×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!

CREATE ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • SUPPORT

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED

How have phishing attacks evolved during the COVID-19 pandemic, and what strategies have malicious actors used to exploit the public's desire for information?

by EITCA Academy / Wednesday, 12 June 2024 / Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Implementing practical information security, Information security in real life, Examination review

The COVID-19 pandemic has precipitated a significant transformation in the landscape of phishing attacks, leveraging the global crisis to exploit the public's heightened need for information and exacerbating vulnerabilities within both individual and organizational security frameworks. This period has seen an unprecedented surge in phishing campaigns, characterized by innovative strategies and sophisticated techniques aimed at deceiving users and circumventing traditional security measures.

Evolution of Phishing Attacks During the COVID-19 Pandemic

1. Thematic Exploitation

One of the most notable evolutions in phishing attacks during the pandemic has been the thematic exploitation of COVID-19-related topics. Malicious actors have crafted phishing emails, messages, and websites that mimic legitimate sources of information about the virus, such as health organizations, government agencies, and news outlets. These communications often contain urgent language and compelling narratives designed to elicit an emotional response, thereby increasing the likelihood of user interaction.

For example, phishing emails purporting to be from the World Health Organization (WHO) or the Centers for Disease Control and Prevention (CDC) have been widely reported. These emails typically contain links to fake websites that either steal personal information or deliver malware. The urgency and authority associated with these organizations make the phishing attempts particularly convincing.

2. Exploitation of Remote Work Environments

With the shift to remote work, attackers have adapted their strategies to exploit the vulnerabilities inherent in home office setups. Phishing emails targeting remote workers often masquerade as internal communications from IT departments or corporate executives, instructing recipients to update their credentials, install security software, or access critical resources through malicious links.

The use of business email compromise (BEC) tactics has also increased, where attackers impersonate high-ranking officials within an organization to request wire transfers or sensitive information. The lack of face-to-face verification and the reliance on digital communication channels in remote work environments have made these attacks more effective.

3. Phishing Kits and Automation

The pandemic has seen a rise in the use of phishing kits and automation tools, which have lowered the barrier to entry for cybercriminals. Phishing kits are pre-packaged sets of tools and templates that enable attackers to quickly deploy phishing campaigns. These kits often include website templates that mimic legitimate sites, email templates, and automated scripts for sending phishing emails.

Automation has allowed attackers to scale their operations, sending thousands of phishing emails in a short period. This increase in volume has made it more challenging for security systems to detect and block all malicious emails, increasing the likelihood of successful attacks.

Strategies Exploiting Public Desire for Information

1. Fake News and Information Overload

During the pandemic, there has been a deluge of information from various sources, including social media, news outlets, and official channels. Malicious actors have exploited this information overload by creating fake news articles, social media posts, and emails that appear to provide critical updates about the virus, vaccines, and public health measures.

These fake communications often contain links to malicious websites or attachments that deliver malware. The urgency and relevance of the information make recipients more likely to click on these links or open attachments without scrutinizing their authenticity.

2. Impersonation of Health Authorities

Impersonation of health authorities has been a common strategy used by attackers during the pandemic. Phishing emails and websites that appear to come from organizations like the WHO, CDC, or local health departments have been used to distribute malware or steal personal information.

For example, an email claiming to be from the CDC might instruct recipients to download an attachment containing "important safety measures." Once the attachment is opened, it installs malware on the victim's device. The perceived legitimacy of the sender increases the likelihood of the recipient complying with the instructions.

3. Exploiting Vaccine Rollout and Health Measures

As vaccines became available, phishing campaigns began to focus on exploiting the public's interest in vaccination information. Emails and websites offering early access to vaccines, registration for vaccination appointments, or information about vaccine availability have been used to harvest personal information and distribute malware.

Similarly, phishing campaigns have exploited changes in public health measures, such as lockdowns and travel restrictions. Emails providing updates on these measures, or offering exemptions and travel permits, have been used to deceive recipients into providing sensitive information or downloading malicious files.

Examples of Notable Phishing Campaigns

1. COVID-19 Relief Scams

Phishing campaigns have targeted individuals and businesses with promises of financial relief and government assistance. Emails claiming to offer stimulus checks, unemployment benefits, or small business loans have been used to collect personal information and financial details.

For instance, an email might appear to be from a government agency offering a link to apply for a stimulus check. The link directs the recipient to a fake website that collects personal and banking information under the guise of processing the application.

2. Vaccine Registration Scams

As vaccines were rolled out, phishing campaigns began to target individuals seeking vaccination appointments. Emails and text messages claiming to offer vaccine registration links or appointment scheduling forms have been used to harvest personal information.

An example of this would be a text message that appears to be from a local health department, providing a link to register for a vaccine appointment. The link leads to a fake website that collects the recipient's personal information, which is then used for identity theft or sold on the dark web.

3. Remote Work Phishing

Phishing campaigns targeting remote workers have included emails that appear to be from IT departments, instructing employees to update their VPN software or change their passwords. These emails often contain links to fake login pages that capture the employee's credentials.

For example, an email might appear to be from a company's IT department, asking employees to log in to a new security portal to update their credentials. The link directs the recipient to a fake login page that captures their username and password, which are then used to gain unauthorized access to the company's systems.

Mitigation Strategies

1. Employee Training and Awareness

One of the most effective ways to mitigate phishing attacks is through comprehensive employee training and awareness programs. Employees should be educated about the common tactics used in phishing attacks, the importance of scrutinizing email addresses and links, and the procedures for reporting suspicious communications.

Regular phishing simulations can help reinforce this training by providing employees with hands-on experience in identifying and responding to phishing attempts. These simulations can also help organizations identify areas where additional training may be needed.

2. Multi-Factor Authentication (MFA)

Implementing multi-factor authentication (MFA) can significantly reduce the risk of successful phishing attacks. MFA requires users to provide two or more forms of verification before gaining access to an account, making it more difficult for attackers to gain unauthorized access even if they obtain a user's credentials.

For example, an employee may be required to enter their password and then provide a code sent to their mobile device. This additional layer of security can prevent attackers from accessing accounts with stolen credentials.

3. Email Filtering and Security Solutions

Advanced email filtering and security solutions can help detect and block phishing emails before they reach the recipient's inbox. These solutions use a combination of signature-based detection, heuristics, and machine learning to identify and filter out malicious emails.

Organizations should also implement domain-based message authentication, reporting, and conformance (DMARC) to protect against email spoofing. DMARC helps verify the authenticity of the sender's domain, reducing the likelihood of phishing emails appearing to come from legitimate sources.

4. Incident Response and Reporting

Having a robust incident response plan in place is important for mitigating the impact of phishing attacks. Employees should know how to report suspicious emails and what steps to take if they believe they have fallen victim to a phishing attack.

Incident response teams should be prepared to quickly investigate and contain phishing incidents, including isolating affected systems, resetting compromised credentials, and notifying affected individuals. Regularly reviewing and updating the incident response plan can help ensure the organization is prepared to respond effectively to phishing attacks.

Conclusion

The COVID-19 pandemic has catalyzed a significant evolution in phishing attacks, with malicious actors exploiting the public's desire for information and the vulnerabilities associated with remote work environments. By understanding the strategies used by attackers and implementing effective mitigation measures, organizations can better protect themselves and their employees from the growing threat of phishing.

Other recent questions and answers regarding EITC/IS/ACSS Advanced Computer Systems Security:

  • What are some of the challenges and trade-offs involved in implementing hardware and software mitigations against timing attacks while maintaining system performance?
  • What role does the branch predictor play in CPU timing attacks, and how can attackers manipulate it to leak sensitive information?
  • How can constant-time programming help mitigate the risk of timing attacks in cryptographic algorithms?
  • What is speculative execution, and how does it contribute to the vulnerability of modern processors to timing attacks like Spectre?
  • How do timing attacks exploit variations in execution time to infer sensitive information from a system?
  • How does the concept of fork consistency differ from fetch-modify consistency, and why is fork consistency considered the strongest achievable consistency in systems with untrusted storage servers?
  • What are the challenges and potential solutions for implementing robust access control mechanisms to prevent unauthorized modifications in a shared file system on an untrusted server?
  • In the context of untrusted storage servers, what is the significance of maintaining a consistent and verifiable log of operations, and how can this be achieved?
  • How can cryptographic techniques like digital signatures and encryption help ensure the integrity and confidentiality of data stored on untrusted servers?
  • What are Byzantine servers, and how do they pose a threat to the security of storage systems?

View more questions and answers in EITC/IS/ACSS Advanced Computer Systems Security

More questions and answers:

  • Field: Cybersecurity
  • Programme: EITC/IS/ACSS Advanced Computer Systems Security (go to the certification programme)
  • Lesson: Implementing practical information security (go to related lesson)
  • Topic: Information security in real life (go to related topic)
  • Examination review
Tagged under: COVID-19, Cybersecurity, MFA, Phishing, Remote Work
Home » Cybersecurity / EITC/IS/ACSS Advanced Computer Systems Security / Examination review / Implementing practical information security / Information security in real life » How have phishing attacks evolved during the COVID-19 pandemic, and what strategies have malicious actors used to exploit the public's desire for information?

Certification Center

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (106)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Reddit publ.)
  • About
  • Contact
  • Cookie Policy (EU)

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on Twitter
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF), governed by the EITCI Institute since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    Follow @EITCI
    EITCA Academy

    Your browser doesn't support the HTML5 CANVAS tag.

    • Quantum Information
    • Cloud Computing
    • Cybersecurity
    • Artificial Intelligence
    • Web Development
    • GET SOCIAL
    EITCA Academy


    © 2008-2026  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    CHAT WITH SUPPORT
    Do you have any questions?
    We will reply here and by email. Your conversation is tracked with a support token.