With the number of people infected by the Coronavirus increasing around the world, online criminals are showing more signs of exploiting public concern.
Security researchers at Kaspersky have identified as phishing campaign that poses as an email from the United States’ CDC (Centers of Disease Control).
The email’s subject line is certainly likely to catch the eye of many people, as it claims to be emergency information related to “Coronavirus outbreak in your city”:
Casual examination of the email might make users believe they are reading an email seny by cdc.gov – the genuine internet domain of the Centers of Disease Control. However, the email hasn’t been sent from the CDC’s servers, but instead uses the lookalike address of cdc-gov.org.
And the link shown in the HTML email pretends to go to cdc.gov, but instead takes the unsuspecting user to a fake Microsoft Outlook login page that attempts to steal users’ email login credentials.
The domain cdc-gov.org was first registered on January 31 2020, in an opportunist attempt by cybercriminals to exploit the Coronovirus outbreak for their own ends.
The researchers at Kaspersky also warn that they have seen a separate scam, using the slightly different domain cdcgov.org (registered on 2 February 2020).
In this instance, the emails are not being distributed to phish for passwords but are instead urging recipients to donate Bitcoin for research into a Coronavirus vaccine.
Last week I described how cybercriminals were exploiting fear of the Coronavirus to spread malware.
Once again we’re reminded that cold-hearted scammers and fraudsters don’t have any qualms about exploiting human misery, and are prepared to do anything if it might net them a rich reward.
Just two things.
(1) There's a typo: 'make users believe they are reading an email seny by cdc.gov '
(Y instead of a T in sent).
(2) This is one of the many things I hate about HTML emails.