Select Page

Coronavirus & Ransomware Infection – What’s the Connection?

Coronavirus claims more lives with each passing day. The pandemic has affected more than 200 countries with thousands of cases appearing daily.  While the world worries over health concerns, preventive and protective measures from Coronavirus, scammers and hackers have already begun to make their move in the form of phishing emails.

Every time something “global” happens, for instance the finale of a popular TV show or a natural disaster, scammers capitalize on it using socially engineered email attacks (phishing scams).


What are phishing emails and how are they related to Coronavirus?

Phishing emails (or phishing scams) are socially engineered email attacks that engage readers into clicking on links, download attachments, or sharing login credentials.

As everyone is concerned about Coronavirus, scammers are using this as an opportunity to send emails that pose vital information about preventive measures. This email is tailor-made to strike nerves and get the recipient to download an attachment or click on a link.

The damage dealt by phishing emails vary. Clicking on a link in or downloading an attachment from a phishing email can lead to the following scenarios:

  • Compromise login credentials of the server, workstation, and email account, etc.
  • Successful ransomware attack – ransomware infection that compromises all systems and servers connected to the network
  • Compromise Personally Identifiable Information (PII) such as social security information, account information, credit card information, etc.

Such type of phishing emails aren’t just related to the Coronavirus. As mentioned earlier, similar attacks have been witnessed in the past. In fact, phishing emails are one of the primary reasons of data breaches, malware or ransomware infection, and data loss.

Damage Dealt by Phishing Emails in the Past

Here are some phishing email statistics that are sure to raise some serious concerns:

  • 70% nation-state or state-affiliated data braches involve phishing (Source)
  • 66% of successful malware infections are caused via email attachments (Source)
  • 64% organizations have experienced phishing attacks in the past year (Source)
  • 21% ransomware attacks involved phishing scams (Source)

You can find information about how to protect yourself from coronavirus from authentic sources such as the World Health Organization (WHO) and stay safe.


Recent COVID-19 Scam Attempts

Here’s a brief list of COVID-19 scam attempts experienced by businesses worldwide:

COVID-19 Scam Email that says “You Might be Infected”

Coronavirus & Ransomware Infection – What’s the Connection?

Screenshot of the COVID-19 Scam Email with Excel Attachment (Source: KnowBe4)

Email that says “you’re infected” with an excel sheet email attachment. When downloaded, the sheet prompts users to enable contact to see the sheet details. When allowed, the sheet infects the system with a virus using a Trojan downloader.

COVID-19 Scam Email Disguised as Official Correspondence from SBA

Coronavirus & Ransomware Infection – What’s the Connection?

Screenshot of the COVID-19 Scam Email Disguised as Official Correspondence from SBA (Source: IBM X-Force)

Email disguised as official correspondence from the Small Business Association (SBA). This is a particularly socially engineered scam that follows the same procedure as the SBA. It claims to provide SMBs with application number with which they can apply for a “small business disaster assistance grant”. All they needed to proceed was sign an attached document. When complied however, the email downloads a sample of the Remcos remote access Trojan (RAT).

COVID-19 Scam Email Targeted at Canadian Businesses

Coronavirus & Ransomware Infection – What’s the Connection?

Screenshot of COVID-19 Scam Email Disguised as a Grant for Canadian Businesses (Source: IBM X-Force)

Scam email targeted at Canadian businesses. This COVID-19 scam disguised itself as a grant from Justin Trudeau for businesses who decided to stay at home during the Coronvairus crisis. The email prompts users to download an attachment that is to be submitted as a voucher to claim the grant. When downloaded however, the macro code in the document infects the system with Zeus Sphinx malware.

Coronavirus-themed Wiper

Coronavirus & Ransomware Infection – What’s the Connection?

Screenshot of coronavirus.bat (Source: SonicWall)

While many nefarious individuals focused on phishing scams to collect personal information others simply made business data inaccessible for their victims. Such was the case with the coronavirus-themed wiper: “coronavirus.bat”. This particular coronavirus installer disabled access to the Windows Task Manager, User Access Control (UAC), and options for modifying the desktop. When installed and the system rebooted, the wiper loaded a binary responsible for overwriting the MBR.

But how can you, as a business owner or data owner, make sure that your data is safe from such phishing emails and ransomware attacks? StoneFly can help you with that.

How to protect data from Coronavirus phishing emails & ransomware attacks?

There are two major ways to protect your data from Coronavirus phishing emails and consequent ransomware attacks:

  1. Educate your staff
    • Everyone should have basic knowledge of phishing emails and how to identify them.
    • Write and share a “dos and donts” instruction manual that clearly defines what people need to do when they get a phishing email
    • Hold regular webinars and training sessions updating everyone about the latest types of phishing attempts
  2. Back up your mission-critical data
    • Use reliable enterprise backup software: Veeam, Acronis, etc.
    • Store redundant backup copies on multiple locations and multiple storage media
    • Set up disaster recovery for production environments

How StoneFly can Help

We offer purpose-built backup and Disaster Recovery (DR) solutions that include:

As the leading innovator in the backup and disaster recovery industry, we take pride in our ability to build economical, high performance, and robust systems custom-built for enterprise workloads.

To learn about how StoneFly can help you with your data protection needs, contact us.

Conclusion – Don’t Let Coronavirus become the Reason for a Successful Ransomware Attack

Coronavirus is a real worldwide concern. Opportunistic scammers and hackers are using it to attack enterprise infrastructure using phishing emails and ransomware.

While this is the time to focus on your care and stay safe from Coronavirus; you cannot allow scammers to hold your data for ransom or compromise your business data in any other way.

So start taking pre-emptive measures right away! Educate your staff and back up critical information using StoneFly’s enterprise-grade backup and disaster recovery solutions.

Related Resources:

Listen to the StoneCast Session about COVID-19 Scams

Download Audio | Play in New Window

StoneFly, Inc COVID-19 Response

Read Press Release

The Spear Phishing Survival Guide

The Spear Phishing Survival Guide

Spear phishing stands as the favored gateway for ransomware delivery and infiltrating corporate networks. Shockingly, 36% of data breaches in 2022 involved phishing, with 25% utilizing email as the ransomware attack vector. Guarding against cyber threats and...

Understanding Detection and Response: EDR vs MDR vs XDR vs NDR

Understanding Detection and Response: EDR vs MDR vs XDR vs NDR

In a digitally transformed landscape fraught with ever-evolving cyber threats, the acronyms EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), MDR (Managed Detection and Response), and NDR (Network Detection and Response) have become...

Trigona Ransomware: What is it and How to Defend Against it

Trigona Ransomware: What is it and How to Defend Against it

In an ever-evolving digital landscape, the specter of ransomware looms large, and Trigona stands as a significant player in the realm of cyber threats. This blog delves into the multifaceted world of Trigona ransomware, unraveling its origins, unique characteristics,...

Lockbit Ransomware: Inside the Cyberthreat and Defense Strategies

Lockbit Ransomware: Inside the Cyberthreat and Defense Strategies

In the constantly evolving arena of cybersecurity, the digital landscape is fraught with adversaries lurking in the shadows, ready to exploit vulnerabilities and disrupt the operations of organizations. Among these threats, LockBit ransomware has emerged as a...

What Defending Against Ransomware-as-a-Service (RaaS) Entails

What Defending Against Ransomware-as-a-Service (RaaS) Entails

Ransomware has evolved, becoming a thriving business model for cybercriminals. Ransomware-as-a-Service (RaaS) exemplifies this transformation—a lethal alliance between the creators and distributors of ransomware. It’s no longer a threat relegated to tech...

You May Also Like

WordPress PopUp Plugin

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email