← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 73/100

COVID-19 phishing and malware surge

CISA Alert AA20-099A documents how COVID-19-themed phishing, SMS lures, and remote-work exploits are hammering enterprises, urging security teams to double down on MFA, telework hygiene, and IOC monitoring.

Fact-checked and reviewed — Kodi C.

Cybersecurity pillar illustration for Zeph Tech briefings
Cybersecurity threat, control, and response briefings

Overview

On , CISA and the UK's National Cyber Security center (NCSC) issued joint advisory AA20-099A warning that both cybercriminals and nation-state threat actors are weaponizing COVID-19 pandemic fears to conduct cyber attacks. The advisory documents widespread credential phishing, malware distribution, SMS-based lures, and remote work infrastructure exploitation targeting enterprises during the global shift to distributed operations.

threat environment During the Pandemic

The advisory describes a dramatically elevated threat environment created by pandemic conditions:

  • Expanded attack surface: Rapid deployment of remote access infrastructure created new vulnerabilities as organizations focus ond business continuity over security controls.
  • Fear-based social engineering: COVID-19 anxiety creates effective lure material for phishing campaigns, with users more likely to click links promising health information or economic relief.
  • Dual threat actors: Both financially motivated criminals and nation-state espionage actors are exploiting the pandemic, though with different objectives.
  • Reduced security oversight: IT and security teams face operational challenges supporting remote workforces, potentially reducing detection and response capabilities.

Phishing Campaign Tactics

Threat actors are using pandemic themes across multiple phishing vectors:

  • Health authority impersonation: Emails spoofing the WHO, CDC, or national health agencies with malicious attachments or credential harvesting links.
  • HR/employer communications: Fake internal messages about return-to-work policies, salary impacts, or benefits changes designed to harvest corporate credentials.
  • Government relief programs: Lures exploiting economic stimulus programs to capture personal or financial information from individuals.
  • Supplier notifications: Business email compromise campaigns using pandemic supply chain disruptions as pretexts for fraudulent payment redirection.
  • Video conferencing invitations: Malicious meeting invitations mimicking Zoom, Teams, or WebEx to deliver malware or capture credentials.

Malware Distribution Campaigns

COVID-19 themes are being used to distribute various malware families:

  • Remote access trojans: COVID-19 themed documents and spreadsheets delivering RATs that provide persistent access to compromised systems.
  • Information stealers: Malware designed to capture credentials, browser data, and cryptocurrency wallet information from infected endpoints.
  • Ransomware: Both targeted and opportunistic ransomware operators using pandemic themes for initial access before encryption deployment.
  • Mobile malware: Malicious Android applications masquerading as COVID-19 tracking apps, health information resources, or contact tracing tools.
  • Banking trojans: Financial malware targeting online banking sessions, particularly as consumers shift to digital banking during lockdowns.

SMS and Mobile Threats

Text-based attacks (smishing) present particular risks during the pandemic:

  • Delivery notifications: Fake package tracking messages exploiting increased online shopping during stay-at-home orders.
  • Government alerts: Spoofed emergency alerts or official notifications directing recipients to credential harvesting sites.
  • Health notifications: Fake exposure notifications or test results linking to malicious applications or data collection forms.
  • Financial alerts: Bank and credit card fraud alerts directing users to attacker-controlled sites.

Remote Work Infrastructure Exploitation

Adversaries are actively targeting the infrastructure supporting remote operations:

  • VPN vulnerabilities: Exploitation of known vulnerabilities in Citrix ADC (CVE-2019-19781), Pulse Secure (CVE-2019-11510), Fortinet (CVE-2018-13379), and Palo Alto (CVE-2019-1579) VPN appliances.
  • RDP exposure: Scanning and credential attacks against Remote Desktop Protocol services exposed to support remote work.
  • VTC hijacking: "Zoom-bombing" and unauthorized access to video conferencing sessions lacking adequate authentication controls.
  • Cloud service targeting: Attacks against cloud email, file sharing, and collaboration platforms handling increased remote traffic.
  • Home network compromise: Targeting of residential network equipment to enable man-in-the-middle attacks or pivot to corporate resources.

APT and Nation-State Activity

The advisory notes that advanced persistent threat groups are also exploiting pandemic conditions:

  • Healthcare targeting: APT groups conducting espionage against healthcare and research organizations involved in COVID-19 response.
  • Vaccine research: Attempted theft of vaccine development data, clinical trial information, and treatment protocols.
  • Government operations: Targeting of government agencies coordinating pandemic response for intelligence collection.
  • Supply chain intelligence: Reconnaissance of medical supply chains and critical infrastructure supporting pandemic response.

If you are affected, implement full defenses against pandemic-themed attacks:

  • Multi-factor authentication: Enforce MFA across all remote access vectors including VPNs, cloud applications, and email access.
  • VPN patching: Immediately verify patch status for all VPN and remote access appliances, particularly those with known exploited vulnerabilities.
  • Email security: Enhance email filtering for COVID-19 themed phishing, implement banner warnings for external messages, and enable advanced threat protection features.
  • Endpoint protection: Ensure endpoint security agents remain updated on remote devices and implement behavioral detection for document-based malware.
  • User awareness: Conduct targeted training on pandemic-themed social engineering, including phishing simulations using current lure techniques.

Threat Hunting Recommendations

Security operations teams should early hunt for pandemic-themed compromises:

  • Email analysis: Search mailboxes for COVID-19 keywords, suspicious sender domains, and attachment types commonly used in campaigns.
  • Domain monitoring: Track newly registered domains containing pandemic-related terms for potential use in attacks.
  • Network indicators: Monitor for traffic to known malicious infrastructure documented in the advisory and subsequent threat intelligence.
  • Behavioral analysis: Detect anomalous authentication patterns, particularly from residential IP ranges or during unusual hours.
  • Application monitoring: Identify unauthorized applications or browser extensions installed during the remote work transition.

Video Conferencing Security

If you are affected, implement controls to prevent meeting hijacking and related attacks:

  • Require meeting passwords and waiting rooms for all video conferences
  • Limit screen sharing capabilities to hosts or designated presenters
  • Distribute meeting links through secure channels rather than public posts
  • Enable participant authentication where supported by the platform
  • Record and review meetings for sensitive discussions

Incident Response Preparation

Your security team should prepare for pandemic-related incidents:

  • Update incident response playbooks to address remote workforce scenarios
  • Establish communication channels that function when employees are distributed
  • Pre-position containment capabilities for endpoints outside the corporate network
  • Document escalation procedures for pandemic-themed attacks requiring specialized response

Summary

Advisory AA20-099A highlights the opportunistic nature of cyber threat actors exploiting global crises to advance their objectives. The combination of expanded attack surface from remote work, effective social engineering material from pandemic fears, and operational challenges facing security teams creates elevated risk requiring improved vigilance. If you are affected, immediately implement the recommended controls while maintaining awareness of evolving pandemic-themed threats throughout the crisis period.

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Cybersecurity
Source credibility
73/100 — medium confidence
Topics
CISA · COVID-19 · Phishing
Sources cited
3 sources (cisa.gov, iso.org)
Reading time
5 min

Source material

  1. AA20-099A: COVID-19 Exploited by Malicious Cyber Actors
  2. CISA Alerts Archive — CISA
  3. ISO/IEC 27001:2022 — Information Security Management Systems — International Organization for Standardization
  • CISA
  • COVID-19
  • Phishing
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.