iVenture : 20 Years of Business Friendly IT

COVID-19 Isn’t The Only Virus To Avoid

As COVID-19 spreads so does panic, fear and fraud. The internet is now a minefield of coronavirus misinformation and malware. How can you protect yourself? The best protection is education.

As COVID-19 spreads so does panic, fear and fraud. The internet is now a minefield of coronavirus misinformation and malware. How can you protect yourself?

The best protection is education (along with a robust anti-virus software).

Learn what tricks hackers are using so you can identify them and avoid falling prey.

1.University Email Scam

Attackers used student concerns about COVID-19 to steal information via email.

Coming from the university “health team”, attackers designed emails to look university-official. These emails prompted students to click a fake URL. Once clicked, students were asked for their log-in credentials.

If inputted, hackers gained access to everything the students used with those credentials.

2.Text Message Virus

Sent through text, a fake coronavirus tracker unleashes malware without you knowing.

There are plenty of fake text chains going around. One recently about a government friend with insider knowledge.

This particular malware disguises itself as a coronavirus heat map (spoofing off the actual John Hopkins one). Once downloaded, hackers can read your text messages, watch you through your camera and listen to calls.

3.WHO Imposters

WHO imposters are scamming people out of money and PII (personally identifiable information).

The World Health Organization (WHO) had to address the rise of imposters. The bad players are using fake emails, phone calls, texts and even faxes to trick you.

4.RAT Malware Attachments

A phishing campaign disguised as a helpful guide reads your keystrokes instead.

This malware hides behind email attachments marked “coronavirus safety guides”. Once the attachments are clicked, malware begins reading your key strokes and sending the information to a database.

Hackers then use the information to infiltrate your accounts.

5.Coronavirus Credit Card

People looking for debt relief fall victim to a credit card scam instead.

With many people facing reduced work hours or even unemployment, credit card relief programs are a godsend. 

This scam sets up a fake landing page advertising just that. The fake landing page looks like a real financial institution. All you have to do is input your credit card information and they’ll take care of the rest. 

Not so fast. Once they’ve got your information, you’re left in the dust. Your bills remain and now your credit card is stolen.

These COVID-19 tricks are just a handful of what’s out there. To really protect yourself, someone’s got to have your back. We specialize in security measures to monitor and defend against anything on the internet.

Make internet viruses one less thing to worry about.

iVenture Solutions is an award-winning managed service provider delivering superior IT solutions to clients across Florida.

As a leading-edge IT firm for small and medium-sized businesses, we provide a diverse range of services covering the entire scope of IT including maintenance, support, hosting and more.

Through rapid response time, reduction of chaos and the right people, our expert team of IT professionals will fulfill your technology needs. At iVenture, we give you more time to do what matters most.

New call-to-action

Back to Blog

Recommended For You

Latest Article

Anatomy of a Cybersecurity Attack: A real-life account of what happens before, during and after

Anatomy of a Cybersecurity Attack

The real cost of a cybersecurity attack isn’t downtime. It’s what happens after recovery. Read this real-life account of a business’ cybersecurity attack.

4 Tips To Prevent Zoom Bombing and Other Video Chat Risks

4 Tips To Prevent Zoom Bombing & Other Video Chat Risks

You’ve probably read recent news articles about video chat risks. But you don’t have to worry. With these 4 cybersecurity tips, you can video chat safely.

Where Is Cybersecurity Headed: 2020 and Beyond

It may be the end Cybersecurity Awareness Month, but cyber-defense never stops.

The Mistake-free way to end remote work

The Mistake-Free Way To Bring “Dirty” Computers Back To Work

A must-read for IT managers. Learn the mistake-free way to bring unsecure, risky computers back to the workplace after remote use. Find out what security steps to take.