

It is best to rely on official government and other reputable websites for information. Some of the most common scams are described below. It's like operating a factory assembly line, where various jobs are running, providing immediate action with speed and scale.Scammers are taking advantage of the fear and uncertainty surrounding the COVID-19 coronavirus. Finally, Cortex XSOAR provides additional context by ingesting active threat intel feeds, making it easier and faster to respond. Cortex XSOAR will then compare these indicators with internal and external repositories, tag them and add them to external blocklists. Employees submitting suspicious emails to infosec teams will trigger a COVID-specific playbook that will extract all the relevant indicators like URLs, domains and links. Security teams can save time and automate their COVID-related incident workflows to run at machine speed. They’re in use in our own security operations center, reducing our phishing response time from 30 minutes down to about 10 seconds. Automated phishing playbooks are among the most popular use cases for Cortex XSOAR. This is where Cortex XSOAR automated playbooks can help. There needs to be an automated way to collect, correlate, verify and document these incidents. It is not humanly possible to deal with this type of volume manually. To put things in perspective, Google reported 18 million COVID-19 related emails in a few weeks in April 2020. What's better than crafting a coronavirus-themed email that appears to be coming from the CDC?įigure 1: COVID-19 phishing email exampleĪs a security analyst, you can expect a lot of these types of emails flooding your employees’ inboxes across the enterprise. Phishing is the easiest way to target victims who are always looking at the next big pandemic update. They need more resources, streamlined processes and automation to take care of mundane tasks, prioritize tasks and incidents, and focus on malicious and relevant threats to their environment. Unfortunately, security teams are overwhelmed with a surge of alerts, managing an influx of requests from other departments and working with scarce and remote siloed teams.

Whether registering new websites with coronavirus-related names or sending COVID-19 phishing emails, cyber criminals aim to lure an anxious populace into a new web of attacks.Įnterprises want to prevent these attacks and protect their remote workforce. Hackers are accelerating their attack campaigns with original and proven techniques – often designed to take advantage of the pandemic. The attack surface is growing, providing lucrative opportunities for those who want to exploit this new norm. With COVID-19 now a global pandemic, the rapid expansion of the remote work environment has opened up new challenges for enterprises.
