
How Hackers Are Capitalizing on the Pandemic: A Deep Dive Into Attacks Against US Universities Amidst Omicron Concerns | Reported by ZDNET

How Hackers Are Capitalizing on the Pandemic: A Deep Dive Into Attacks Against US Universities Amidst Omicron Concerns | Reported by ZDNET
Researchers with cybersecurity firm Proofpoint have discovered a new phishing attack leveraging concern about the spread of the Omicron strain of COVID-19 to steal credentials and gain access to accounts at several prominent universities in the US.
latest developments
The emails – part of an attack that Proofpoint researchers said began in October but increased in November – generally contain information about COVID-19 testing and the new Omicron variant.
Cybercriminals and threat actors have used concern about COVID-19 as a phishing lure since the pandemic began to cause headlines in January and February of 2020.
But with this specific attack, cybercriminals are spoofing the login portals of schools like Vanderbilt University, the University of Central Missouri and more. Some mimic generic Office 365 login portals, while others use legitimate-looking university pages.
“It is likely this activity will increase in the next two months as colleges and universities provide and require testing for students, faculty, and other workers traveling to and from campus during and after the holiday season, and as the Omicron variant emerges more widely,” the Proofpoint researchers wrote.
“We expect more threat actors will adopt COVID-19 themes given the introduction of the Omicron variant. This assessment is based on previously published research that identified COVID-19 themes making a resurgence in email campaigns following the emergence of the Delta variant in August 2021.”
In some cases, Proofpoint found that the emails redirected potential victims to the actual websites of their university after their credentials are stolen. The emails typically come with subject lines like “Attention Required - Information Regarding COVID-19 Omicron Variant - November 29.” Others are tagged with “COVID test.”
A screenshot of one of the spoofed pages.
Proofpoint
Thousands of messages have been sent using Omicron as a lure, and the emails typically have malicious files attached or come with URLs that steal credentials for university accounts.
In some cases, Proofpoint found that attacks using attachments “leveraged legitimate but compromised WordPress websites to host credential capture webpages.”
“In some campaigns, threat actors attempted to steal multifactor authentication (MFA) credentials, spoofing MFA providers such as Duo. Stealing MFA tokens enables the attacker to bypass the second layer of security designed to keep out threat actors who already know a victim’s username and password,” the researchers explained.
“While many messages are sent via spoofed senders, Proofpoint has observed threat actors leveraging legitimate, compromised university accounts to send COVID-19 themed threats. It is likely the threat actors are stealing credentials from universities and using compromised mailboxes to send the same threats to other universities. Proofpoint does not attribute this activity to a known actor or threat group, and the ultimate objective of the threat actors is currently unknown.”
Hank Schless, a senior manager at Lookout, told ZDNet that at the start of the COVID-19 pandemic in 2020, there was a ton of malicious phishing activity centered around the virus that tempted people with promises of increased government aid, information about shutdowns, and even self-testing apps.
From Q4 2019 into Q1 2020, Schless said his company saw an 87% increase in enterprise mobile phishing.
By early 2021, Schless noted that attackers changed their tune to deliver the same attacks with the promise of information around vaccines and reopenings.
“Between Q4 of 2020 and Q1 of 2021, exposure to phishing increased 127% and remained at the same level through Q2 and Q3. Now, with questions around the Delta and Omicron variants, attackers are again using this as a way to convince potential victims to trust their communication and unknowingly share login credentials or download malware. Academic institutions make for ripe targets in the eyes of cybercriminals,” Schless said.
“Large institutions may be conducting cutting-edge research or have massive endowments – both types of data than an attacker would want to steal or encrypt for a ransomware attack. Phishing campaigns know no industry, organization, or device type. They’re designed to be agile attacks that can be tweaked to target any individual.”
He explained that while the attackers’ end goal discovered by Proofpoint is still unknown, a set of legitimate login credentials can be the most valuable asset to an attacker trying to infiltrate an organization’s infrastructure.
By entering under the guise of a legitimate user, the attacker has a greater chance of accessing sensitive data without tripping any alarms, Schless added, noting that these campaigns are often the starting point for more advanced cyber attacks.
Security
The best VPN services of 2024: Expert tested
How to turn on Private DNS Mode on Android (and why you should)
The best antivirus software and apps you can buy
The best VPN routers you can buy
How to find and remove spyware from your phone
- The best VPN services of 2024: Expert tested
- How to turn on Private DNS Mode on Android (and why you should)
- The best antivirus software and apps you can buy
- The best VPN routers you can buy
- How to find and remove spyware from your phone
Also read:
- [New] Fastest Video Recorder Clear, Latency-Free Action for 2024
- [Updated] IMovie Clip Integration Into YouTube's Vast Network
- [Updated] In 2024, The Secrets of Writing Impressive Podcast Summaries
- [Updated] The Ultimate Guide to Improved Zoom Video Quality
- 2024 Approved Synchronize Speech and Slide Show The Voiceover Advantage
- Get Your Passwords Under Control at Half Price! Save Big Now - Only 50% Off Keeper Manager | GizmoNews
- How To Repair Your SteelSeries Arctis Prime When The Mic Fails
- How to Unlock Honor Magic5 Ultimate Phone with Broken Screen
- Is 1Password a High-Value Investment? Comprehensive Expert Evaluation of This Top-Tier Password Solution - Insights From Tech Sector Leaders
- Quick Guide: Downloading and Configuring HP Printer Software for Windows Users
- Secure Your Digital Life: Grab 3 Months of Dashlane Pro Password Management for Just $1 with ZDNet's Exclusive Offer
- Securing the Cloud: Don’t Fall Victim to Hacking - Spot and Fix These Flaws Now! | ZDNet
- Syncing Your Mac Computer to Your TV: A Comprehensive Walkthrough of Using AirPlay Connections
- Team-Wide Security at Just $19.95/Month: Discover How 1Password Transforms Password Management | Tech Insights
- Unlocking Security: Why Embracing a Password Manager Is Essential Now More Than Ever
- Urgent Protection Solution From Security Expert Targets Log4j Exploits in Hardware Locked Out of Updates | ZDNet
- Why People Favor Biometrics Over Passwords Due to Memory Challenges | ZDNet Analysis
- Title: How Hackers Are Capitalizing on the Pandemic: A Deep Dive Into Attacks Against US Universities Amidst Omicron Concerns | Reported by ZDNET
- Author: Matthew
- Created at : 2025-02-16 00:31:35
- Updated at : 2025-02-20 00:44:58
- Link: https://app-tips.techidaily.com/how-hackers-are-capitalizing-on-the-pandemic-a-deep-dive-into-attacks-against-us-universities-amidst-omicron-concerns-reported-by-zdnet/
- License: This work is licensed under CC BY-NC-SA 4.0.