How to Buy
          Cybersecurity and Data Privacy

          How the COVID-19 pandemic has increased the need for cybersecurity

          4 November 2020

          FEATURED ARTICLE

          The first ever recorded cyber-attack dates back to 1988. For those of you who are unfamiliar with this attack, it exploited a worm known as the “Morris Worm”, which started to install itself on computers, infecting them and debilitating them before finally crashing them. The worm damaged approximately 6000 computers, representing – at the time – roughly 10% of the entire internet.[1] Over the ensuing decades, computing and connectivity would become even more ubiquitous, as how we work and play increasingly went online; and where, the combination of chips and sensors would become the very fabric of our how we live our lives.

          Today, we live in a world where opportunistic cyber-attackers are everywhere. This year, they have leveraged the pandemic, in particular fear surrounding the pandemic, for their own personal gain. In the first 100 days of the outbreak, the number of coronavirus-themed spam messages increased by 26%, while the number of impersonation attacks jumped by 30%. Data from cybersecurity firm Palo Alto Networks (PAWN) revealed, earlier this year, that roughly 1800 malicious coronavirus-related domains were being registered each day, with approximately one-third of these targeting the US.[2] Microsoft (MSFT) also came out with a report noting that attackers were using fear surrounding the coronavirus to tempt users into clicking on malicious links, and parting with personal and/or highly sensitive information such as login credentials.[3]

          One notable scheme saw cyber-attackers use a replica of the interactive dashboard of virus infections and deaths produced by Johns Hopkins University to disseminate password-stealing malware across the web.[4] A recent survey from Next Caller on pandemic-related security concerns found that 44% of respondents noted an increase in emails, calls and texts from unknown sources. This is a common marker of phishing attacks – scams in which hackers pose as companies or trusted individuals offering legitimate services to trick recipients into disclosing private information.

           

          Hackers targeting the World Health Organisation

          In addition to the “normal” cyber-attacks that look to obtain an individual’s personal information, the pandemic also brought with it new attack vectors, in particular “social engineering attacks”. In April of this year, the World Health Organisation (WHO) reported a dramatic increase in the number of cyber-attacks directed at its staff. At one point, 450 active WHO email addresses were leaked online and reportedly “thousands belonging to others working on the novel coronavirus response.” Meanwhile, bad actors impersonating the WHO in emails targeted the general public with schemes to channel donations to a fictitious fund and not the authentic COVID-19 Solidarity Response Fund.

           

          Hackers targeting coronavirus relief packages

          Further, the US response to the pandemic, in which millions of Americans were offered Economic Impact Payments authorised by the Coronavirus Aid, Relief, and Economic Security Act (i.e. The CARES Act), brought another target for cybercriminals. Emails containing malicious attachments were sent with subjects related to the relief package. One read “RE: UN COVID-19 Stimulus” and distributed a spyware known as AgentTesla (also designed to also steal information), while another read “COVID-19 Payment” and distributed malware known as Zeus Sphinx.[5] The idea behind both attacks was to lead the victim to a fake login page, where the final payment was supposedly being delivered. Another type of attack leveraged stolen, personally identifiable information to submit fraudulent unemployment claims.

          “I believe that we are more susceptible to misinformation and ideological attacks because of the global Covid-19 health crisis, conflicting information about voting by mail, and chiefly because of how polarized, tribal, and generally intolerant we have become of each other as a society.” – Alexander Urbelis, Partners at Blackstone Law Group

          And these attacks have not been limited to everyday people. Companies too have been targeted. One of these attacks led one French pharmaceutical company to pay $7.25 million to a fake supplier for the purchase of hand sanitiser and protective masks.[6]

          Hackers targeting video communications platforms

          With people working from home, the pandemic has opened up network vulnerabilities of all kinds for companies that have been (for the most part) unprepared. These have spanned laptops and smartphones as well as home routers, access points, and other IOT devices. Video communication platforms became a target as hackers attempted to infiltrate video sessions, and other threat actors registered fake domains and distributed malicious apps impersonating Zoom Video Communications (ZM), Microsoft Teams and other web-conferencing sites. According to Abnormal Security, these types of malicious emails are actually quite convincing, and include links to landing pages that are identical to what a user would expect from a legitimate Zoom or Microsoft Teams page.[7] In a recent survey, Gartner said that 82% of organisations would allow employees to work remotely at least some of the time moving forward, which means that such endpoints are likely remain target vectors for hackers.[8]

           

          Hackers targeting the US election

          In the recent months, Microsoft warned that it had detected cyber-attacks targeting organisations involved in the upcoming US presidential election. These attacks had targeted people on both the Trump and Biden campaign.[9] Per the company, a group known as Strontium, operating from Russia, had attacked more than 200 organisations including political campaigns, advocacy groups, parties and political consultants; another group known as Zirconium, operating from China, had attacked high-profile individuals associated with the election, including people associated with the Joe Biden for President campaign and prominent leaders in the international affairs community; and finally, a group known as Phosphorus, operating from Iran, has attacked the personal accounts of people associated with the Donald Trump for President campaign.

          “There is a general sense in the cybersecurity community that the scale of the attacks and the scale of disinformation campaigns have all increased visibly since 2016. There is more reconnaissance, larger-scale targeting, as well as newer hacking techniques.” – Dr. Chenxi Wang, General Partners at Rain Capital

          According to data published by password management and authentication solutions company Specops, the US has been the victim of more cyber-attacks from hostile actors than any other nation in the world. The company sees cybercrime figures continuing to rise. Specifically, Specops reports that cybercrime can be expected to cost the global economy as much as $6 trillion per year by 2021.[10]

          All of this paints a favorable outlook for cybersecurity spending, not just for 2021 but also beyond that, as companies, governments and individuals seek to protect their critical infrastructure in an increasingly digital age. All these themes bode well for cybersecurity companies.

           

          This Featured Article has been produced by Tematica Research LLC. Rize ETF Ltd make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability or suitability of the information contained in this article.

           

          Related ETF

          CYBR: Rize Cybersecurity and Data Privacy UCITS ETF

           

          References:

          [1] Mindsight, “History of Cyber Attacks from The Morris Worm to Exactis”, July 2018. Available at: https://gomindsight.com/insights/blog/history-of-cyber-attacks-2018/

          [2] IBID

          [3] Dark Reading, “Fake Microsoft Teams Emails Phish for Credentials”, May 2020. Available at: https://www.darkreading.com/cloud/fake-microsoft-teams-emails-phish-for-credentials/d/d-id/1337717

          [4] JD Supra, “Cyber Threats On the Rise During COVID-19 Pandemic”, March 2020. Available at: https://www.jdsupra.com/legalnews/cyber-threats-on-the-rise-during-covid-14069/

          [5] Dark Reading, “Stimulus Payments Are Popular Leverage for Cyberattack”, April 2020. Available at: https://www.darkreading.com/threat-intelligence/stimulus-payments-are-popular-leverage-for-cyberattacks/d/d-id/1337601

          [6] Association for Financial Professionals, “BEC Scams Poised to Surge in Coronavirus Crisis”, April 2020. Available at: https://www.afponline.org/ideas-inspiration/topics/articles/Details/bec-scams-poised-to-surge-in-coronavirus-crisis

          [7] Abnormal Security, “Microsoft Teams Impersonation”, May 2020. Available at: https://abnormalsecurity.com/blog/abnormal-attack-stories-microsoft-teams-impersonation/

          [8] Tech Republic, “Remote work is here to stay, Gartner finds”, July 2020. Available at: https://www.techrepublic.com/article/remote-work-is-here-to-stay-gartner-finds/

          [9] Microsoft, “New cyberattacks targeting U.S. elections”, September 2020. Available at: https://blogs.microsoft.com/on-the-issues/2020/09/10/cyberattacks-us-elections-trump-biden/

          [10] CNBC, “Fears mount over Russian and Chinese hackers targeting the 2020 U.S. presidential election”, September 2020. Available at: https://www.cnbc.com/2020/09/24/fears-mount-over-hackers-targeting-2020-us-presidential-election-.html

          Related Posts

          You are leaving europe.ark-funds.com

          By clicking below you acknowledge that you are navigating away from europe.ark-funds and will be connected to ark-funds.com. ARK Investment Management LLC manages both web domains. Please take note of ARK’s privacy policy, terms of use, and disclosures that may vary between sites.

          Cancel Proceed
          ======