Phishing

[Updated] Top 9 coronavirus phishing scams making the rounds

Tyler Schultz
March 24, 2020 by
Tyler Schultz

Coronavirus phishing attacks just won’t go away. As the COVID-19 pandemic outbreak continues to spread, cybercriminals have intensified their phishing attacks, adding fuel to the global crisis.

Beyond the devastating effects of COVID-19, the outbreak is producing a perfect storm for cybercriminals. Cybercriminals are feeding on public anxiety and preying on victims using scare tactics and urgent calls to action to entice an ill-advised click. And to make matters worse, the global reach of COVID-19 means virtually everyone is a relevant target for a coronavirus scam.

See Infosec IQ in action

See Infosec IQ in action

From gamified security awareness to award-winning training, phishing simulations, culture assessments and more, we want to show you what makes Infosec IQ an industry leader.

We collected nine coronavirus phishing attack examples to shed light on the top tactics cybercriminals are using so you can prepare your employees for the threats they are facing now and in the foreseeable future.

Is your organization susceptible to phishing attacks? Find out today with a free Phishing Risk Test!

Run Free Test

1. Consumer relief package

As the economic fallout of the COVID-19 pandemic continues, attackers are leveraging consumer anticipation of tax relief and government-issued economic stimulus plans. These attacks trick victims into dropping their guard and clicking a malicious link.

COVID-19 phishing attack

Image courtesy of Mimecast

Similar attacks have been spotted in the United States.

COVID-19 phishing email

Use this phishing template in Infosec IQ

2. Help desk impersonation

At a time when technical support teams are helping employees transition to remote workstations, cybercriminals are impersonating IT help desks to take advantage of their increased visibility and communication.

COVID-19 phishing email

Image courtesy of INKY

Employees working remotely for the first time are likely in contact with IT and security teams more than ever before. Employees anticipation communication from your help desk may be more susceptible to clicking a malicious link in this type of attack.

3. Safety measures turned malicious

This phishing attack impersonates a coronavirus specialist from the World Health Organization to trick victims with two malicious options. The email urges the victim to download a malicious file disguised as a safety document.

coronavirus phishing email

Image courtesy of Sophos

The same attack was spotted without the World Health Organization branding, but instead targeted to the victim’s region.

coronavirus phishing email

Image courtesy of Wired

The attack also gives the victim the option to click a "Safety Measures" button. If the victim clicks the link, they are redirected to a spoofed World Health Organization site and prompted to provide their email address and password.

coronavirus phishing email

Image courtesy of Sophos

4. Internal organization alert

This phishing attack takes a corporate approach by impersonating a company’s president to deliver an attachment disguised as tips to prevent infection. The attachment is designed to infect an employee’s machine with malware.

coronavirus phishing email

Image courtesy of Trustwave

5. New cases in your area

This attack preys on the fears of Coronavirus spreading near the victims’ location. Disguised as a CDC alert, this phishing email tricks victims into clicking a malicious link by offering an updated list of new cases of the virus documented near them.

coronavirus phishing email

Image courtesy of Trustwave

6. The donation scam

Like the tried-and-true donation scams used after natural disasters, this phishing attack solicits donations to fight the spread of the coronavirus. The attack imitates a CDC emergency outreach email and asks victims to deposit money into a Bitcoin account.

coronavirus phishing email

Image courtesy of Kaspersky

7. Information from the source

In this coronavirus phishing attack, the cybercriminal impersonates a doctor from The Central Hospital of Wuhan to play on victims’ fears, lend credibility to the email and convince the victim to download a malicious attachment.

coronavirus phishing email

Image courtesy of Mailguard

8. Coronavirus domains

Along with the phishing tactics above, one of the largest concerns facing cybersecurity researchers is the massive increase in coronavirus-themed domain registrations. Many suspect that these coronavirus-related domains will be used for phishing attempts like those listed above.

coronavirus phishing domains

Image courtesy of Checkpoint

9. Fake product scam

Beyond the coronavirus phishing threats listed above, the SEC is warning consumers of investment scams related to products claiming to prevent, detect or cure coronavirus. Future phishing attacks may leverage this same tactic.

Prepare your employees for coronavirus phishing attacks

Coronavirus phishing attacks show no signs of slowing down. We’ve already seen a wide range of tactics cybercriminals are using to scam victims, infect their devices and steal information. By providing your employees with simulated phishing training, you can not only help them detect these phishing attacks at work to keep your organization secure, but also help them develop more secure habits to stay secure at home.

Security awareness and simulated phishing platforms like Infosec IQ come loaded with topical phishing templates (including templates for the attacks above) to help you prepare your workforce and keep your organization secure.

Phishing simulations & training

Phishing simulations & training

Build the knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources. Unlock the right subscription plan for you.

Run a free phishing risk test to see how it works!

Run Free Test
Tyler Schultz
Tyler Schultz

Tyler Schultz is a marketing professional with over seven years of experience delivering SaaS solutions to organizations of all sizes. As a product marketing manager at Infosec, he is dedicated to helping organizations build strong cybersecurity cultures and meet their security awareness goals. He helps the Infosec team push the boundaries of effective and engaging security awareness training with a focus on experiential learning, gamification, microlearning and in-the-moment training. Tyler is a UW-Madison and UW-Whitewater graduate and Certified Security Awareness Practitioner (CSAP).