB: PubMed Journal: Digit Commun Netw ISSN: 2352-8648
Fig. 1An overview of the topics related to the cyberattacks during the COVID-19 pandemic.
Existing COVID-19 related studies.
| Work | Security Objectives | Platform | Sector | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Privacy | Security | Android | OS | Health | Education | Critical Infrastructure | Individual | Public | |
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| [ | |||||||||
| This article | |||||||||
Summary of cybersecurity attacks targeting critical infrastructure.
| Threat Actor | Targeted Countries | Affected Infrastructure | Motivation | Malicious Tools |
|---|---|---|---|---|
| MuddyWater | UAE, Saudi Arabia, Oman, Lebanon, Pakistan, India, Iraq, Georgia, Turkey, Tajikistan, Israel, USA | Oil and Gas Industry and ICT | Cyberespoinage | Powerstates |
| Static Kitten | UAE, Saudi Arabia, Oman, Lebanon, Pakistan, India, Iraq, Georgia, Turkey, Tajikistan, Israel, USA | Oil and Gas Industry and ICT | Cyberespoinage | Power states |
| Molerates | UAE, Saudi Arabia, Egypt, Jordan, Libya, Iran, Iraq, Israel, USA, UK | Oil and Gas, Government Diplomat and Media | Cyberespionage | Xtreme RAT, njRAT |
| Gaza Cybergang | UAE, Saudi Arabia, Egypt, Jordan, Libya, Iran, Iraq, Israel, USA, UK | Oil and Gas, Government Diplomat and Media | Cyberespionage | Xtreme RAT, njRAT |
| Gaza Hackers Team | UAE, Saudi Arabia, Egypt, Jordan, Libya, Iran, Iraq, Israel, USA, UK | Oil and Gas, Government Diplomat and Media | Cyberespionage | Xtreme RAT, njRAT |
| Moonlight | UAE, Saudi Arabia, Egypt, Jordan, Libya, Iran, Iraq, Israel, USA, UK | Oil and Gas, Government Diplomat and Media | Cyberespionage | Xtreme RAT, njRAT |
| Extreme Jackal | UAE, Saudi Arabia, Egypt, Jordan, Libya, Iran, Iraq, Israel, USA, UK | Oil and Gas, Government Diplomat and Media | Cyberespionage | Xtreme RAT, njRAT |
| DarkHydrus | UAE, Saudi Arabia, and Turkey | Transportation (Aviation), Government and Education | Cyberespionage | RogueRobin, Phishery |
| LazyMeerkat | UAE, Saudi Arabia, and Turkey | Transportation (Aviation), Government and Education | Cyberespionage | RogueRobin, Phishery |
| RogueRobin | UAE, Saudi Arabia, and Turkey | Transportation (Aviation), Government and Education | Cyberespionage | RogueRobin, Phishery |
| Shamoon 3 | UAE, Saudi Arabia, India, Scotland, and Italy | Oil and Gas, Transportation, Government | Sabotage | Disttrack, Filerase |
| OilRig | UAE, Saudi Arabia, Qatar, Kuwait, Turkey, Lebanon, Israel, USA | Transportation (Aviation), Financial, Government, Energy, Chemical, Telecommunications | Cyberespionage | Bondupdater |
| APT34 | UAE, Saudi Arabia, Qatar, Kuwait, Turkey, Lebanon, Israel, USA | Transportation (Aviation), Financial, Government, Energy, Chemical, Telecommunications | Cyberespionage | Bondupdater |
| Helix Kitten | UAE, Saudi Arabia, Qatar, Kuwait, Turkey, Lebanon, Israel, USA | Transporation (Aviation), Financial, Government, Energy, Chemical, Telecommunications | Cyberespionage | Bondupdater |
| Helminth | UAE, Saudi Arabia, Qatar, Kuwait, Turkey, Lebanon, Israel, USA | Transporation (Aviation), Financial, Government, Energy, Chemical, Telecommunications | Cyberespionage | Bondupdater |
| Clayslide | UAE, Saudi Arabia, Qatar, Kuwait, Turkey, Lebanon, Israel, USA | Transporation (Aviation), Financial, Government, Energy, Chemical, Telecommunications | Cyberespionage | Bondupdater |
| IRN2 | UAE, Saudi Arabia, Qatar, Kuwait, Turkey, Lebanon, Israel, USA | Transportation (Aviation), Financial, Government, Energy, Chemical, Telecommunications | Cyberespionage | Bondupdater |
| DNSpionage | UAE, Saudi Arabia, Qatar, Kuwait, Lebanon, Turkey, Israel, Iran, USA | Transportation (Aviation), Financial (Banks), Government, Energy, Telecommunication | Cyberespionage | DNSpionage |
| ColdRiver | UAE, Saudi Arabia, Qatar, Kuwait, Lebanon, Turkey, Israel, Iran, USA | Transportation (Aviation), Financial (Banks), Government, Energy, Telecommunication | Cyberespionage | DNSpionage |
Fig. 2An example of a fake COVID-19 text message.
Fig. 3An example of a fake stimulus cheque email.
COVID-19-related threats in Q1 2020.
| Spam messages | Malware | Malicious URL | Contact tracing Apps | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Jan | Feb | Mar | Jan | Feb | Mar | Jan | Feb | Mar | Jan | Feb | Mar | |
| United State | 80,900 | 180,000 | 355,000 | 150 | 230 | 300 | 10,000 | 18,000 | 33,000 | 800 | 1200 | 4000 |
| Europe | 77,000 | 169,000 | 240,000 | 79 | 123 | 265 | 6500 | 13,700 | 27,500 | 900 | 1500 | 6900 |
| Asia | 82,500 | 190,200 | 275,000 | 50 | 105 | 245 | 8000 | 14,000 | 30,000 | 1050 | 2900 | 9000 |
| Africa | 60,500 | 130,000 | 205,000 | 44 | 98 | 169 | 7000 | 12,000 | 21,500 | 650 | 1000 | 2750 |
Fig. 4Email containing malicious macro targeting Italian users.
Fig. 5The percentage of cyberattacks attempted that were ransomware blocked by hospitals.
Fig. 6An example of ransomware that has written itself into the MBR and left a Discord server link for communication.
A summary of the malware detected during the COVID-19 pandemic.
| Name | Type | Purpose |
|---|---|---|
| Lokibot | Trojan | Infostealer |
| Hawkeye | Trojan | Keylogger |
| Oski | Trojan | Infostealer |
| Redline Stealer | Trojan | Infostealer |
| Cerberus | Trojan | Banking |
| Anubis | Trojan | Banking |
| Danabot | Trojan | Banking |
| Clipbanker | Trojan | Banking |
| Ursnif | Trojan | Banking |
| SMSTrojan | Trojan | Mobile SMS Spam |
| Azorult | Trojan | Infostealer |
| KPot | Trojan | Infostealer |
| CovidLock | Ransomware | Mobile Ransom |
| Corona Winlocker | Ransomware | Ransom |
| NetWalker | Ransomware | Ransome |
| HiddenTear | Ransomware | Ransom |
| Ryuk | Ransomeware | Ransom |
| Remcos | Backdoor | Remote Access Trojan |
| BlackNET | Backdoor | Remote Access Trojan |
| Tesla | Backdoor | Spyware |
| Nanocore | Backdoor | Infostealer |
| NetSupport | Backdoor | Remote Access Trojan |
Fig. 7The fake, malicious version of Johns Hopkin's COVID-19 tracking map.
Fig. 8The number of new mobile malware.
Fig. 9The name and APK link of a fake COVID-19-related app.
Fig. 10A summary of the attacks and vulnerabilities that have occurred, as well as their respective targets.
A summary of the malware detected during the COVID-19 pandemic.
| Cyberthreat | Countermeasure | Additional Comments |
|---|---|---|
| Phishing | Awareness Training | Phishing effects everyone, especially children and elderly users. The mentioned countermeasures can be |
| Malware | Awareness Training | – |
| Espionage | Awareness Training | Using a VPN for workplace communication can help with this |
| Malicious Domains | Awareness Training | – |
| Session Invasion | Awareness Training | Ensuring that devices are shutdown during inactive hours prevents attackers from taking advantage of the inactivity |
| Denial-of-Service | Awareness Training | – |