Check Point Research detected coronavirus special hacking service domains
Check Point Research detected coronavirus special hacking service domains

Researchers of cybersecurity firm Check Point Research have discovered that even though the spread of coronavirus has hit businesses, hackers all over the world are silently taking advantage of this situation by offering their “goods” at a discounted rate on the darknet that includes Facebook hacking services and fake MacBook Airs.

Hackers all over the world are now offering special offers in terms of discounts in order to promote their goods. Usually, they are coming up with malicious malware or exploit tools under special offers with ‘COVID19’ or “coronavirus” as discount codes. In short, they are targeting wannabe cyber attackers.

Check Point Research detected coronavirus special hacking service domains
Check Point Research detected coronavirus special hacking service domains

Some of the products that are available for purchase at special discounted rates include “WinDefender bypass” and “Build to bypass email and chrome security.”

A group of hackers by the name of SSHacker, who describe themselves as “dedicated to providing the best hacking services since 2005” is now offering Facebook hacking service at a discounted rate. Apart from this, there are many fake online “sales” promotions that are offering premium goods at unbelievably discounted prices.

Just for an example, a seller, who goes by the name of “True Mac” is offering the “most-loved Mac” model, MacBook Air at a price of US $ 390 as a part of “corona special offer””. This

Check Point Research wrote in a blog “As the old expression puts it, if it sounds too good to be true, it probably is.”

Yaniv Balmas, the Head of Cyber Research of Check Point has commented: “We’ve seen a substantial upswing in the number of coronavirus related domains registered in just the past few weeks.”

He also said, “Furthermore, we are seeing hackers use the attention on COVID-19 to spread their harmful “goods” in as many places as possible through COVID-19 specials and discounts on the darknet. The end result is more malicious tools in more wrong hands during this unique period of time, which puts us all more at security risk during the COVID-19 pandemic.”

In its previous report, Check Point has found out that almost more than 50 per cent of the coronavirus related domains are likely to be malicious than other domains that are registered during the same period. The report also pointed out that these coronavirus related domains are higher than any other recent seasonal themes.

Check Point said that since the beginning of January, from when the initial outbreak of coronavirus was spreading all over the world were being reported one after another, as many as more than 16000 new coronavirus related domains were registered. And now, within the last three weeks since the end of February, the average number of coronavirus related domains registered is 10 times more than the average of previous weeks. Check Point Research declared that 0.8 per cent of these domains were found to be malicious, and at least 19 per cent were found suspicious. In the last week itself, 6000 coronavirus related domains were registered which is 85 per cent increase of its previous weeks.

Must Check:

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Donald Trump fires cybersecurity chief Chris Krebs after he debunked voter fraud theories

Late Tuesday evening, President Donald Trump fired the chief of the CISA…

New Crypto regulations in Malaysia come into effect

The Malaysian Securities Commission (SC) announced that newly amended regulations on cryptocurrency…

71% increase in ransomware attacks in healthcare sector in October 2020

Following the joint advisory issued by three federal agencies, CheckPoint Security published…