Hackers are using coronavirus-themed phishing lures to go after DOD networks

A National Guard soldier directs traffic at a drive-in testing station in Westerly, Rhode Island. Hackers are using the pandemic to go after DoD networks. (Getty Images)

Share

Written by

Cybercriminals have been targeting U.S. military organizations with coronavirus-related spearphishing schemes, the Department of Defense Cyber Crime Center (DC3) said Monday in a blog.

“Even though many supplies, services and leisure activities have slowed down or come to a screeching halt, the one thing that has remained the same — or even gained momentum — is cyber-espionage,” the DC3 said in the blog.

According to DC3’s assessment, those behind the campaign aren’t just targeting defense industrial base companies and their networks — the goal is to break into systems run by the DOD.

While cybercriminals and nation-state hackers have been targeting businesses and individuals around the world for months with coronavirus-themed spearphishing and spyware operations, it’s the first time the Pentagon has publicly said its own networks are coming under fire from hackers seeking to exploit the fears surrounding the pandemic.

The blog comes via DC3’s information sharing outreach, which offers threat intelligence and other assistance to the defense industrial base, according to Krystal Covey, the director of the DOD-DIB Collaborative Information Sharing Environment (DCISE).

“This crowd-sourced threat-sharing allows for near real-time collaboration, enabling members of the partnership and U.S. government agencies to potentially detect, deter and remediate before an incident occurs or escalates,” Covey said in a statement. “The public-private partnership that exists between the DIB partner companies and the DOD is built upon a foundation of trust, which is vital to critical cyberthreat information sharing.”

One company reported to the Pentagon that they had received an email that appeared to come from the Centers for Disease Control and Prevention, but actually directed targets to a credential-harvesting website. Another DIB organization found a “U.S. government Central Authentication Service login service was using a web service as an open redirect.”

That service in particular was taken offline in late March so that the malicious activity could be investigated, according to DCISE.

It was not clear if any of the hackers’ targeting operations had been successful or if any data from a company or DOD networks themselves had been exfiltrated.

-In this Story-

coronavirus, cybercrime, defense contractors, Department of Defense (DOD), information sharing, Pentagon, U.S. Cyber Command
TwitterFacebookLinkedInRedditGoogle Gmail