The rapid progression in technological advancements sometimes appear striking and we are left in awe. However, there is always a darker side to these advancements.
The downsides of technology are widely observed when it comes to cyberterrorism. These particular terrorists can attack and cripple entire countries with a simple well placed virus. Technology is everywhere, and everything is connected. All they have to do is infect one computer and they have all the information they need. The cyberattacks are made easier when the world is already in turmoil and we are not as vigilant as might we be at other times.
Cover Cyberattacks With A Corona Excuse
During the global pandemic of COVID-19 (Coronavirus), fear is quickly spreading , and it is unfortunately being successfully exploited by these cybercriminals. A great example is the John Hopkins website which is an interactive tracking map of the new and old corona cases all over the world. A cyberterrorist has made a very believable replica of this site and is spreading it around through the World Wide Web.
When people open this site, they are subjected to malware. If you search online, these sites are cleverly hidden under Slavic and Russian languages. It is ingenious the way these hackers have covered their attacks. Using fear as a stimulant for people not vetting the sites they are accessing.
These illegitimate forums have also been selling fake COVID-19 kits, treatments and advice. The price ranges of these supposed ‘authentic’ products range between $200$ to $700. The people in their fear of the unknown virus that is taking over the world pay whatever price is presented to them without thinking twice about it. According to research all of these sites are part of a widespread Java-based malware deployment.
What Does The Malware Do?
The malware that is being spread is called AZOrult malware. It was created and found in 2016 on the Russian dark web and since then it has successfully stolen and harvested quite a bit of sensitive information. Researches on this malware with the file extension corona.exe show that it targets cryptocurrencies, desktop application and stream accounts. Other than that, it also targets profile information, passwords, emails and anything else relevant to the hacker.
Protect Yourself From AZOrult With These Preventive Measures
There are a few ways you can successfully tell the difference between the real JHU COVID-19 interactive map and the fake one. They are the details in graphics, security measures and passwords. The most reliable and easy difference is the site URL. Once you know all about these differences, make sure that your devices are armed with firewalls and ways to protect your sensitive information from harm.
We should spread this information as much as possible so that the country does not fall into discord and disruption due to these well-hidden spywares. Try not to open these sites at all before checking and running it through your protective programs.