Covid-19 has forced the majority of the workforce to work from home.  Hackers are taking advantage of this situation by tricking individuals into revealing confidential information and credentials to their company’s system.

Here are some phishing attack methods hackers are using to exploit the remote workforce:

1. Credential Stealing Phishing:

These phishing emails trick the user into revealing their username and password for work. They look legitimate and may appear as if they are coming from the user’s company.  The emails typically have a link or an attachment for the user to click on which then redirects the user to a fake site. The fake site usually asks the user to enter his or her credentials, but once entered, the credentials have been stolen. These emails usually ask users to reset email passwords, credentials for Dropbox, ShareFile, or SharePoint.

2. Covid-19 Phishing Attempts:

Hackers also use current news in their phishing attempts to entice users to open attachments or click links. The coronavirus has been a hot topic for months now and new information about it draws the user’s interest. They will use domains that appear to be from the CDC or WHO to trick users into thinking it is a legitimate source. In a trying time like this, when people are seeking new information they become susceptible to these traps.

3. Fake Identity:

Phishers like to target those who have HR or IT positions. Attackers like to pose as employees and request a password reset from IT support or ask for paycheck information about a specific account. Other types of scams include calls from people impersonating an IT support group. These scams typically ask the targeted user to allow them remote access to their machine which they then have full control over and can steal data or infect your system. Be cautious when you get a call from an IT support group, they should never ask for your passwords to anything.

To avoid these scams whether you are working remotely or in the office, train your staff on cybersecurity awareness and develop a verification process for any calls, emails, and/or people who walk in asking for access to the building that may not seem legitimate.

You must confirm the identity of anyone with who you are communicating. A simple way you can confirm someone’s identity is to come up with a secret word within your company that you can use to validate the identity of others. For example, If IT support calls an employee and asks them for remote access, the employee can ask for the secret word and if the IT support group does not know the secret word their identity cannot be confirmed and you should not proceed in providing them with any information.

Learn how Cybersecurity Awareness Training can work for your organization.