Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

How Is Coronavirus/COVID-19 Linked To Malicious Software?

At first, It may not make sense that the Coronavirus/COVID-19 could be linked to malicious software. However, according to security researcher Brian Krebs the malware distributors “are disseminating real-time, accurate information about global infection rates tied to the Coronavirus/COVID-19 pandemic in a bid to infect computers with malicious software.”

 

What does this mean for you? Your computer could be susceptible to contracting malicious password-stealing malware. How you ask? Just by checking an interactive dashboard of the Coronavirus infections and deaths produced by Johns Hopkins University.

 

Late last month, a member of several Russian language cybercrime forums began selling a digital Coronavirus infection kit that uses the Hopkins interactive map as part of a Java-based malware deployment scheme.

The kit “loads [a] fully working online map of Corona Virus infected areas and other data. The map is resizable, interactive, and has real time data from the World Health Organization and other sources. Users will think that PreLoader is actually a map, so they will open it and will spread it to their friends and it goes viral.”

At this point, we’re not sure how many computers have been infected, but earlier this week security experts began warning of new malicious websites using interactive versions of the same map to distract visitors while the sites tried to foist the password-stealing AZORult malware.

 

In this uncertain time, please take extra precaution before downloading new software onto your computer and contact us immediately if you think you have become a victim of cybercrime. 

 

CATEGORIES

Cyber Attack - Cyber Security - Data Breach - Defence - Penetration Testing

TAGS

SHARE

PrevPreviousAPI Security Top 5 Tips
NextBest Practices For Working RemotelyNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.