WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Examining the COVID-19 Threat Landscape One Year Later
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Examining the COVID-19 Threat Landscape One Year Later

Author: Charles Egli

Created: Tuesday, March 16, 2021 - 17:57

Categories: Cybersecurity

Kasperksy has published a special report looking back at how the cyber threat landscape has evolved since the beginning of the pandemic and how it might serve as an indicator of what to expect in years to come. While it’s no surprise that cyber criminals launched a variety of scams that exploited the pandemic, with scammers often imitating leading authority figures like the CDC or WHO, somewhat surprisingly one of the most common themes exploited revolved around delivery disruptions. For example, they would send emails claiming that, due to COVID, an important delivery had been delayed and that the target must verify the new delivery information. The report also discusses how many companies made themselves vulnerable to a host of new attacks by quickly setting up remote work configurations, and without the proper security measures in place. Chief among them were brute-force attacks against the RDP protocol. Furthermore, the report notes that other remote work tools became targets for cyber attacks, such as with Zoom and Teams, becoming popular lures. Looking back on the past year, Kaspersky notes events demonstrate how willing criminals are to take advantage of crisis. Moreover, while this pandemic will subside, it certainly will not be the last crisis. Therefore, if there is has ever been a time for companies to reevaluate and bolster their security strategy, that time is now. Read the report at SecureList by Kaspersky.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar