WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships When Technology Fails, It’s Up to Users to Stop the Spread of Malware – Coronavirus News Themed Malware Evading Detection
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

When Technology Fails, It’s Up to Users to Stop the Spread of Malware – Coronavirus News Themed Malware Evading Detection

Author: Jennifer Walker

Created: Thursday, March 19, 2020 - 17:03

Categories: Cybersecurity

Malware authors are really good at modifying malware code to evade detection by antivirus and other security products, including artificial intelligence and machine learning security engines. They also predictably incorporate trending news for their lures. So it comes as no surprise that miscreants are currently using coronavirus-themed news to bypass detection technologies. Specifically, BleepingComputer recently observed Emotet and TrickBot samples using strings from actual CNN news stories in their malware files. With everyone working and learning from home, cyber attackers are leveraging theses added distractions in their social engineering tactics. While it is understandable that we are all watching the physical trends and doing our part to stop the spread, it is important to remind staff they also play a vital role in stopping the spread of the coronavirus-themed malware that may evade your organization’s blocking technologies. With countless organizations providing daily COVID-19 status updates and situational reports, it is crucial that we trust but verify before opening any emails that appear to be from legitimate or authoritative sources. Read more at BleepingComputer

Perch subscribers: WaterISAC is tracking specific coronavirus-themed campaigns reported by trusted third-parties, including Office 365 credential harvesting, Trickbot, and other phishing campaigns and entering custom indicators into Perch as appropriate. Perch users subscribed to the WaterISAC Community will be able to detect the custom/manually entered indicators within their environments. Likewise, Perch users are encouraged to enter their own malware sightings into Perch and share with the ‘WaterISAC Community’ for the benefit of all WaterISAC member organizations using Perch.

Related Resources

(TLP:CLEAR) WaterISAC Notification – CISA Issues Cyber Alert ​​for Supply Chain Compromise Impacting Axios Node Package Manager​

Apr 20, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 17, 2026)

Apr 17, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Claude Mythos Preview: The AI Inflection Point in Vulnerability Management

Apr 16, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar