Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

COVID-19 Vaccine Attacks Teach an Important Cybersecurity Lesson

COVID-19 Vaccine Attacks Teach an Important Cybersecurity Lesson

Since the outbreak of the COVID-19 coronavirus has wreaked havoc across the globe, there has been a lot of hope and effort put towards developing a vaccine against it. Unfortunately, just as some experiments have produced promising results, hackers have begun targeting the research centers responsible. Let’s look at this situation to see what it can teach us.

The Cozy Bear Threat

According to the National Cyber Security Centre, a government security organization based in the United Kingdom, a hacking group known as “APT29” (also referred to as “the Dukes” or “Cozy Bear”) has actively targeted the research centers conducting research into developing a COVID-19 vaccine. These claims have been supported by both the United States’ National Security Agency and Canada’s Communications Security Establishment.

In fact, the National Cyber Security Center released a report that outlined the attack that the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency also endorses.

This report describes the use of various exploits in conjunction with spear phishing attacks by APT29. Both tactics give APT29 access to carry out the rest of their attacks, which often involves deploying malware known as WellMess or WellMail.

On a side note, some of these exploits have been patched, so make sure you’re also up to date on your patches as well.

Many experts also share the opinion that Cozy Bear has struck before, and that the current threat needs to be taken very seriously as a result. It is believed that APT29 was responsible for the 2016 intrusion into the Democratic National Committee’s systems, as reported by CNN. The group has also been linked to assorted attacks on healthcare, energy, governmental and diplomatic organizations, and think tanks in the past.

What is Spear Phishing?

Phishing is a form of hacking that targets the end user, rather than using software vulnerabilities, to gain access to a system. Spear phishing is a more direct form of phishing. Instead of sending a generic message to massive groups of potential targets to see who takes the bait, spear phishing is specifically directed to an individual with access to key data and resources.

While APT29 may not target your organization as a part of these efforts to steal research, it is nevertheless critical that you and your team can recognize a potential phishing attack and mitigate it before it causes significant problems. While the following is by no means a comprehensive list of warning signs, it is a good place to start educating your team:

  • Always check the details. Many phishing attacks can be identified by close-but-no-cigar “From” addresses. When in doubt, try looking up the email address that sent an email.
  • Proofread the message. While legitimate messages can contain terrible spelling and grammar mistakes, and attackers can more and more effectively mimic professional communications, many phishing messages can be rife with errors.
  • Double-check. If possible, don’t be afraid to confirm that the email is legitimate by reaching out to the supposed sender (through some non-email form of communication) to confirm that they sent the message.

For more assistance in dealing with phishing attacks, reach out to us! At Total Tech Care, we’re motivated to help prevent a phishing attack from impacting your operations. Give us a call at 866-348-2602 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Phishing Managed IT Services Upgrade Windows Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Chrome Virtualization Tech Term Gadgets Saving Money Holiday Social Media Managed Service Managed IT Services Automation Microsoft Office Computers Artificial Intelligence Facebook Cybercrime Operating System Internet of Things Wi-Fi BYOD Mobile Device Management Networking IT Support Health Hacking Spam Office 365 Alert Telephone Systems Remote Information Technology Managed Service Provider Covid-19 Information BDR Bandwidth Recovery Employer-Employee Relationship Router Social Engineering Mobility Remote Monitoring Law Enforcement Mobile Computing App History Password Application Money Data Breach Encryption Human Resources Applications Big Data Mobile Office How To Private Cloud Managed IT Data Storage Office Tips Patch Management Training Apps VPN Blockchain Paperless Office Remote Computing Government Avoiding Downtime HaaS Infrastructure Voice over Internet Protocol Flexibility Marketing WiFi IT solutions Entertainment Bring Your Own Device Website Budget Wireless Data Management Vulnerability Work/Life Balance Windows 7 Word Gmail Settings Servers Google Drive Two-factor Authentication Data Security Mouse Employee/Employer Relationship User Error RMM Meetings Save Time Risk Management Hacker Conferencing Data Protection USB Cleaning The Internet of Things Scam Lithium-ion battery End of Support Education Physical Security Firewall Vendor Management Vendor Safety Managed Services Sports HIPAA Software as a Service Display Telephone System Redundancy Staff Virtual Reality Apple Machine Learning Keyboard Connectivity Social Remote Work YouTube Hard Drive Samsung Google Docs Black Market Virus Identity Theft Value Unified Threat Management Computing Computer Accessories Wearable Technology Spam Blocking Electronic Medical Records Document Management Solid State Drive Wireless Technology Retail Hard Drives Instant Messaging How to Augmented Reality Downtime Robot Fraud Hiring/Firing Excel Printer Biometrics Digital Signage Remote Worker Data storage Bluetooth Virtual Desktop Automobile Cryptocurrency Computing Infrastructure DDoS Going Green Business Intelligence Procurement Comparison Net Neutrality Workplace Strategy SharePoint IT Consultant Audit Worker IT Management CES Help Desk Printing Battery Botnet Shadow IT Humor Customer Service Legal Business Technology IT Plan Content Management Environment Access Control Internet Exlporer Fax Server Managed Services Provider Virtual Assistant Unsupported Software Authentication Database PDF SaaS Charger Remote Workers Compliance Proactive IT OneNote Processor Computer Care Update Network Congestion Current Events Best Practice Telephony eWaste HVAC Peripheral Root Cause Analysis Google Apps Tablets Experience Music Scalability Digital Security Cameras HBO Analysis Using Data Knowledge Entrepreneur Devices Copiers PowerPoint 5G Windows Media Player Business Owner Administrator Skype User Enterprise Content Management Quick Tip NarrowBand Data loss Shortcut Smartwatch Troubleshooting Search MSP Ergonomics Outlook Accountants Leadership Cost Management Managing Stress Thought Leadership Development Social Networking Credit Cards OLED Microchip iPhone Start Menu Password Management PCI DSS Screen Mirroring Password Manager Virtual Machine Loyalty Cameras Multi-Factor Security Employee Books 2FA Frequently Asked Questions Fiber Optics Mobile Running Cable Twitter Messaging Windows 10s Cabling Search Engine Files NIST Policy Chromecast Cast Business Mangement Hypervisor Memory webinar Trending Emergency Dark mode Tip of the week Smart Tech Trend Micro Professional Services Addiction SMS Uninterrupted Power Supply Public Cloud Amazon Default App Employer Employee Relationship Colocation Procedure Recycling Saving Time Assessment Printer Server Google Search Wiring dark theme Monitor Windows Server 2008 Practices Shopping Tools Cache AI Amazon Web Services IT Infrastructure Science Safe Mode FinTech Criminal Television Bing Streaming Media GDPR Reputation Hosted Computing Social Network Distributed Denial of Service Wireless Internet Tech Support Customer Relationship Management Online Shopping Investment Content Techology File Sharing Employees Laptop Employee/Employer Relationships Public Computer Analyitcs Inventory Programming Specifications ISP Transportation Camera Windows 365 Customers Regulations Wire Video Conferencing Computer Fan Evernote ROI Rootkit Audiobook Travel Shortcuts Sales Touchpad Bitcoin Personal Workers Millennials Cryptomining Benefits Printers Point of Sale Antivirus Advertising Smart Office Supply Chain Management FENG Wireless Charging Windows 8 Politics Monitoring Consultant IT service Batteries IBM Digitize Notifications Analytics Workforce Smart Technology Virtual Private Network Windows 8.1 Flash Cables Windows Server 2008 R2 Tablet Customer relationships Software Tips Best Available Domains Supercomputer Nanotechnology IT Assessment Emails Telecommuting Manufacturing Project Management Email Best Practices Relocation Sync WIndows 7 IaaS Maintenance Cortana Security Cameras Video Games Computer Tips Digital Signature Managed IT Service Bloatware OneDrive Netflix Biometric Security Two Factor Authentication Worker Commute Warranty Virtual CIO

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code