Select Page

We Can Help You Stop Coronavirus Phishing.Retarus Anti-Phishing Guide

Phishing emails that make it to the inbox despite email security have only one opponent: the mail users themselves. Sensitize them to phishing attacks with regards to Coronavirus! We can help you: with the new Retarus Anti-Phishing Guide.

Be Alert.

Expect an online fraud attempt at any time. The likelihood that you will fall into a phishing trap is reduced immensely if you are aware.

Online Scammers Often Disguise Themselves as Close Acquaintances.

Online scammers pretend to be friends or family members. Or they take on the role of colleagues, managers, or business partners and pretend to be acting on behalf of official institutions, established financial service providers (e.g., your bank, PayPal), or online portals (e.g., Amazon).

That means that even if you “know” the sender of an email, it could be a phishing attempt.

The Quality of Phishing Attempts Is Getting Better and Better All the Time – Technically, Optically, and from a Content Perspective.

We are seeing fewer and fewer phishing emails with never-ending cryptic links and clumsy instructions in poorly written English and a bad design. The latest generation of phishing emails are technically sophisticated, well-written, and professionally designed.

Fake emails, manipulated senders, attachments, downloads, and websites often appear surprisingly real and, at second glance, are not immediately recognizable as fake.

Phishing is online fraud in which cyber criminals try to spread malware, intercept data, and gain financial benefits. Cyber criminals use false identities and manipulative messages that exploit typical human characteristics such as good faith, readiness to help, or fear (social engineering).

Find out more about the innovative defense mechanisms Retarus Email Security uses to protect companies from cyber threats such as phishing.

Be Cautious.

If you have the feeling that there is something strange about an email or a website, be cautious. If you suspect a phishing attack, the best thing to do is to not respond.

#1: Never click on links in suspicious emails (do not click on unsubscribe links either).

#2: Do not open/download attachments to suspicious emails (malware).

#3: Do not reply to a suspicious email and do not forward it.

#4: Never enter your user name, password, or other personal data on websites that look suspicious.

Warning! CxO Fraud!

CxO fraud is a particularly brazen phishing method in which cyber criminals pretend to be managers and urge their employees under false pretenses (e.g., emergency situations) to do something (e.g., transfer money or disclose confidential information). Typical phishing emails of this type appear to be urgent and ask you to treat the request confidentially.

Do You Know the Sender of an Email with Suspicious Content?

Check the authenticity of the email by speaking with or calling the sender.

Do You Think That You’ve Fallen into a Phishing Trap?

Don’t waste a single minute. Contact your manager and/or your IT department so they can explain what to do next.

Cyber criminals hide malware in attachments, links, and download options. These can paralyze not only your computer, but – in a worst-case scenario – your entire IT infrastructure.

Be Skeptical.

Cyber criminals love crises. They are using the Coronavirus crisis to target people by exploiting the relevance of the topic, the rising insecurity in people, and the atypical work situation with many people at home offices.

Warning! Corona Phishing!

Be skeptical, especially when it comes to anything that is currently being offered under the guise of the Coronavirus. And be skeptical when it comes to instructions for working from home.

How Cyber Criminals Are Currently Trying to Spread Malware, Intercept Data, and Make Money:

“Official” information about the Coronavirus in the form of a newsletter subscription, in an email attachment, or as a download option

Offers for products in high demand such as respiratory masks, Coronavirus self-tests, and tracking apps

Data queries for new policies regarding customer services and other services resulting from closed branches and offices

Requests for donations, e.g. for the development of vaccines

“Smart” investment tips, such as high returns during the Coronavirus crisis

Software installations for working from home

Password requests for participating in video conferences

Data syncing for activating a remote tool (remote maintenance)

Downloading a security update for the home office

Are you suspicious of IT instructions you’ve received regarding your home office? Check with your IT department each time to be sure they are legitimate.

Not just online!
Note that Corona scammers are not just targeting us via email and on websites. They are also active on social media, via text, over the phone, and even at your doorstep.

Download the Retarus Anti-Phishing Guide Now

Download it now as a free PDF file in English, French, German, Italian, and Spanish, perfect for sending to employees and colleagues.

Download now free of charge

Any Questions?

Please contact us, we will be happy to inform you.