A Coronavirus campaign has targeted Japan that had malicious email attachments sent to it by a Japanese disability wellness service provider.
At a time when the Mobile World Congress (MWC) is taking on the deadly Coronavirus tech industry with the 2020 cancellation, Coronavirus related spam is spreading malware, security researchers said Tuesday.
According to researchers at Israeli cybersecurity firm Checkpoint Research, the Coronavirus related campaign targeted Japan, in which an inappropriate email was attached to which was sent by a Japanese disability wellness service provider.
It is being reported in the emails that in several Japanese cities where the infection is spreading, it encourages the victim to open the document, which, if opened, tries to download the emote on their computer.
“With malicious Coronavirus related spam campaigns that we expect to spread more widely in the coming days, our investigation reveals that the websites of the Coronavirus in their domain names are also involved in scam websites. Has been accused of selling the vaccine against using the virus.” Venugopal N, Director of Security Engineering, Checkpoint Software Technologies, said in a statement.
The reports also identified a malicious Lokibot sample – which is the eighth most popular malware this month – targeting Indonesia, with emails sent about how people in Indonesia can best protect themselves against the virus.
Emotet is an advanced, self-propagating, and modular Trojan
It was initially a banking Trojan, but it has recently been used as a distributor for other malware or malicious campaigns.
Various methods have been used to maintain detection and evasion techniques to avoid detection. It can also spread through phishing spam emails that contain malicious attachments or links.