ñ

ñ

Menu Close

COVID-19: Microsoft reveals Russian, North Korean hackers attacked vaccine makers

*The company says its security software ‘controlled’ cyberattacks targeted at seven major pharmaceutical companies and researchers in Canada, France, India, South Korea and US   

Isola Moses | ñ

Amid the worldwide excitement over the recent feats by the drug manufacturers and COVID-19 vaccine makers regarding new vaccine test success from Moderna and Pfizer, Microsoft Incorporation has said it discovered a series of cyberattacks coming from Russia and North Korea respectively.

ñ learnt the software giant disclosed that the attacks from the two countries were targeted at research companies doing those tests.

Microsoft, in a blog post stated that the cyberattacks targeted seven major pharmaceutical companies and researchers in Canada, France, India, South Korea and the US.

The tech giant though didn’t reveal identities of the companies targeted in those countries, or what type of information may have actually been compromised or stolen, agency report said.

However, Microsoft officials said they had notified the affected organisations and offered help where the attacks were successful.

Tom Burt, Corporate Vice-President, Customer Security and Trust at Microsoft, wrote: “Two global issues will help shape people’s memories of this time in history – COVID-19 and the increased use of the Internet by malign actors to disrupt society.

“It’s disturbing that these challenges have now merged as cyberattacks are being used to disrupt healthcare organisations fighting the pandemic.

“We think these attacks are unconscionable and should be condemned by all civilized society.

“Today, we’re sharing more about the attacks we’ve seen most recently and are urging governments to act.”

According to the company, there are actually three key players in the attacks: “Strontium,” an actor originating from Russia, and two actors originating from North Korea that Microsoft has dubbed, “Zinc” and “Cerium.”

It said Strontium uses “password spray” and brute force login attempts to steal personal login credentials.

The software it uses conducts millions of rapid attempts to crack a third-party’s personal data, it dislcosed.

Zinc’s game is to use spear-phishing lures for credential theft by sending messages with fabricated job descriptions pretending to be recruiters.

And Cerium? The angle it works is spear-phishing with email lures using COVID-19 themes while masquerading as World Health Organisation (WHO) representatives.

Fortunately, Burt says the “majority” of the attacks have been blocked by security protections built into the company’s products.

The company is continuing to make its threat notification service, “AccountGuard,” available for free to healthcare and human rights organisations working on COVID-19.

The 195 health care-related groups have enrolled in the service, and it now protects 1.7 million e-mail accounts that those organisations serve, stated Microsoft.

Kindly Share This Story

 

Kindly share this story