COVID-19 AND CYBER CRIMES, TYPES OF ATTACKS AND OUTLINE OF CRIMES

  • Saman Liaqat KIT Cloud Solutions Limited, London, United Kingdom
Keywords: Cybercrimes, Covid-19, Healthcare, Work from home, Cyber security

Abstract

Abstract Views: 225

 

The COVID-19 pandemic has unprecedentedly affected life on earth ever since it broke out in 2019. The World Health Organization (WHO) has confirmed 7.5 million COVID-19 positive cases and 430,241 deaths caused by the novel disease, due to which quarantine was imposed on hundreds of thousands of people around the globe . It has not only negatively affected businesses and economies, but it has also shaken the foundation of the technology-driven society because of the rise in cybercrime. For this reason, the techniques and methods used by cyber-criminals and their handiwork is being analyzed, worldwide. Cybercrime has also challenged the information system of healthcare, greatly affecting pharmaceutical firms, hospitals, and various health departments in the US, as well asWHO and many other firms. This paper highlights the range of cybercrimes committed worldwide during the pandemic by presenting an outline of the incidents during the COVID-19 pandemic.

INDEX TERMS: COVID-19, cybercrime, cyber security, healthcare, work from home

Downloads

Download data is not yet available.

References

Threat Intelligence Team, (2021). “Cybercriminals impersonate World Health Organization to distribute fake coronavirus e-book", Malwarebytes Labs.https://blog.malwarebytes.com/social engineering/2020/03/cybercriminals-impersonate-world-health-organization-to-distribute-fake-coronavirus-e-book/ (accessed Jun. 15, 2021).

“Pandemic profiteering: how criminals exploit the COVID-19 crisis,"Europol.https://www.europol.europa.eu/publications-documents/pandemic-profiteering-how-criminals-exploit-COVID-19-crisis(accessed Jun. 15, 2021).

“Live Coronavirus Map Used to Spread Malware –Krebs on Security,”Prof Point.https://krebsonsecurity.com/2020/03/live-coronavirus-map-used-to-spread-malware/ (accessed Jun. 15, 2021).

“Advisory: COVID-19 exploited by malicious cyber actors.” https://www.ncsc.gov.uk/news/COVID-19-exploited-by-cyber-actors-advisory (accessed Jun. 15, 2021).

H. S. Lallie et al., “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” Comput. Secur., vol. 105, p. 102248, Jun. 2021, https://doi.org/10.1016/j.cose.2021.102248

“Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic.” https://www.techrxiv.org/articles/preprint/Ten_Deadly_Cyber_Security_Threats_Amid_COVID-19_Pandemic/12278792(accessed Jun. 03, 2021).

“Cyber-Attack Hits U.S. Health Agency Amid COVID-19 Outbreak -Google Search.”(accessed Jun. 03, 2021).

“Update: Coronavirus-themed domains 50% more likely to be malicious than other domains -Check Point Software.” https://blog.checkpoint.com/2020/03/05/update-coronavirus-themed-domains-50-more-likely-to-be-malicious-than-other-domains/(accessed Jun. 16, 2021).

“Error Page -Trend Micro Inc.”Trend Micro.https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/coronavirus-used-in-spam-malware-file-names-(accessed Jun. 03, 2021).

B. Pranggono and A. Arabo, “COVID-19 pandemic cybersecurity issues,” Internet Technol. Lett., vol. 4, no. 2, p. e247, 2021, https://doi.org/10.1002/itl2.247

“COVID-19 cyberthreats.” https://www.interpol.int/en/Crimes/Cybercrime/COVID-19-cyberthreats (accessed Jun. 16, 2021).

“Error Page -Trend Micro Inc.” https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/coronavirus-used-in-spam-malware-file-names-(accessed Jun. 16, 2021).

“Cybersecurity.” https://www.who.int/about/communications/cyber-security(accessed Jun. 03, 2021).

“Business Email Compromise (BEC): Coronavirus a Costly New Strain of Email Attack,” Agari, Mar. 19, 2020. https://www.agari.com/email-security-blog/business-email-compromise-bec-coronavirus-COVID-19/(accessed Jun. 03, 2021).

“Oski Stealer Removal Report.” https://www.enigmasoftware.com/oskistealer-removal/(accessed Jun. 03, 2021).

“Cyberattack on Czech hospital forces tech shutdown during coronavirus outbreak,” Healthcare IT News. https://www.healthcareitnews.com/news/emea/cyberattack-czech-hospital-forces-tech-shutdown-during-coronavirus-outbreak(accessed Jun. 22, 2021).

“Cyberattack Hits HHS During Coronavirus Response -Bloomberg.” https://www.bloomberg.com/news/articles/2020-03-16/u-s-health-agency-suffers-cyber-attack-during-COVID-19-response(accessed Jun. 22, 2021).

J. S. Bing Christopher, “Exclusive: Iran-linked hackers recently targeted coronavirus drugmaker Gilead -sources,” Reuters, May 08, 2020. Accessed: Jun. 22, 2021. [Online]. Available: https://www.reuters.com/article/us-healthcare-coronavirus-gilead-iran-ex-idUSKBN22K2EV

“Hackers preparing to launch ransomware attacks against hospitals arrested in Romania, ZDNet.” https://www.zdnet.com/article/hackers-preparing-to-launch-ransomware-attacks-against-hospitals-arrested-in-romania/(accessed Jun. 22, 2021).

C. Cimpanu, “FBI re-sends alert about supply chain attacks for the third time in three months,” ZDNet. https://www.zdnet.com/article/fbi-re-sends-alert-about-supply-chain-attacks-for-the-third-time-in-three-months/(accessed Jun. 22, 2021).

Published
2021-12-26
How to Cite
Liaqat, S. (2021). COVID-19 AND CYBER CRIMES, TYPES OF ATTACKS AND OUTLINE OF CRIMES. Innovative Computing Review, 1(2), 71-84. https://doi.org/10.32350/icr.0102.04