{"id":18147,"date":"2021-03-24T06:04:25","date_gmt":"2021-03-24T10:04:25","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/pandemic-year-in-infosec\/18147\/"},"modified":"2021-03-24T14:10:51","modified_gmt":"2021-03-24T10:10:51","slug":"pandemic-year-in-infosec","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/pandemic-year-in-infosec\/18147\/","title":{"rendered":"The great lockdown: How COVID-19 has affected cybersecurity"},"content":{"rendered":"<p>By March 2020, the COVID-19 outbreak had already reached more than 100 countries and was <a href=\"https:\/\/www.who.int\/en\/director-general\/speeches\/detail\/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19---11-march-2020\" target=\"_blank\" rel=\"nofollow noopener\">officially designated a pandemic<\/a>. The world has now been fighting this unprecedented virus for a whole year. In addition to its obvious effects on individuals\u2019 health and entire countries\u2019 economies, the disease\u2019s spread triggered sudden and radical changes in the daily life of millions of people. Work and study moved to the home, and videoconferencing replaced social and business meetings. The massive shift online has only exacerbated cybersecurity concerns.<\/p>\n<h2>Cybersecurity threats in the home office<\/h2>\n<p>The main change in the work process has probably been the forced transition to working from home. Our <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/03\/24140539\/6471_COVID-19_WFH_Report_WEB.pdf\" target=\"_blank\" rel=\"noopener\">global survey<\/a> of April 2020 found that nearly half of the 6,000 respondents had never worked from home before. Despite that, in 73% of cases, employers didn\u2019t conduct any special training on safe interaction with corporate resources over the Internet, which could have reduced the number of incidents caused by the human factor. Corporate IT\u2019s decreased control over devices, software, and user actions led to increased risk.<\/p>\n<h3>Home equipment<\/h3>\n<p>Many companies didn\u2019t provide their employees with corporate equipment. Instead, they allowed staff to work and connect to the office IT infrastructure from home devices, which in many cases are poorly protected. According to our survey, 68% of respondents worked at home using their personal computers. In the fall, we <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/03\/24140545\/consumer-appetite-versus-action-report.pdf\" target=\"_blank\" rel=\"noopener\">conducted another study<\/a> and found even more people in this position. About 80% of people surveyed used their home computers for work, even though more than half (51%) of respondents were provided with the necessary equipment by their employers.<\/p>\n<p>Remote workers also used their personal devices for entertainment, playing online games (31%) and watching movies (34%). However, many also used company laptops and smartphones for unintended purposes. For example, 18% of respondents used them to view adult content. Cybercriminals have <a href=\"https:\/\/securelist.com\/do-cybercriminals-play-cyber-games-during-quarantine\/97241\/\" target=\"_blank\" rel=\"nofollow noopener\">actively exploited<\/a> the increased interest in online entertainment by trying to lure users to fake sites and persuade them to download malware disguised as a movie or an installation file. A total of 61% of users surveyed in the fall admitted that they downloaded software from torrent sites, 65% used such sites for music and 66% for movies. Our telemetry data identified the most popular targets in spring 2020 as <em>Minecraft<\/em> and the television show <em>Stranger Things<\/em>.<\/p>\n<h3>Unsecured channels for remote work<\/h3>\n<p>In the office, IT administrators take care of securing the Internet channel. But when employees work from home, they set up their own routers and networks, a practice that increases security risks.<\/p>\n<p>As such, from March to April 2020, the number of attacks on unsecured RDP ports \u2014 the most popular remote connection protocol on computers running Windows \u2014 <a href=\"https:\/\/securelist.com\/remote-spring-the-rise-of-rdp-bruteforce-attacks\/96820\/\" target=\"_blank\" rel=\"nofollow noopener\">increased tenfold in Russia and by seven times in the United States<\/a>.<\/p>\n<h3>Vulnerabilities in collaboration tools<\/h3>\n<p>In the office, workers could edit documents and attend meetings in person. In the world of remote work, the demand for videoconferencing software and collaboration tools has increased dramatically. The growth in demand has <a href=\"https:\/\/securelist.com\/the-story-of-the-year-remote-work\/99720\/\" target=\"_blank\" rel=\"nofollow noopener\">attracted interest<\/a> from cybercriminals.<\/p>\n<p>Security gaps were also <a href=\"https:\/\/www.kaspersky.com\/blog\/videoconference-software-security\/35196\/\" target=\"_blank\" rel=\"noopener nofollow\">discovered<\/a> in legitimate videoconferencing software. For example, a year ago, a vulnerability was detected and eliminated in the Microsoft Teams corporate messaging service that had allowed an attacker to gain access to all accounts in an organization. Around the same time, the developers of Zoom for macOS fixed bugs that allowed outsiders to take control of a user\u2019s device.<\/p>\n<p>Employees have often used personal accounts on free services such as Google Docs to collaborate on documents and exchange files. These services generally lack the <a href=\"https:\/\/workspace.google.com\/intl\/en\/products\/vault\/\" target=\"_blank\" rel=\"nofollow noopener\">centralized<\/a> rights management that would enable them to protect confidential data.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<h2>Healthcare in attackers\u2019 sights<\/h2>\n<p>During the pandemic, with the healthcare sector weighed down by a colossal burden, cybercriminals tried to attack its agencies, hospitals, and even doctors directly.<\/p>\n<p>In March 2020, for example, the servers of the US Department of Health and Human Services (HHS) <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2020-03-16\/u-s-health-agency-suffers-cyber-attack-during-covid-19-response\" target=\"_blank\" rel=\"nofollow noopener\">experienced a massive DDoS attack<\/a>. In the same month, a cyberattack <a href=\"https:\/\/ct24.ceskatelevize.cz\/domaci\/3061748-fakultni-nemocnice-v-brne-celi-kybernetickemu-utoku-pise-idnescz\" target=\"_blank\" rel=\"nofollow noopener\">affected<\/a> databases belonging to the University Hospital in Brno, one of the largest centers for COVID-19 blood testing in the Czech Republic. As a result, doctors couldn\u2019t process coronavirus tests and even canceled a number of surgical operations.<\/p>\n<p>Advanced cybercriminals have targeted organizations combatting COVID-19. There is <a href=\"https:\/\/securelist.com\/lazarus-covets-covid-19-related-intelligence\/99906\/\" target=\"_blank\" rel=\"nofollow noopener\">evidence<\/a> that in September 2020 members of the Lazarus Group attacked a pharmaceutical company that was developing a coronavirus vaccine; a month later, they switched to a related health ministry.<\/p>\n<p>Both medical organizations and individual employees became targets. In the UK, scammers <a href=\"https:\/\/news.sky.com\/story\/coronavirus-cybercriminals-target-healthcare-workers-with-email-scam-11956617\" target=\"_blank\" rel=\"nofollow noopener\">tricked<\/a> health workers out of e-mail logins and passwords by offering to register them for a nonexistent seminar on \u201cthe deadly COVID-19 virus.\u201d<\/p>\n<p>The healthcare system\u2019s work was also hindered by people who should presumably have understood the threat: employees of healthcare companies. For example, in the spring of last year, a man dismissed from his position as vice president of the American company Stradis Healthcare <a href=\"https:\/\/www.kaspersky.com\/blog\/fired-insider\/38381\/\" target=\"_blank\" rel=\"noopener nofollow\">disrupted the supply of personal protective equipment<\/a> for doctors for several months as revenge for his dismissal. According to <a href=\"https:\/\/threatpost.com\/healthcare-exec-stalls-critical-ppe-shipment\/162855\/\" target=\"_blank\" rel=\"nofollow noopener\">information from the FBI<\/a>, he kept a secret account through which he sabotaged his former colleagues\u2019 work. It was reported in January 2021 that he had been sentenced to a year in prison.<\/p>\n<h2>COVID-themed phishing<\/h2>\n<p>While governments around the world have been battling COVID-19 and developing measures to support businesses and citizens, cybercriminals have tried to capitalize on fear of the virus and people\u2019s need for help. According to our survey, a quarter of users received malicious e-mails about COVID-19-related topics.<\/p>\n<h3>Fake correspondence from clients and government departments<\/h3>\n<p>For example, scammers sent fake e-mails <a href=\"https:\/\/www.kaspersky.com\/blog\/coronavirus-phishing\/32395\/\" target=\"_blank\" rel=\"noopener nofollow\">pretending to be from the US Centers for Disease Control and Prevention (CDC)<\/a>. Victims were asked to fill out a summary of recent cases of coronavirus among their neighbors, which involved clicking a link and entering their e-mail login and password. Their account details ended up in the hands of criminals.<\/p>\n<p>During the wave of lockdowns, the number of <a href=\"https:\/\/www.kaspersky.com\/blog\/coronavirus-corporate-phishing\/34445\/\" target=\"_blank\" rel=\"noopener nofollow\">e-mails masquerading as customer requests for product shipments<\/a> grew. To give them credibility, attackers complained about \u201clogistics problems due to COVID-19\u201d or demanded expedited delivery, citing problems with Chinese counterparties. These messages usually included an attachment containing a Trojan or backdoor that would give the criminals remote control over the infected machine.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n<h3>Fake COVID-19 payments<\/h3>\n<p>According to our data, scammers sent <a href=\"https:\/\/securelist.com\/the-story-of-the-year-remote-work\/99720\/\" target=\"_blank\" rel=\"nofollow noopener\">five times as many<\/a> malicious e-mails about welfare benefits in 2020 as they had in the previous year. The messages again purported to come from government departments, the International Monetary Fund, and even the <a href=\"https:\/\/www.kaspersky.com\/blog\/covid-compensation-spam\/35747\/\" target=\"_blank\" rel=\"noopener nofollow\">World Health Organization<\/a>.<\/p>\n<p>The classic scheme was presented in a new way: Promise the victim compensation and ask for a small commission to transfer the funds.<\/p>\n<p>Cybercriminals also took advantage of the very real news that Facebook was giving grants to small businesses. They cited the story and <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-grants\/37181\/\" target=\"_blank\" rel=\"noopener nofollow\">announced that payments were due to all users<\/a> of the popular social media platform. Victims were asked to apply by providing their account username and password, address, Social Security number, and a photo of an ID document. This package fetches a handsome price on the black market.<\/p>\n<h2>How to protect yourself<\/h2>\n<p>Cybercriminals didn\u2019t invent any fundamentally new attack schemes during this pandemic year, but they did actively exploit the COVID-19 theme. And, since work moved online for many people, the number of online attacks has naturally increased.<\/p>\n<p>To avoid becoming a victim, we recommend reading our selection of articles on <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/remote-work\/\" target=\"_blank\" rel=\"noopener nofollow\">how to protect yourself when working from home<\/a>. And, finally, a few universal tips:<\/p>\n<ul>\n<li>Don\u2019t click links from strangers or download files from e-mails if you\u2019re not sure you can trust the sender;<\/li>\n<li>Use corporate devices and company-approved software for work, and configure programs and devices properly;<\/li>\n<li>Ask your employer to install <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> on company devices, and strengthen your own <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">personal computer and smartphone security<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>A year has passed since lockdown began. We view the pandemic and its consequences through the prism of IT threats.<\/p>\n","protected":false},"author":2484,"featured_media":18152,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[2231,1622,76,2254,521],"class_list":{"0":"post-18147","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-coronavirus","10":"tag-healthcare","11":"tag-phishing","12":"tag-remote-working","13":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/pandemic-year-in-infosec\/18147\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/pandemic-year-in-infosec\/22654\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/pandemic-year-in-infosec\/24451\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/pandemic-year-in-infosec\/22475\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pandemic-year-in-infosec\/21496\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pandemic-year-in-infosec\/24961\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pandemic-year-in-infosec\/24237\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pandemic-year-in-infosec\/30316\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pandemic-year-in-infosec\/9476\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pandemic-year-in-infosec\/39123\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/pandemic-year-in-infosec\/16622\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/pandemic-year-in-infosec\/17221\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/pandemic-year-in-infosec\/14632\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pandemic-year-in-infosec\/26440\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/pandemic-year-in-infosec\/30292\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/pandemic-year-in-infosec\/26841\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/pandemic-year-in-infosec\/23702\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pandemic-year-in-infosec\/29038\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pandemic-year-in-infosec\/28839\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/coronavirus\/","name":"coronavirus"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18147"}],"version-history":[{"count":5,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18147\/revisions"}],"predecessor-version":[{"id":18155,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18147\/revisions\/18155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18152"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}