The pandemic caused by COVID-19 is being used by cybercriminals for their criminal activities online.
According to a Cytomic report, based on detecPhicions’ analysis of malware in March, it has detected two types of malicious campaigns: SPAM emails related to the coronavirus and malicious domains.

  • Phishing that impersonates a bank: a campaign to send fraudulent emails impersonating the identity of an important Spanish bank. The aim of this phishing is to direct victims to a fake website in order to steal their bank login details.
  • Latest updates of the coronavirus: The email comes with an attachment that “supposedly” contains the latest updates of COVID-19, but this file contains a malware.
  • Coronavirus important precautionary information: Another email with a .doc (word) attachment, where apparently it is a document prepared by the World Health Organization (WHO) and strongly recommends readers to download the file, how much it is actually a trojan (Malware).
  • Exclusive Coronavirus Vaccine Detected: an email that attaches a link to an external website informing us of a supposed “virus vaccine” which is “fake” and contains malware.

The following is a LIST OF MALICIOUS DOMAINS LINKED TO THE CORONAVIRUS

• acccorona [.] com
• alphacoronavirusvaccine [.] com
• anticoronaproducts [.] com
• beatingcorona [.] com
• cdc-coronavirus [.] com
• contra-coronavirus [.] com
• corona-crisis [.] com
• corona-emergencia [.] com

It is our duty to inform all our customers to be very careful about the COVID-19 related e-mails they receive during these days of confinement in order to avoid possible attacks or loss of personal data. We also have protection software to detect possible attacks.
For more information, please do not hesitate to contact us.