As the Coronavirus continues to impact the world, we are experiencing many changes in the
way that we work. These changes include utilizing Virtual Private Networks (VPNs) and
personal devices to achieve our individual and organizational missions. Many users are working
from home and have shifted the location and time of their work, which reduces our ability to
identify unusual access. Hackers have noticed these changes, and are adapting their attacks to
improve their chances of deploying ransomware and successfully attacking critical
infrastructure.


Some examples of the techniques employed by hackers that you should consider, specifically
related to the Coronavirus threat are:


● urgent emails requesting that you visit a website, install software, or reply with sensitive
information;
● emails that purport to be from a co-worker or supervisor, where the email address
doesn’t match their work email;
● websites that you typically visit unexpectedly requiring the installation of software;
● emails from known or unknown parties, requesting that you forward chain letters,
quizzes, surveys, or other information that is not part of your job function;
● and phone calls purporting to be from the help desk or other IT resources.