Security

Fake Zoom alerts and dodgy medical freebies among COVID-cracks detected by Taiwan's CERT

Phishers claimed to be from 'National Health Commission', which exists in mainland China but not Taiwan


Taiwan's CERT detected cyber-crooks impersonating medical authorities to attack the country's tech industry during the early stages of the COVID pandemic.

Since the beginning of the pandemic, the organisation noted an uptick in the number of attacks using malicious domain names to confuse victims, it said at the APNIC 50 conference. Hackers also impersonated trusted bodies such as the World Health Organisation or America's Centers for Disease Control and sent phishing emails offering free protective equipment such as face masks.

Local supermarket chain PXMart had its Facebook fan page copied and a free mask offer added in the hope of doing something nasty to those who fell for the scam.

"Attackers used COVID-19 social engineering to increase the success rate of their attacks," said TWCERT/CC director Chih-Hung Lin.

One group named "Mustang Panda" impersonated Taiwan's Ministry of Health and Welfare. In June the group sent phishing emails offering free medical supplies to businesses. The PowerPoint attached to the email contained macro files which created a backdoor connection to a malicious server.

"Although the email was in the traditional Chinese language we use in Taiwan, they claimed to be the National Health Commission, a name that is widely used in mainland China. So this is the first clue of where the attack possibly originated from," said TWCERT/CC security engineer Henry Chu.

Hackers also targeted video conferencing with emails that appeared to be notifications of missed Zoom meetings. Chu said those mails aimed to "create a sense of urgency and panic."

“This is a key trait of many scams to get people to click the link and provide personal information.”

Some of these attacks were on medical facilities. Such attacks were not attempts to steal data but to disrupt access to critical data or systems, according to Lin.

The centre also highlighted that people working from home and accessing enterprise resources from their home networks created vulnerabilities. "If someone at home gets infected by malware, it may spill into the enterprise core network," Lin said.

®

Send us news
Post a comment

TSMC expects customers to pay more for chips fabbed overseas

It'll be pricier, but there are geopolitical benefits, says CEO

TSMC evacuated fabs after M7.4 earthquake hit Taiwan

Internet outages recorded as Japan issues tsunami warning

TSMC shrugs off impact of Taiwan earthquake

Nonetheless DRAM prices may yet feel slight aftershocks

Taiwan quake to hit chipmakers' capex, not chip supply

Some equipment suffered minor damage, but the silicon show must go on

Taiwan connects its first home-grown quantum computer to the internet

Five mighty qubits, delivered before deadline, but they won’t stop imports of alternatives

Three Chinese balloons float near Taiwanese airbase

Also: Remember that balloon over the US last February? It might have used a US internet provider

Semiconductor scene set for AI-led recovery in 2024, and China will be in front

That's what happens when Uncle Sam tries to curb your chip sector

TSMC abandons plans for 2nm chip plant after Taiwanese locals protest

Foundry giant now searching for new home for high-end fab site

ESA's Vega rocket delivers Taiwanese and Thai satellites to low Earth orbit

Also on board, cubesat that dodges space debris with plasma braking technology

US Space Force wants hotline to China amid rising tensions

Cold War 2 is heating up

Taiwan looks into claims local companies helped Huawei advance China chipmaking

Plus: EU is looking its own strategic export controls – and not just to China

Fujitsu to quit Tokyo HQ

PLUS: Micron breaks ground in India; Hong Kong goes for green fintech; Taiwan to launch first sub; and more