Cyber criminals are using the stimulus bill and relief payments to exploit growing concerns about financial security. The examples below are impersonating financial institutions.
This post and others are meant to help the security community stay up-to-date on how threat actors are exploiting the pandemic.
The first example spoofs the sender's address to target a medical center. The actual email address uses a domain that is used for delivery scams no-reply@delivery-25871[dot]info created at hXXp://delivery-25871[dot]info/.
The threat actor abuses Google Docs to increase the likelihood of bypassing spam filters hXXps://docs.google[dot]com/document/d/e/2PACX-1vSUi-1GT3Xa4[redacted]
The redirect leads to a phishing site that has been taken offline. hXXp://chungcuirisgardenmydinh.net/wp-includes/class[dot]php
In the second example, the threat actor uses the spoofed sender's address security@[redacted]relief[dot]com.
The link leads to downed credential phishing site hXXp://theprplanet[dot]com/client_image/.flv/COVID19[redacted]/.
The last example also spoofs the sender's name. The actual address is [email protected].
Claim Now leads the victim to a banking phish hXXp://lle.grupovanguardia[dot]mx/[redacted]-covid19cash/index{dot}php
Questions around relief during the pandemic make enterprises susceptible to coronavirus-themed fraud. Malicious lures posing as stimulus funds, waived-fees, and credits are particularly compelling as some financial institutions are offering help to those experiencing hardship during the pandemic.