View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
May 6, 2020updated 07 May 2020 7:36am

Threat-Actors Will Try To Steal COVID-19 Related Data Warn NCSC and CISA

"A vaccine is undoubtedly the most valuable commodity in the world right now — and adversaries will stop at nothing to get access to it"

By claudia glover

The NCSC and CISA have released a joint warning aimed at medical research organisations to strengthen their cyber security, as groups of cyber threat actors conduct large-scale campaigns to mine COVID-19-related data.

The UK’s National Cyber Security Centre (NCSC) and the US Cyber security and Infrastructure Security Agency (CISA) have seen evidence of large-scale password spraying campaigns against medical bodies, where attackers try hundreds, “even thousands” of common passwords on company accounts to gain access.

Security officials have identified the targeting of national and international healthcare bodies such as pharmaceutical companies, research organisations and local governments, with the likely aim of gathering information relating to the coronavirus pandemic.

Read This! APT Actors Hitting UK Organisations via Trio of VPN Vulnerabilities: NCSC

Advanced Persistent Threat (APT) groups target such bodies to collect bulk personal information, intellectual property and intelligence that aligns with national priorities.

Recently, the NCSC and CISA have seen APT actors scanning the external websites of targeted companies to scour for vulnerabilities in unpatched software. Actors are known to take advantage of vulnerabilities in Virtual Private Network (VPN) products from vendors Pulse Secure and Palo Alto.

Technology strategist Zeki Turedi at cybersecurity company CrowdStrike explained to Computer Business Review why these organisations are at such a high risk:

“The NCSC is right to warn healthcare organisations involved in the coronavirus response that they are at huge risk. A vaccine is undoubtedly the most valuable commodity in the world right now — and adversaries will stop at nothing to get access to it. In fact, we have seen a 100x increase in malicious coronavirus-related files circulating in recent months.

Content from our partners
An evolving cybersecurity landscape calls for multi-layered defence strategies
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways

“Adversaries are leveraging COVID-19 lures to launch targeted attacks against an overstretched healthcare industry. We’re in a state of high alert when it comes to information pertaining to COVID-19 and the current situation has created the perfect storm.

“To defend against these threats, it’s crucial these organisations take a proactive approach and maintain a holistic view of their IT environment, with full control and visibility of all activity happening in their network. This includes having an understanding of the broader threat landscape so organisations can quickly identify adversaries and their techniques, learn from attacks, and take action on indicators to strengthen their overall defences.”

What is Password Spraying?

According to a survey conducted by the NCSC, 75 percent of the participants’ organisations had accounts with passwords that featured in the security centre’s top 1,000 most popular, and 87 percent had accounts with passwords that featured in its top 10,000.

These sorts of passwords are easily bypassed by regular expression attacks, with tools that are open source (freely available online). A first mode regular expression attack will try a supplied password list file, which includes the likes of password123. It only takes a few seconds for a password cracker to extract the root password and user password from the password hash file, gaining quick and easy access into the organisation.

Access to even one account is enough for an APT group to extract all of the information they need. The report urges healthcare bodies and medical research facilities to use NCSC and CISA guides detailing how to protect against password spraying attacks, with techniques including multi-factor authentication and the regular audit of passwords against common password lists. The full report can be found here.

Don’t Leave Before You’ve Read This! Mulesoft Founder Ross Mason Talks APIs, Data and Culture Shift

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU