Provide your email for confirmation

Tell us a bit about yourself

country *
province *

why we ask about location

Please provide your email address

Login

To share your thoughts

Don't have an account?

Login with email

Check your inbox

We just sent a link to your inbox. Click the link to continue signing in. Can’t find it? Check your spam & junk mail.

Didn't get a link?

Sign up

Ready to get started

Already have an account?

Sign up with email

By signing up you agree to Rappler’s Terms and Conditions and Privacy

Check your inbox

We just sent a link to your inbox. Click the link to continue registering. Can’t find it? Check your spam & junk mail.

Didn't get a link?

Join Rappler+

How often would you like to pay?

Monthly Subscription

Your payment was interrupted

Exiting the registration flow at this point will mean you will loose your progress

Your payment didn’t go through

Exiting the registration flow at this point will mean you will loose your progress

Nation-backed hackers tune attacks to coronavirus fears – Google

Google on Wednesday, April 22, warned that nation-backed hackers are exploiting the coronavirus pandemic to target health care organizations and those working to fight the pandemic.

A security team tasked with defending against government-backed cyberattacks on Google and its users said it identified more than a dozen state-sponsored groups using COVID-19 themes as bait in phishing and malware traps.

Early this month, Google reported that it was detecting about 18 million pandemic-themed malware or phishing messages per day and some 240 million COVID-linked spam messages.

"Hackers frequently look at crises as an opportunity, and COVID-19 is no different," Shane Huntley of Google Threat Analysis Group said in a blog post. (READ: The other virus threat: Surge in coronavirus-themed cyberattacks)

Examples of ploys included bogus solicitations for charities; messages crafted to appear as though sent from remote workers, and websites impersonating pages of governments or public health agencies.

Huntley noted that one hacker campaign sent messages to US government workers with phony offers of free meals or delivery options available from fast food franchises because of the pandemic.

Clicking on the emails led to online pages designed to trick people into providing user names and passwords to Google accounts, according to the security team.

Most of the messages were automatically filtered as spam, and steps were taken to block access to deceptive websites asking for credentials, according to Huntley.

"We're not aware of any user having their account compromised by this campaign, but as usual, we notify all targeted users with a 'government-backed attacker' warning," Huntley said.

"We've also seen attackers try to trick people into downloading malware by impersonating health organizations."

Some COVID-19 themed targeting of international health organizations discovered by Google was deemed the work of an Iran-linked group referred to as "Charming Kitten."

Hackers allied under a "Packrat" banner traced to South America were said to have been behind emails linking to a fake World Health Organization website log-in page, according to Huntley.

Google is tightening security at more than 50,000 accounts thought to be in the crosshairs of state-sponsored hackers, according to the California-based internet firm.

"Generally, we're not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics," Huntley said.

US and British security agencies earlier this month issued similar warnings, saying some 2,500 web addresses were linked to various fraud schemes. – Rappler.com