Streamline your cloud experience and maximise your cloud investment with Microsoft Azure-aligned public cloud services.
Host all of your workloads in the most appropriate location while experiencing the simplicity of one cloud from Six Degrees.
Enhance your cyber security and safeguard your organisation with our cyber security strategy and advisory, consultancy, and managed services.
Connect your business through a comprehensive connectivity portfolio delivered via our owned and operated core Next Generation Network (NGN).
Secure your productivity on any device, anywhere, any time.
Streamline your hosting with comprehensive colocation services delivered from three UK data centres.
Gain clarity and control of your 5G estate, ensuring ongoing cost efficiencies are managed on your behalf through our managed service.
Gain confidence in your cloud direction and achieve accelerated time to value through our assured and optimised cloud services.
Master today’s complex threat landscape and protect your business with our intelligence-led security services.
Videos and webinars are a great way to digest the latest technology insights.
Our eBooks and whitepapers provide in-depth insights from our experts.
Our thought leaders publish regular blogs on up-to-the-minute topics.
Learn all about the latest news from Six Degrees as we continue to evolve.
We host regular in-person and virtual events for our clients.
Discover how Six Degrees has driven success for others.
Learn how we enable our clients to achieve more; providing superior secure solutions, powered by our passionate people.
We are proud to partner with many of the world’s leading vendors, enabling you to leverage our continual investment in difference-making technology.
Learn how CNS at Six Degrees delivers intelligence-led security services that protect organisations in today’s hostile landscape.
We are committed to operating in an environmentally and socially conscious way. Learn more about our commitments as a business.
We are proud of our secure cloud credentials. Learn why we’re one of the most highly accredited providers in the UK.
We are a friendly and passionate bunch here. Whether you want to work with us or for us, we think you’ll enjoy the Six Degrees experience.
Home » Blogs » Cyber Criminals Exploiting Coronavirus in Phishing Email Scams
Cyber criminals have always capitalised on their victims’ uncertainty, fear and misplaced trust. But if you ever needed evidence of how unscrupulous cyber criminals really are, it’s this: coronavirus, a global pandemic that has a current death toll of over 3,000 people, is being exploited by cyber criminals in phishing email scams that target victims seeking guidance on how to protect themselves and others from the disease. But what are phishing emails, and how can you protect yourself and your organisation from the threat they pose? In this blog we’ll provide the best practice advice you need.
Phishing emails are sent by cyber criminals. They are designed to closely resemble legitimate emails, and their ultimate aim is to steal confidential information or deliver malware packages under the guise of being from a trustworthy entity.
Phishing emails mask themselves as messages from organisations such as banks, online stores or other authoritative bodies, and try to convince you – through various means of persuasion – to reveal confidential information or download malware.
So how are cyber criminals exploiting the coronavirus pandemic? As we said at the beginning of this blog, it all ultimately goes back to uncertainty, fear and misplaced trust. We’re all searching for information about coronavirus, and so it stands to reason that if you receive an email that claims to be from the NHS offering guidance you’ll be more likely to click on a link or open an attachment that promises to alleviate some of your uncertainty and fear. If the email really is from the NHS, then great! But if it’s a phishing email sent by a cyber criminal posing as an NHS representative? That’s where the misplaced trust comes in.
Spotting phishing emails is not an easy task, and deciding what is and what is not potentially dangerous often comes down to a matter of importance. Here are some questions you should ask yourself each time an email arrives in your inbox.
Are you expecting it?
This is more than likely the hardest thing to judge. Information comes from many sources, and in some instances emergency information may come from a stranger at an unexpected time. However, if there is any doubt don’t open any attachments or click any links but instead continue to analyse.
Where has the email been sent from?
Providers such as Yahoo, Google and Microsoft offer free, more-or-less anonymous email accounts. Remember that information from Government offices or banking institutions is not going to come from a free service. For example, HMRC will not send information from taxinvestigations@gmail.com. You should also look out for domains with similar addresses to legitimate organisations – a malicious actor might, for example, create hbsc.com and hope recipients confuse it for hsbc.com.
Personal emails will usually lend a clue as to who they are from within the email address, and hopefully the message context will provide confirmation that the address is valid. Emails from lorddeathmetal@yahoo.com are unlikely to send a CV to a respected financial institution, and if there is any doubt the email should provide a contact number which could be used to verify the information that is being sent.
Sometimes there is a requirement to solicit emails from unknown sources. In such cases a simple security measure would be to state that the subject line should contain a reference number or other identifying detail, making it less likely for random phishing attacks to make it past your analysis.
Should I really open this attachment?
Here we are dealing with the problem itself: you have looked at all the textual information contained within an email body and have decided that the information within the attachment warrants investigation. If the icon next to the picture is one you recognise as a document or a picture, should you click it?
Document types such as .pdf, .xls and .doc should be easily identified, but it is easy to play tricks with these files. Vigilance is the watchword: keep in mind the context of the email text and the expectation you have for these messages before opening them.
There is one more thing that you can do, and that is to look at the file size. A Microsoft Word document should be at least 10 KB, and a Microsoft Excel document at least 8 KB. This is for a blank document, and a document containing information should be bigger, with a PDF bigger still. Anything less than this should be ignored, or further technical advice sought.
Upon opening an email attachment like a Word or Excel document you may be prompted to run a macro. If this happens your first action should be to decline (unless you are expecting the document to contain a macro). A macro can be used to run code which can lead to a malware infection on your PC.
If the file is a .zip file (or .rar, .7z) for something that could be sent as a document or a picture, don’t click on it: rather obtain technical assistance. There are valid reasons for sending things as .zip files, but if it is out of context for your expectations it would be better not to, as opening .zip files can trigger a chain of events that may result in malware being installed on your PC.
Is it safe to follow this web link?
Often a link is sent via email with the intention of taking the user onto the internet to view content that is too large for an email, or to view information which is interactive and not suitable for email. The problem is that a link can also take a user to malicious sites which serve up malware. Again, it is difficult to say don’t click the link, but that should be the first thought: context and expectation should be used as primary wardens for any link.
Another technique is to hover over the link in question and examine the web address. If it is logical by context that the link is safe to click and you are expecting to be taken to view some reference material then it is likely prudent to click the link. If an email simply says ‘check this out’ and provides a link to a nonsensical web address ending in .ru, deleting the email and notifying the admin team so they can block the email sender on the Exchange server is likely the best course of action.
Phishing emails rely on your comfort and lack of suspicion, and there really is no better way to protect yourself than by remaining diligent. Following these five steps will help you stay safe:
An effective email security service should protect you from most – but not all – phishing emails. Make sure that your email security is up-to-date and licenced; some security software will continue to run when out of licence, but will not update with the latest security definitions. Given the constantly developing threats that are out in the wild, it’s important that you remain protected at all times.
As a rule, legitimate organisations will never contact you and ask you to provide passwords, account information or other personal details. If you receive any email that asks you to provide confidential information, treat it with extreme suspicion.
A common tactic of phishing emails is to announce that your account is going to be suspended unless you click on a link and provide confidential information. Again, you should be suspicious of any email that you feel is trying to pressure you into providing any type of information. Links within such emails often direct you to a ‘mirror’ site that is designed to look real, but is actually a phishing website designed to steal your data.
Copious research can go into a phishing email, but how well does the cyber criminal know the tone of voice of the person or organisation they’re trying to mimic? Probably not as well as you do. If the tone of voice of the sender just doesn’t sound right, this should arouse suspicion.
Following standard email security best practices will go a long way to protecting you from phishing attacks. Unless you’re confident of who an email is from (and with phishing emails you’ll have to pay special attention to the sender’s address, which may only be a character or two out from a genuine address), never open attachments, click on links or fill in embedded forms. Use common sense. If something makes you think twice, don’t risk it.
By remaining diligent, you should be able to stay safe from phishing emails. As with all email security, proper protection relies on the system and the user – even the most advanced email security products let some things through the net. Being smart and adopting a safety-first approach to email use will go a long way in protecting you and your organisation.
If you’re looking to enhance your organisation’s cyber security maturity by reviewing your people, processes and systems, Six Degrees is well placed to support you. Contact us to learn more.
Today’s law firms are operating in an increasingly hostile digital…
Microsoft Windows 7 and Windows Server 2008 operating systems have…
Foreign exchange company Travelex has become the latest high-profile victim…
More information on our Privacy and Cookies Policy can be found here: https://www.6dg.co.uk/privacy-cookies/. You can update how we contact you in the future by visiting our Communications Preference Centre here: https://www.6dg.co.uk/preference-centre/.