Skip to main content

Next up in malware, COVID-19

What do scammers and hackers do when everyone in the world is panicking? Capitalise on it, of course! With COVID-19 on everyone's minds at the moment, it's now being used to manipulate people out of their money, account details and IT security.

Why use COVID-19 for malware?

The intention behind malware is to get information from you; whether that's banking information or passwords, it's your information that's of value. To do that, hackers have to figure out clever little ways to get you to part with that information. This is achieved through a nice incentive (a wealthy price is dead or dying, please send over your banking information to receive millions of pounds imminently) - or, with a threat (your email account has been compromised, quick, send us your login details so we can 'fix' it).

The second approach to malware is often more effective, because as soon as a victim starts to panic, they're more likely to make decisions quickly without thinking them through first.  COVID-19 is the perfect vehicle for malware, because everyone is already a little on edge (if the toilet paper and pasta shortages are anything to go by). We're all a little more likely to click that weird looking link, answer that dodgy email and think it through later.

So how are hackers using COVID-19?

There are a number of different ways that malicious individuals are capitalising on this situation. In the past week we've seen phishing emails from scammers pretending to be companies we know, sending emails loaded with dodgy links to our inbox. Text messages from healthcare providers, announcing that there's been an outbreak in our area and to click this definitely-not-full-of-malware link to find out if we're at risk. To keep clear of these kinds of scams, we'd encourage you to follow guidance from our phishing article.

More recently, malware is appearing on sites and applications that are meant to provide information about COVID-19. One of the most worrying methods that we've seen is a malware infested version of the live coronavirus map, which is obviously getting a fair amount of traffic. If you want to find out more about this, you can read an article about it here. Essentially, the map is an accurate and up-to-date version of the coronavirus map, but is designed to be sent via email to be downloaded onto a victim's PC. This kind of malware doesn't immediately encrypt everything, but sits quietly on your computer, we assume collecting all your information in the background.

How can I avoid COVID-19 malware?

Our advice is to not open any attachments from senders you don't know; and if you're in any doubt about an email or attachment from a known sender, seek out the information online yourself rather than clicking any links. If the information is legitimate, it should also be listed online. In order to access accurate, non-malware infested information about COVID-19, please use trusted websites only. 

Tweet us @TranscenditUK


The Transcendit Way

Transcendit understand that when you choose to work with us, whether we're taking care of your IT, app or web development, you're trusting us with part of your business. So whether we're looking after your computers, phone systems or servers we always do things 'the Transcendit way'.

The whole of our team adhere to the same values, beliefs and policies - the principles that were written when Transcendit first formed in 2000. Whether you come to us for cloud services or recovery backup you can be confident that you'll always receive the same excellent service.

The Transcendit way outlines how we do business; following the same straightforward principles with every client and customer, regardless of how big or small they may be.

That means we get to know you and your business. We offer you a friendly, professional and efficient service, and we'll always be honest with you.
We understand that not everybody speaks fluent IT, so we try to explain things in a way that is simple and clear. We always spend as much time as is necessary explaining things to you.
If you need to talk to us about something, no matter how insignificant, we are only ever a phone call away – and we’re never too busy to make you a cup of tea and have a sit down with you in person.
We understand how frustrating it can be when things are late. When we schedule an appointment with you, we are there when you’re expecting us. If something prevents us from getting there, we always call you in advance to let you know.
Sometimes things can go wrong, but we never lie to you or try to cover something up. If things go askew we tell you what’s happened and how we plan to prevent it affecting your business.
We want you to continuously benefit from working with us. We regularly discuss your business and make suggestions for improving systems and processes wherever we can – but we never try to push you into a purchase.
When we quote a fixed price, that's always the amount we charge – you won’t find any nasty surprises on a bill from us. If you are paying by time and materials, we inform you if our approximations could change.
We understand the importance of privacy for your business and your customers. We respect the confidentiality of your data, and we will never pass on your information to third parties.
We appreciate it when you take the time to give us feedback. A system called CustomerSure records our client's responses, so you can trust that our reviews are from real people.
Find out what they're saying here.
Just a quick note to say how thoroughly professional and exceptional the service is from Transcendit. Over the many years you have supported us, Christophe and the team have always been quick to respond, extremely knowledgeable, approachable and pro-active. Transcendit offer a fantastic service and it is greatly appreciated. Many thanks. Martin Alderman, Fylde Council

Based on 12075 reviews our customers rate us 9.8/10. Reviews and ratings by Customersure. 09-October-2024

Transcendit are proud sponsors of CHUF, the Children's Heart Unit Fund.

Transcendit is a Microsoft Gold certified partner
VMWARE partner
Vipre partner
IPCortex partner
WithSecure partner
DELL partner
Barracuda partner
Veeam partner
N-Able partner