As COVID-19 cases have further spread over the past few weeks, our team has come across new lures that target an individual’s fear of coronavirus as it relates to their health insurance coverage. Both examples lead to malicious sites that attempt to steal Microsoft Office 365 login credentials.
We are providing ongoing updates on coronavirus-themed attacks observed by the PhishLabs team. This post and others are meant to help the security community stay up-to-date on how threat actors are exploiting the pandemic.
COVID-19 Health Insurance Purchase Lure
This lure claims to be from the potential victim’s health insurance provider indicating a recent purchase of COVID-19 coverage. In it, the scammer prompts the victim to click on the link to access their bill statement. This link redirects to:
Senders name and address are Covid Axu and abuse@createandgo[dot]com
COVID-19 Testing Coverage Lure
This second example uses a fake secure DocuSign notification, claiming to provide FAQs as they relate to your company’s health insurance plan, and more importantly, whether or not testing for COVID-19 is covered.
Senders Address was revealed to be spoofed and the link in question lead to:
A few of reasons why both lures are so compelling is that many employees are experiencing uncertainty around their jobs, their benefits, and healthcare coverage. As the pandemic has grown, numerous stories have emerged describing individuals concerned that they might have the virus and proactively getting tested, only to walk away with a negative diagnosis and hefty bill. Insurance or not, employees and individuals everywhere are looking for clarity into how testing and potential diagnosis will affect their pocketbooks, making phishing lures such as the above all the more effective and dangerous.
*** This is a Security Bloggers Network syndicated blog from The PhishLabs Blog authored by Jessica Ellis. Read the original post at: https://info.phishlabs.com/blog/covid-phishing-update-coronavirus-and-your-coverage