WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Dridex and Covid-Related Phishing Campaigns
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Dridex and Covid-Related Phishing Campaigns

Author: Alec Davison

Created: Tuesday, December 28, 2021 - 18:33

Categories: Cybersecurity

Amid the holiday season and COVID-19 activity, threat actors are continuing to use phishing themes designed to elicit an emotional response to get users to click before they think. To increase members’ situational awareness, WaterISAC is highlighting three current phishing campaigns.

The Dridex malware has recently been observed propagating in two phishing campaigns. Dridex is a trojan malware, that was originally developed to steal banking credentials, but is now used for gaining initial access, providing remote access to threat actors, and propagating to other devices. In one observed Dridex phishing campaign, threat actors are sending fake employee termination emails to victims account in hopes of deceiving them into opening a malicious Excel attachment. After opening the Excel attachment, the threat actor can install additional malware, steal credentials, and perform other malign activities, such as deploying ransomware. Read more at BleepingComputer.

Another Dridex phishing campaign attempts to fool victims by sending fraudulent emails purporting to be COVID-19 test results. Once a victim opens up the attached Excel document and clicks “enable editing,” malware is downloaded onto the device and the threat actor now has access to the system for further nefarious, likely fraudulent, activities. Read more at BleepingComputer.

Finally, an ongoing phishing campaign pretending to be from the pharmaceutical company Pfizer has been observed in the wild since August. This phishing campaign delivers malware free PDF attachments, which discuss payment terms and due dates, to fool unsuspecting individuals into starting a conversation with the phishing threat actors. The attackers are likely seeking to gain financial information from their victims and this method of luring victims into a drawn-out email conversation could prove more successful in an attempt to gain credibility with intended targets. Read more at BleepingComputer.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar