WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Situational Awareness – Coronavirus Scam Highlights
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Situational Awareness – Coronavirus Scam Highlights

Author: Charles Egli

Created: Tuesday, May 19, 2020 - 18:14

Categories: Cybersecurity

It’s no surprise that COVID-19-related issues are continuing to be used in cyber criminals’ activities, such as with the lures in phishing emails sent to victims. But the scale of the COVID-19-related cyber attacks continues to astound, with IBM’s Security Intelligence reporting it has seen a significant spike in this activity on a week-to-week basis. It adds that its teams have not seen such a high number of cases on a single topic in the past. Since March 1 to date, IBM’s Security Intelligence reports it has seen a 5,000-plus percent increase in COVID-19 spam. It encourages organizations and end users to be even more vigilant in this new era, educating themselves about emerging threats and spam ploys to keep networks safe even while most staff members are not on-site. According to recent reporting by Proofpoint, some of the latest activity includes ready-made COVID-19-themed phishing templates that mimic government websites, such as for the World Health Organization (WHO), the U.S. Centers for Disease Control and Prevention (CDC), and the government of Canada, among others. The Proofpoint report includes screenshots of these templates, providing an invaluable orientation. Cybersecurity expert Graham Cluley comments further on these templates; he also discusses a Trojan whose name, “Company PLP_Tax relief due to Covid-19 outbreak CI+PL.jar”, suggests it may have been spread via a COVID-19-themed phishing campaign, perhaps one of the ones featuring a fake government website.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 30, 2026)

Apr 30, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar