{"id":1216,"date":"2020-12-07T10:49:57","date_gmt":"2020-12-07T10:49:57","guid":{"rendered":"\/cybersecurity-blog\/?p=1216"},"modified":"2022-12-21T06:52:10","modified_gmt":"2022-12-21T06:52:10","slug":"covid-themed-attacks","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/","title":{"rendered":"The Year in Review: the COVID-19-themed Attacks"},"content":{"rendered":"\n<p>ANY.RUN is a malware sandbox that has a database with more than 2 million submissions. Every day 8,000 tasks are run by users all over the world. And a lot of samples are connected with COVID-19.&nbsp;<br><\/p>\n\n\n\n<p>On November 17, 2019, the first case of Coronavirus was recorded. More than a year ago the virus hit the world, all spheres, organizations, and people, forcing everybody to get used to the new reality. <\/p>\n\n\n\n<p>And cybersecurity has been affected by it, too. This topic is still taking over as the most popular decoy used by spammers and phishers. Cybercriminals apply social engineering to capitalize on people\u2019s concerns about the global outbreak of disease.&nbsp;<br><\/p>\n\n\n\n<p>Today we\u2019ll discuss how a year with COVID-19 impacted cybersecurity from ANY.RUN\u2019s point of view.<br><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Phishing decoys with COVID-19<\/strong><br><\/p>\n\n\n\n<p>Criminals always take advantage of major events in phishing campaigns. The COVID-19 outbreak has become the reason for fear and uncertainty in all spheres, so it has become an ideal disguise for attacks. Phishing has increased a lot due to the Coronavirus. And threat authors spread malware to steal personal information using various options.&nbsp;<br><\/p>\n\n\n\n<p>Based on the ANY.RUN\u2019s submissions,&nbsp; we can report that there are different kinds of phishing decoys that malware uses. Thanks to the service\u2019s interactivity we could detect various malicious programs that were hiding behind these examples:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Advertisements for Coronavirus services and products&nbsp;<\/strong><\/li><\/ul>\n\n\n\n<p>Facemasks, medical supplies, special offers &#8211;&nbsp; these advertisements make users fall for the clickbait. But these actions can lead to information extraction from the victim\u2019s computer system, its infection, and collecting credit card data.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/StPYKySuiFCBNQv0liCRPj-5K9AoyE2CxxXa9LsL2f5BVYxtvMJH_gOU7FGOCkGZLmOpbDoLhKpIst6UbDNsVLWFuzuVZIAcNSJsEk1J3Xwh28SbeVSoVXRvUwFoWEUr3jBGzav-\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2020\/12\/2-2.png\" alt=\"\" class=\"wp-image-1249\"\/><\/figure>\n\n\n\n<p>If you like you can check out the tasks with <a href=\"https:\/\/app.any.run\/tasks\/f7cfbd04-68ec-4ff4-90b7-e90c71778e2b\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the smell test sample<\/a> and <a href=\"https:\/\/app.any.run\/tasks\/3ca0ef2c-87e3-47a4-ad5c-fb237fef20a9\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the temperature screening example<\/a>. <\/p>\n\n\n\n<p>The dark web also contributes to the corona sale: cybercriminals sell malware and exploitation tools using COVID-19 codes and discounts. Hackers are offered to buy phishing email kits, Facebook account hacking tools, or malware-as-a-service.&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Coronavirus-Related Maps<\/strong><\/li><\/ul>\n\n\n\n<p>Threat actors create different attachments and websites that display a map representing <strong>Coronavirus spread.<\/strong> It offers users to click or download an application to stay informed of everything that happens. The map generates a malicious binary file and infects targets\u2019 computers.<br><\/p>\n\n\n\n<p>In this case, criminals may use <a href=\"https:\/\/any.run\/malware-trends\/azorult\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">AZORult malware <\/a>to steal users\u2019 browsing history, cookies, IDs, passwords as well as install other malware.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/Xs-n85o-gYMIdV4Y1bSx39FJox7c2wUkFN8R0JJ171cNfyr6MM1ujVh5jjYOSyLRSYyZxTEIIYqJNqgdLAxYfzML56Okl8dZfNpTB_tQmEip6Uzb08e2soXK8wNzDHmLGYJlqfZ6\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/33a50319-4759-4610-9f01-c15968819428\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">The map task<\/a> is available for your research, don&#8217;t forget to have a look!  <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Vaccine<\/strong>&nbsp;<\/li><\/ul>\n\n\n\n<p>Promises of a vaccine are actively used in phishing. Drug companies developing vaccines as well as common users become targets of malicious attacks.<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Coronavirus News Stories<\/strong><\/li><\/ul>\n\n\n\n<p>The Coronavirus latest <strong>updates<\/strong> are a very popular topic in spam and malicious emails. They pretend to be the Ministry of Health newsletters or others. It can provide <strong>recommendations<\/strong> on how to avoid infection in an attachment but instead of advice, you get malware.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/d9qXqSX_zSmHn72Vn4cISNyogGqJ1jATHkmd4akUW6KWcFeaJ61Wt1xKhKxgYNEoV4kLL7zq_PMebqFQiyWcFsSmhyhGV9ELKfREJTbUfCeBgDUw8HFRNxNtphFWigDdxqvuzikN\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/l33A6-Gj_EpT-7ITK3aI7__0veE37tj97VKwyV7K8MIVslqIyBa8VKzg3qMeQwakmBo5EJ2-n2aC7AZlWxeX9o65u6NbG6jN1hTAGaymGP0lQNd6NUZ-VuGK4USxeP5iK9SuU9du\" alt=\"\"\/><\/figure>\n\n\n\n<p>Try out the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/app.any.run\/tasks\/655bf4a5-88c3-4e62-845d-308fcc0b4cc8\/\" target=\"_blank\">statistics example<\/a> and <a href=\"https:\/\/app.any.run\/tasks\/03a9fd05-21c9-47ba-819b-9edc4155d92d\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"the updates example  (opens in a new tab)\">the updates example <\/a>by yourself. <br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Coronavirus funds and payments, job listings<\/strong><\/li><\/ul>\n\n\n\n<p>Cybercriminals send emails faking reliable and official organizations like the Federal Trade Commission, with information about the virus and special funds, that can provide some <strong>financial help. <\/strong>Hundreds of people found themselves unemployed because of the pandemic. And it drives them to click on opening malicious emails with job possibilities or payment offers and forms. However, embedded links and attachments are most likely to lead to the infection by malware.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2020\/12\/6.png\" alt=\"\" class=\"wp-image-1251\"\/><\/figure>\n\n\n\n<p>Would you like to trace<a href=\"https:\/\/app.any.run\/tasks\/00ae60d2-fa59-4400-b3ed-197501b53171\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> the fund sample&nbsp;<\/a>and find out what malware this decoy contains? Just go ahead and do it!<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>School updates<\/strong><\/li><\/ul>\n\n\n\n<p>Instead of faking information on the virus, threat actors leverage school updates and job listings related to the topic. For example, many schools require the health information of students as part of their safety protocols. In October, the University of British Columbia staff suffered from ransomware while completing a phony health survey.<br><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>File extensions types of COVID-19 decoys<\/strong><br><\/p>\n\n\n\n<p>Crooks lure people into taking risky actions by various phishing decoys. And victims buy for them without a second thought about the consequences, because all baits look valid. Everything is applied: from malicious documents to web pages that save files with the \u201cCoronavirus\u201d name in the system.<br><\/p>\n\n\n\n<p>First of all, it\u2019s worth mentioning the <strong>file names<\/strong> that trigger users the most:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Name list for funds or payments<\/li><li>Donation proposal<\/li><li>COVID-19 update\/situation report\/news summary<\/li><li>General information on Coronavirus disease<\/li><li>Coronavirus Checklist\/guidelines for employees and organizations<\/li><li>COVID-19&nbsp;Measures&nbsp;<\/li><li>Test form\/application<\/li><\/ul>\n\n\n\n<p>Here are the most common file extensions with examples. And don\u2019t forget that you can investigate all the tasks mentioned by yourself.<br> <\/p>\n\n\n\n<p><strong>\u2013 PDF<br><\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/3fd3919a-a5b6-4190-a6f0-d498f8619091\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">The PDF task<\/a>&#8216;s file is supposed to contain hospital information on the virus, but the link leads to stealing a password.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/c6a4xQg03YXsJSNISMWMtReVdV-gOxK3c8jRufq9mgM87Xg4cbLngp0fYvohPeTEktG4scFGyOniumW3Q_Dlw46GDIEZ3G-edHWXlrYjUSfMU5494cC4K-Ihajdl5-Ukkqesq044\" alt=\"\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>\u2013 documents<br><\/strong><\/p>\n\n\n\n<p>For example, <a href=\"https:\/\/app.any.run\/tasks\/d1e103b5-afe4-4091-8541-588cb990c258\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the document sample<\/a> offers coronavirus-related tax relief measures and a Netwire as a bonus.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/H77IF_tlJ5lzaimCWilH0_tom1eYdjxDc6MwIcTLJ3t4S4QB5iV3sksnQgWiPCQog9Pp_JOKm4h4rjTYT53EXNF8oIpid-jDYIGauKTH8T7Y0bkuhfVjXwd17nQj2pWhRB1tti53\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>\u2013 sites<br><\/strong><\/p>\n\n\n\n<p>Every day 1,767 high-risk Coronavirus-themed domain names are created. There are more than 5 billion pages related to the topic on the Internet. Have a look at one of them in <a href=\"https:\/\/app.any.run\/tasks\/69bde0ef-fce9-4c85-93f6-a8fec0c1f6dd\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the site task<\/a>.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/qU6bp5Ro1qVOG9XeATwvkkExNTxbJ7w2byDyx4gcpbgFmSW8Ug8_WYZHCUppvsdoIc3VrDOi1d_10OlDu2m0pOrgLtLFNeGkJvhNRwEzp0JD5Snt8tOjmZkvpCrdwZal5XVVvgFx\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>\u2013 EXE<br><\/strong><\/p>\n\n\n\n<p>The following file from <a href=\"https:\/\/app.any.run\/tasks\/d673ead0-df9f-4b50-a36d-e3a1a4e62f2f\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the EXE sample<\/a> is a live tracker, that attacks the network and has several malicious connections.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/MtdLULIDTZaNKXBMSmkqbZc7qvAUrtnfiaL21N2cWfgEV3PtE-ShP5rGQABZv0uo9dVJwv51MBzOL2DVPMzdNOyZ-Oti8NjxWl-YA7AMNB3nlEu40rKWFv0q6qV62GvJC5wHZw9b\" alt=\"\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>\u2013 archives<br><\/strong><\/p>\n\n\n\n<p>Malicious connections and a detected Network trojan come as a surprise in this<a href=\"https:\/\/app.any.run\/tasks\/e9e65740-4caf-4604-b6bb-58e4fd44fb8b\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> archive example<\/a>. We bet, this opposite of what you\u2019re hoping to unpack.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/zW4QWelNK_MSQXENTfeaMyCGU2XR6XSfEASgl1Xby2CcdyS202JlepC-7rFYxLECYicLUlQYmto34yDr0AXA-wB0BEJ_l04rCxJqTJ3jOCPPB2EK2v8uO_3GuTEjLYTtA3kB_vT0\" alt=\"\"\/><\/figure>\n\n\n\n<p>These tempting decoys are spread and used widely. But what\u2019s waiting for the victim if they can\u2019t resist a clickbait? Let\u2019s talk about the top malware that hackers prefer during the Coronavirus outbreak.&nbsp;<br><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Malware used during the pandemic<\/strong>&nbsp;<br><\/p>\n\n\n\n<p>Malware writers exploit all kinds of malware and tactics masking behind the virus and benefiting from it. There is no unified structure that criminals follow and all sectors are at risk.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2020\/12\/Frame-609-1.png\" alt=\"\" class=\"wp-image-1231\"\/><\/figure>\n\n\n\n<p>In the figure above you can see the statistics of threats by uploads with the Covid-19 theme for the December 2019 to December 2020 period. There are <strong>13192<\/strong> virus-themed samples from<a href=\"https:\/\/app.any.run\/submissions?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in_house&amp;utm_content=covid\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> the public submissions<\/a> that we analyzed. Of course, not every sample with the COVID-19 tag is malicious. But <strong>6052<\/strong> tasks appeared to contain malware or do any other harmful activities.<br><\/p>\n\n\n\n<p>And there are some notable <strong>results of our analytics:&nbsp;<\/strong><br><\/p>\n\n\n\n<p>Agent Tesla, Emotet, Lokibot, Nanocore, and Netwalker are the <strong>top 5 malware <\/strong>capitalizing on the virus. Here are the reasons why they\u2019ve become so successful.<\/p>\n\n\n\n<p><br>1. <a href=\"https:\/\/any.run\/malware-trends\/agenttesla\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Agent Tesla<\/a><\/p>\n\n\n\n<p>The spyware is very affordable for attackers, about $15-70. Authors of the malware are ready to help criminals who have even no technical background with support, customizable options, and expanded functionality. Moreover, it has good evasion techniques.<\/p>\n\n\n\n<p>2. <a href=\"https:\/\/any.run\/malware-trends\/emotet\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Emotet<\/a><\/p>\n\n\n\n<p>A sophisticated malware that developed from a standard Trojan to the polymorphic distributor of other malicious programs. Emotet is extremely hard to clean up. In addition, it can evade sandboxes, change its code, receive updates, and adapt to different attacks.<br><\/p>\n\n\n\n<p>3. <a href=\"https:\/\/any.run\/malware-trends\/lokibot\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Lokibot<\/a><\/p>\n\n\n\n<p>Criminals who use Lokibot in their attacks are able to install additional malicious software. Besides, it contains a keylogging feature.&nbsp;<br><\/p>\n\n\n\n<p>4. <a href=\"https:\/\/any.run\/malware-trends\/nanocore\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Nanocore<\/a>&nbsp;<\/p>\n\n\n\n<p>This accessible RAT is very easy to use and has a big range of configurations for attackers\u2019 needs.&nbsp;<br><\/p>\n\n\n\n<p>5. <a href=\"https:\/\/any.run\/malware-trends\/netwalker\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Netwalker<\/a><\/p>\n\n\n\n<p>The notable Netware feature is that it&#8217;s written in PowerShell so it executes directly in memory and without storing the actual ransomware binary into the disk. This makes the ransomware a real challenge to detect.<br><\/p>\n\n\n\n<p>The usage of the malware above is constantly increasing. And it\u2019s no surprise, as they have such an environment to thrive in. Let\u2019s have a closer look at the most popular malware types, their features, and tactics to be aware of how they usually act.&nbsp;&nbsp;<br><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Popular malware types<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2020\/12\/Frame-611-1-1.png\" alt=\"\" class=\"wp-image-1244\"\/><\/figure>\n\n\n\n<p>Here are the most popular malware types that are on the rise during the pandemic according to the ANY.RUN\u2019s uploads:&nbsp;<br><\/p>\n\n\n\n<p><strong>1. Trojan<\/strong><\/p>\n\n\n\n<p>Trojan malware is designed to take over your machine<strong>.<\/strong> It is capable of damaging, disrupting, stealing, or other harmful actions with data or networks.&nbsp;<br><\/p>\n\n\n\n<p><strong>2. Loader<\/strong><\/p>\n\n\n\n<p>These viruses\u2019 main goal is to install other malware on the infected system. Basically, this type drops an infected payload. However, they can steal data or be engaged in spying.<br><\/p>\n\n\n\n<p><strong>3. RAT<\/strong><\/p>\n\n\n\n<p>With Remote Access Trojan a victim doesn\u2019t even know that their computer is monitored and controlled. The remote access gives attackers the possibility to control infected machines completely and anonymously.&nbsp;<br><\/p>\n\n\n\n<p><strong>4. Stealer<\/strong><\/p>\n\n\n\n<p>As you know, an information stealer gets into an infected device and collects your personal information to send it to criminals.&nbsp;<br><\/p>\n\n\n\n<p><strong>5. Ransomware<\/strong><\/p>\n\n\n\n<p>Some of the \u201cteams\u201d behind ransomware such as Netwalker besides encrypting data and demanding a ransom to restore it, use the double-extortion ransomware. It threatens<strong> t<\/strong>o publish or sell the enciphered data if there is no payment.&nbsp;<br><\/p>\n\n\n\n<p>According to the latest research, the number of ransomware attacks is estimated at <strong>199.7 million cases<\/strong> in the 3d quarter of 2020 globally. Considering that the US only suffered from 145.2 million ransomware hits, which is a 139% year-over-year increase compared to the previous year.&nbsp;<br><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Remote<\/strong> <strong>work<\/strong>&nbsp;<br><\/p>\n\n\n\n<p>COVID-19 forced organizations to get adapted to remote work very quickly. There is no corporate perimeter now, where companies used to organize everything centrally. Working remotely requires profound security improvements. You should also get ready that remote work isn\u2019t going anywhere in 2021.<br><\/p>\n\n\n\n<p>And every employee needs to contribute to avoid any <strong>data exposure<\/strong> and securely navigate their work tools. Being aware of possible threats and getting to know even basic precautions can help to prevent damage. So, staff education should be one of the main concerns, especially taking into account social engineering schemes in attacks. You should also know <a href=\"https:\/\/any.run\/cybersecurity-blog\/working-remotely-in-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">how to work remotely in the cybersecurity sphere<\/a> and the way to structure your work from home.&nbsp;<br><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>How can ANY.RUN help?<\/strong><br><\/p>\n\n\n\n<p>The more and more types of malware use the decoys connected to COVID-19. And&nbsp;in <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in_house&amp;utm_content=covid\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN (opens in a new tab)\">ANY.RUN<\/a>, we try to help users get through scams, bring malware to light, and not fall for its tricks.&nbsp;&nbsp;<br><\/p>\n\n\n\n<p>Here are several perks you can use to avoid pandemic related threats:&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>ANY.RUN is an <strong>online sandbox:<\/strong> it\u2019s essential, especially with remote work. You can investigate suspicious attachments or other files received by your organization&#8217;s employees, and that is totally safe. Export IOCs from your tasks or other users public tasks and import them into your security tools, so you can block access to phishing sites from your network or detect suspicious activity in it;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>ANY.RUN\u2019s <strong>interactive approach:<\/strong> malware from files, emails, web pages, or apps can require some human engagement to start its execution. So, any user can go ahead and do it in the virtual machine &#8211; you can click, move a mouse, open a browser, input data to provoke a malicious program.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>ANY.RUN provides a <strong>database<\/strong> of COVID-19 samples to research examples. You can analyze all existing cases to improve your security. And if you\u2019re interested in various kinds of malware, you\u2019re free to explore more than 2 million samples that are updated daily.&nbsp;&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<p>If you want to know more about how Coronavirus malware was detected in ANY.RUN, check this <a href=\"https:\/\/www.youtube.com\/watch?v=vRAMo4Mil4s&amp;t=71s\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">video<\/a> for more samples and reviews.&nbsp;<br><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Conclusion<\/strong><br><\/p>\n\n\n\n<p>Malware develops as it usually does when major events happen. The pandemic struck hard, and cybersecurity faced a lot of attacks. If you don\u2019t want to break under the malware pressure, get prepared. With ANY.RUN, you can improve your work and become stronger &#8211; exactly what we need these days.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Stay safe!<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN is a malware sandbox that has a database with more than 2 million submissions. Every day 8,000 tasks are run by users all over the world. And a lot of samples are connected with COVID-19.&nbsp; On November 17, 2019, the first case of Coronavirus was recorded. More than a year ago the virus hit [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3413,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[10],"class_list":["post-1216","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The year in review: the COVID-19 themed attacks\u2014 ANY.RUN Blog<\/title>\n<meta name=\"description\" content=\"The year statistics of cyberthreats connected with Coronavirus. Find out about top decoys and malware used by hackers during the pandemic.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"The Year in Review: the COVID-19-themed Attacks\",\"datePublished\":\"2020-12-07T10:49:57+00:00\",\"dateModified\":\"2022-12-21T06:52:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/\"},\"wordCount\":1916,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/\",\"name\":\"The year in review: the COVID-19 themed attacks\u2014 ANY.RUN Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2020-12-07T10:49:57+00:00\",\"dateModified\":\"2022-12-21T06:52:10+00:00\",\"description\":\"The year statistics of cyberthreats connected with Coronavirus. Find out about top decoys and malware used by hackers during the pandemic.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malicious History\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/history\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Year in Review: the COVID-19-themed Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The year in review: the COVID-19 themed attacks\u2014 ANY.RUN Blog","description":"The year statistics of cyberthreats connected with Coronavirus. Find out about top decoys and malware used by hackers during the pandemic.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"The Year in Review: the COVID-19-themed Attacks","datePublished":"2020-12-07T10:49:57+00:00","dateModified":"2022-12-21T06:52:10+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/"},"wordCount":1916,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/","url":"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/","name":"The year in review: the COVID-19 themed attacks\u2014 ANY.RUN Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2020-12-07T10:49:57+00:00","dateModified":"2022-12-21T06:52:10+00:00","description":"The year statistics of cyberthreats connected with Coronavirus. Find out about top decoys and malware used by hackers during the pandemic.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/covid-themed-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malicious History","item":"https:\/\/any.run\/cybersecurity-blog\/category\/history\/"},{"@type":"ListItem","position":3,"name":"The Year in Review: the COVID-19-themed Attacks"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1216"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1216"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1216\/revisions"}],"predecessor-version":[{"id":3792,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1216\/revisions\/3792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3413"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}