An unidentified group of malicious sorts impersonated a so-called “cold chain” company involved in COVID-19 vaccine distribution networks then targeted an EU governmental agency.
This carefully planned operation started in September 2020, according to IBM. Since the vaccines need to be stored and transported at temperatures between -20°C and -70°C, the bad actors posed as an executive from the Chinese arm of Haier Biomedical, a credible and legitimate member company of the COVID-19 vaccine supply chain.
Spear-phishing emails were sent targeting those working in sales, procurement, IT and finance departments and the EU’s Directorate-General for Tax and the Customs Union, attempting to steal any data possible.
Check the source.
Read More
- FBI: Business Email Compromise – a $43B ScamA new FBI report warns of a staggering spike in hacking activities using the Business Email Compromise technique (BEC), […]
- NVIDIA Confirms Employee Credentials And Proprietary Data Stolen During CyberattackNVIDIA confirmed the Lapsus$ cyberattack and the data leak that followed, saying it first became aware of the security […]
- FoxBlade Trojan Hit Ukraine Right Before The 24 Feb Devastating Russian InvasionMicrosoft discovered an attack using the FoxBlade malware that had compromised Ukrainian systems just hours before Russia’s massive and […]
- Anonymous Group Sides With Ukraine And Declares Cyberwar On RussiaThe hacker collective known as the Anonymous group announced its support to Ukraine. It defied Vladimir Putin by taking […]
- Phishing Attacks Against Those Who Help Ukrainian RefugeesCybercriminals used a compromised military email address to launch phishing attacks targeting EU personnel aiding Ukrainian citizens who had […]
Attribution:
Photo by Pam Menegakis on Unsplash