New Coronavirus Information Phishing Email "Targeting Corporate Hacking" View original image


[Asia Economy Reporter Oh Hyung-gil] An email disguised as information about the novel coronavirus spreading malware has been discovered. It is understood that this email is being distributed targeting domestic companies to steal information.


According to East Security's Security Response Center (ESRC) on the 9th, an email titled "Coronavirus Update: China Operations" was detected on the 6th.


This email briefly mentions the current situation in China related to the novel coronavirus and corporate responses, stating "Check the attached file for the schedule of production resumption."


The sender's name uses the name of an actual manufacturing company in Taiwan, including the address, phone number, and website.


However, the attached file in this email contains malware for phishing purposes. If you download the attachment named "Factory Contacts and Office Resumption.zip," extract it, and run the resulting file, malware will infect the user's PC. It is understood to perform backdoor functions such as keylogging that intercepts keyboard input on the infected PC and remote control that allows the computer to be operated freely while communicating with an external server.


This email is being widely distributed targeting domestic company email addresses publicly available on the internet.



Although phishing emails related to the novel coronavirus in Korean have not yet been found, the security industry believes they are likely to appear soon. Security experts advise not to open suspicious emails and to update antivirus software to the latest version.


This content was produced with the assistance of AI translation services.

© The Asia Business Daily(www.asiae.co.kr). All rights reserved.

Today’s Briefing