About: http://data.cimple.eu/news-article/97db878cc1bc5b293582a561a4c883cfeef6e099bdf57e1adbcc5e4a     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : schema:NewsArticle, within Data Space : data.cimple.eu associated with source document(s)

AttributesValues
rdf:type
schema:articleBody
  • Google on Wednesday warned that nation-backed hackers are exploiting the coronavirus pandemic to target health care organizations and those working to fight the pandemic. A security team tasked with defending against government-backed cyberattacks on Google and its users said it identified more than a dozen state-sponsored groups using COVID-19 themes as bait in phishing and malware traps. Early this month, Google reported that it was detecting about 18 million pandemic-themed malware or phishing messages per day and some 240 million COVID-linked spam messages. "Hackers frequently look at crises as an opportunity, and COVID-19 is no different," Shane Huntley of Google Threat Analysis Group said in a blog post. Examples of ploys included bogus solicitations for charities; messages crafted to appear as though sent from remote workers, and websites impersonating pages of governments or public health agencies. Huntley noted that one hacker campaign sent messages to US government workers with phony offers of free meals or delivery options available from fast food franchises because of the pandemic. Clicking on the emails led to online pages designed to trick people into providing user names and passwords to Google accounts, according to the security team. Most of the messages were automatically filtered as spam, and steps were taken to block access to deceptive websites asking for credentials, according to Huntley. "We're not aware of any user having their account compromised by this campaign, but as usual, we notify all targeted users with a 'government-backed attacker' warning," Huntley said. "We've also seen attackers try to trick people into downloading malware by impersonating health organizations." Some COVID-19 themed targeting of international health organizations discovered by Google was deemed the work of an Iran-linked group referred to as "Charming Kitten." Hackers allied under a "Packrat" banner traced to South America were said to have been behind emails linking to a fake World Health Organization website log-in page, according to Huntley. Google is tightening security at more than 50,000 accounts thought to be in the crosshairs of state-sponsored hackers, according to the California-based internet firm. "Generally, we're not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics," Huntley said. US and British security agencies earlier this month issued similar warnings, saying some 2,500 web addresses were linked to various fraud schemes. gc/rl
schema:headline
  • Nation-backed hackers tune attacks to COVID-19 fears: Google
schema:mentions
schema:author
schema:datePublished
http://data.cimple...sPoliticalLeaning
http://data.cimple...logy#hasSentiment
http://data.cimple...readability_score
http://data.cimple...tology#hasEmotion
Faceted Search & Find service v1.16.115 as of Oct 09 2023


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3238 as of Jul 16 2024, on Linux (x86_64-pc-linux-musl), Single-Server Edition (126 GB total memory, 11 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2025 OpenLink Software