Have you noticed that these virus times have altered the look of your inbox?
Is it packed with spam mails from Yoyo Yans offering to send masks to your doorstep? Or Rita ready and eager to export to you everything from diagnostic kits and ventilators to forehead thermometers and gowns?
While the virus out there is meddling big-time with our precious lives, the danger is lurking in our email boxes too.
Bigger than spam is the phishing rackets currently afoot.
Venkata Satish Guttula lays out the dangers lurking within your laptop.
Illustration: Dominic Xavier/Rediff.com
Novel CoronaVirus is not only posing a grave danger in the real world, but it is also a threat to the cyberworld.
Cybercriminals are using this time to exploit public fears about this deadly virus using phishing attacks.
Phishing is a technique used by cybercriminals to send genuine-looking emails and make the user take actions. These actions can be replying with personal information or clicking the link in the email and doing some transactions etc.
One such scenario is: A user receives an email from someone impersonating as the income tax department saying that the user has a tax refund. The user can transfer that refund to his account by clicking on the link that is provided in the email and just give the bank account and login details on the page.
This page will look like the income tax department's page. But it is not. And the user's details are compromised. Money is siphoned off from the bank using these details.
The COVID-19 situation has sparked off a ‘trend’ of many users receiving phishing emails from crooks impersonating as a software/antivirus company, who obviously have the time right now to create more evil. The mails say that they are offering their free software to use to work from home. This software can contain malware or malicious software when installed and will infect the computer.
Some types of malware
Ransomware: Once infected, this malware can encrypt documents in the computer and demand a ransom in the form of Bitcoins to decrypt the files.
Keylogger: This malware can record whatever the user is typing, including the login credentials for a bank or an email account, and send it to the hacker.
Remote Access Trojan or RAT: This malware can give full remote access of the infected computer to a hacker. This hacker can watch what the user is browsing, or he can remotely activate the web camera and watch, or he can read the documents on the computer.
Zombies or bots: This malware, even though it is harmless to the computer, can control it remotely to participate in the Distributed Denial of Service (DDOS) attacks to bring down the websites or networks.
Other examples of phishing emails based on COVID-19
Tips to prevent yourself from being a victim to the phishing attacks