Remove Wuhan Coronavirus Phishing Scams — Protect Yourself
THREAT REMOVAL

Remove Wuhan Coronavirus Phishing Scams — Protect Yourself

This article has been created in order to explain to you what is the Wuhan Coronavirus Phishing Scams and how you can remove them as well as all potentially unwanted programs delivered through them.

One of the latest massive phishing campaigns which is in circulation at the moment is a family of Wuhan Coronavius phishing scams. They can take various forms and depending on the type will lead to various infections and/or issues for the system. Multiple hacking groups are believed to be behind the attacks however no detailed information is available at the moment.

Threat Summary

NameWuhan Coronavirus Phishing Scams
TypePhishing email scam
Short DescriptionThe Wuhan Coronavirus Phishing Scams is a recent example of scam strategy encompassing both email messages and web sites.
SymptomsVictims will receive email messages or will navigate to a scam site.
Distribution MethodPhishing emails.
Detection Tool See If Your System Has Been Affected by Wuhan Coronavirus Phishing Scams

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Wuhan Coronavirus Phishing Scams.

Wuhan Coronavirus Phishing Scams – Overview

The Wuhan Coronavirus Phishing Scams are regarded as particularly dangerous as they are effectively boosted by the media craze surrounding the dangerous virus. The computer criminals will take advantage of the fact that many people will search for information relevant to the threat. By impersonating various institutions and companies the hackers will manipulate the users and recipients into falling victim to the phishing scam.

There are several popular categories of identities that the hackers can impersonate:

  • Government Institutions and Agencies — One of the most common tactics is to impersonate various agencies and institutions of national and international government bodies. This can include a nation’s Ministry of health or associated agencies that are provisioned with notifying the population about the Coronavirus.
  • Pharmaceutical Companies — Big pharma and their subsidiaries which are currently developing drugs and tests for the Coronavirus will also issue notifications and press releases. The hackers can easily impersonate them as they can acquire the design elements and typical layouts used to distribute the information.
  • Media Sites — Media sites and particularly news portals can be easily crafted into spreading the so-called “fake news”. Inside the content the hackers can link in or embed malicious code and drive the visitors into interacting with all kind of potentially dangerous code.
  • Social Networks — This is one of the most popular and effective strategies that is used to spread malware files and manipulate the victims. Practically all popular services are affected: Facebook, LinkedIn, Twitter and etc.

Wuhan Coronavirus Phishing Scams In Japan

We received notification that a series of Wuhan coronavirus phishing scams are being launched against Japanese users. This is done under the form of malicious notifications which appear to be sent by two entities — fake disability welfare service provider and a public health center. The email messages appear to have copied legitimate text from government agencies. They also include attached Microsoft Office files that are malicious in nature and include dangerous macros. At the moment the downloaded payload is the Emotet launcher. According to the security research another spam campaign is expected.

It is believed that Japan is targeted as one of the first large-scale examples of Wuhan Coronavirus Phishing Scams due to the close proximity to China. The Japanese were quick to evacuate their citizens from Wuhan and responded in appropriate time to the virus outbreak.

Related: Coronavirus Emails Are Spreading the Emotet Malware

English language Coronavirus Phishing Scams

So far there are is a limited number of English-language campaigns that are actively sent against the prospective targets. One of the mechanisms is to impersonate a virologist from Singapore giving information about the outbreak. The messages include attached macro-infected PDF files that can be customized with different types of payload carriers.

Another recent example is the sending out of fake CDC notifications that instead of carrying dangerous macro-infected documents will include a text link to a hacker-controlled phishing site. It will be hosted on a domain name that will sound very similar to the real and legitimate home page. The criminals can change the address at will and make both layout, design and content changes at any time.

We expect further campaigns to be orchestrated soon and will be monitoring the situation.

Remove Wuhan Coronavirus Phishing Scams from Windows and Your Browser

If you want to remove the Wuhan Coronavirus Phishing Scams from your computer, we strongly suggest that you follow the removal instructions posted underneath this article. They have been created with the main idea In mind to help you delete this virus either manually or automatically. Be advised that according to experts the best way to try and remove the software that is causing the Black Friday 2019 Scamming pop-ups is to use an advanced anti-malware software. Such program is created with the idea in mind to fully scan your computer and try to eliminate any traces of unwanted programs while protecting your computer against future infections as well.

Avatar

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...