• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
  • Donate
  • Start
    • Contact
    • We Need Your Support (Donate)
    • Newsletter Signup
      • Daily
      • Weekly
    • Into the Storm (Hosted by Justin Deschamps)
    • Follow Our Social Media
    • Best Telegram Channels & Groups
    • Discernment 101
    • Media Archive (Shows, Videos, Presentations)
    • Where’s The Hope
  • Browse
    • Editor’s Top Content (Start Here)
    • Best Categories
      • Consciousness
      • Conspiracy
      • Disclosure
      • Extraterrestrials
      • History
      • Health
      • NWO Deep State
      • Philosophy
      • Occult
      • Self Empowerment
      • Spirituality
    • By Author
      • Justin Deschamps
        • Articles
        • Into The Storm (on EdgeofWonder.TV)
        • Awarewolf Radio (Podcast)
      • Adam AstroYogi Sanchez
      • Amber Wheeler
      • Barbara H Whitfield RT and Charles L Whitfield MD
      • Chandra Loveguard
      • Conscious Optimist
      • Marko De Francis
      • Lance Schuttler
        • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
      • Ryan Delarme
      • Will Justice
  • Products
    • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
    • Earth Science & Energy
    • Free Energy
    • AI and Transhumanism
    • Space
    • Nikola Tesla
    • ET
      • Ancient Technology
      • Crop Circles
      • UFOs
    • Conspiracy
      • Anti NWO Deep State
      • Domestic Spying
      • Freemasonry
      • Law & Legal Corruption
      • Mass Mind Control
      • NWO Conspiracy
      • Police State and Censorship
      • Propaganda
      • Snowden Conspiracy
      • Social Engineering
    • Misc.
      • Council on Foreign Relations
      • Music Industry
      • Paranormal
      • Pedagate and Pedophilia
      • Q Anon
      • Secret Space Program
      • White Hat
  • Sign Up
  • Election Fraud
  • Partners
    • EMF Harmonized
    • Ascent Nutrition

Stillness in the Storm

An Agent for Consciousness Evolution

  • Our Story
  • Support Us
  • Contact
  •  Thursday, April 23, 2026
  • Store
  • Our Social
    • BitChute
    • CloutHub
    • Gab
    • Gab TV
    • Gettr
    • MeWe
      • MeWe Group
    • Minds
    • Rumble
    • SubscribeStar
    • Telegram
      • Best Telegram Channels and Groups
    • Twitter (Justin Duchamps)
    • YouTube

Phishing in the Time of COVID-19: How to Recognize Malicious Coronavirus Phishing Scams

Sunday, March 22, 2020 By Stillness in the Storm Leave a Comment

Spread the love

(Daly Barnett and Soraya Okuda) For malicious people, preying on collective fear and misinformation is nothing new. Mentioning national headlines can lend a veneer of credibility to scams. We’ve seen this tactic time and again, so it’s no surprise that COVID-19 themed social media and email campaigns have been popping up online. This blogpost provides an overview to help you fight against phishing attacks and malware, examples of phishing messages we’ve seen in the wild related to coronavirus and COVID-19, and specific scenarios to look out for (such as if you work in a hospital, are examining maps of the spread of the virus, or are using your phone to stay informed).

Related Unemployment Claims Predicted To Hit TWO MILLION, The Worst In US History (Video)

Source – Activist Post

by Daly Barnett and Soraya Okuda, March 20th, 2020

Avoiding phishing attacks

The COVID-19 themed scam messages are examples of “phishing,” or when an attacker sends a message, email, or link that looks innocent, but is actually malicious and designed to prey on fears about the virus. Phishing often involves impersonating someone you know or impersonating a platform that you trust. Your day-to-day diligence is the best preventative measure. Consider these points before you click: Is it an enticing offer? Is there a sense of urgency? Have you interacted with the sender before over this platform?

If an email sounds too good to be true (“New COVID-19 prevention and treatment information! Attachment contains instructions from the U.S. Department of Health on how to get the vaccine for FREE”), it probably is. And if an email demands urgent action from you (“URGENT: COVID-19 ventilators and patient test delivery blocked. Please accept order here to continue with shipment.”), take a moment to slow down and make sure it’s legitimate. Keep in mind that legitimate sources of health information likely won’t use unsolicited email or text messages to make announcements. Some examples of phishing emails — ones that we’ve received and you might similarly encounter — are included at the bottom of this post.

 it seems like an email from Gates Foundation. Upon looking closer, the email is actually from Gates Fonudation.

In the above email, note that the domain sending this “Gates Foundation” email includes a subtle typo. Phishing emails such as this one expect readers to only see the display name, without the email address beside it. Be vigilant to see the email address that the message is originating from.

Some common-sense measures to take include:

  • Check the sender’s email address. Are they who they claim to be? Check that their contact name matches the actual email address they’re sending from.
  • Try not to click or tap! If it’s a link and you’re on a computer, take advantage of your mouse’s hover to closely inspect the domain address before clicking on them.
  • Try not to download files from unfamiliar people. Avoid opening attachments from any external email addresses or phone numbers.
  • Get someone else’s opinion. Ask a coworker: Were we expecting an email from this sender? Or ask a friend: Does this email look strange to you? A good practice is to use a different medium to verify (for example, if you receive a strange email claiming to be your friend, try calling your friend over the phone to double-check that it’s from them).

For more tips—such as important preventative measures to these attacks, like backing up your data and updating your software—check out our Security Education Companion printable handout on malware and phishing, which is included at the end of this article.

Specific Scenarios to Watch For

Sometimes, malicious actors use phishing messages to get you to log into a service. They might provide a website that looks like a social media service you use, a service you use for work, or a critical website you use for payments and banking. However, sometimes, phishing messages are used to get you to download malware, or malicious software. We’ve included some more specific scenarios where we’ve seen COVID-19 themed phishing attacks and malware below.

Hospitals and Healthcare Workers at Risk

Hospitals in New York are notifying their staff about incoming cyber attacks, and have cited a few different common attack types that have already appeared, including:

  • a phishing email from a sender purporting to represent a well-known organization like the World Health Organization (WHO)
  •  a phishing email claiming to be from the Centers for Disease Control and Prevention (CDC), providing vital information about how to prevent and treat COVID-19.

Some emails will carry attachments such as PDFs or Word document files that promise to carry that vital information, but actually have embedded malicious code that will infect your computer.

Another type of phishing campaign targeting hospitals comes from senders pretending to be medical suppliers. In the emails, they claim that their deliveries have been stalled or interrupted and require some action on behalf of the hospital staff to complete. The message body will provide a link that will take the recipient to a site that will then execute malicious code. When malicious code is installed on a computer, this could be used to steal important data or corrupt the disk. Two types of malware that are being especially used are trojans and ransomware:

  • Trojans: When downloaded, Trojan software may perform like the intended legitimate application, but is in fact doing malicious things in the background.  An example in these COVID-19 emails is the use of the AzorUlt Trojan.
  • Ransomware: When downloaded, this malicious software holds a company, organization, or individual’s data for ransom.

AzorUlt Trojan

Malwarebytes Labs reported finding variations of an AzorUlt trojan malware embedded in some of these attachments. The AzorUlt trojan is a flexible type of malware that commonly collects important data like browser history, passwords, and session cookies from the infected computer, then sends that to a command and control server elsewhere online. From there it could download and execute more malicious code, such as ransomware. This particular type of trojan is good at staying hidden, as its core function is to collect vital data from non-persistent memory on the infected machine, then quietly deliver that to its command and control server.

Krebs On Security recently documented that some phishing campaigns use a live interactive map of COVID-19 to distribute different variations of the same AzorUlt trojan. The map and interactive dashboard were developed by Johns Hopkins University, so visually these emails could appear valid and trustworthy even to a cautious eye.

Book 9/11 Unmasked: An International Review Panel Investigation

Mobile Phone Ransomware

Sometimes, attackers might get you to download an application that pretends to be helpful or to provide critical medical information, but actually installs malware. A researcher at DomainTools recently reported on a distribution of Android ransomware that has been posing as a coronavirus update application. Upon downloading the app, it will encrypt and lock the user’s phone, demanding Bitcoin in ransom. Unfortunately for the developers of this malicious app (and luckily for affected users), a researcher at ESET Research discovered that the decryption key was hardcoded: anyone affected could use the same code to retrieve control of their phone. They published said key on Twitter.

Responding with Vigilance

As the world’s anxiety regarding coronavirus continues to escalate, the likelihood that otherwise more cautious digital citizens will click on a suspicious link is much higher. Even more unfortunate is that hospitals and medical facilities are already likely to fall victim to ransomware attacks. With a burgeoning global pandemic, the consequences of these attacks will be even more dire. And with medical staff already overburdened and overworked with the demands brought on by COVID-19, they will be more likely to be susceptible.

Despite these phishing campaigns taking advantage of headlines, so far they’re not really anything new. That makes detecting them easier. With appropriate caution, you can avoid these phishing strategies. For more information on how malware is installed (and how to avoid it), check out this malware and phishing handout from SEC.

Examples of COVID-19 Phishing Emails

Example 1

Hello.

We have urgent information about the CORONAVIRUS(COVID-19). VBS

presentation in rar.

The attachment contains a document with safety and coronavirus

prevention instructions,

also instructions from the U.S. Department of Health on how to get the

vaccine for FREE.

Send this information to all your loved ones as soon as possible.

rar password : 1234567

=================================

U.S. Department of Health & Human Services

200 Independence Avenue, S.W.

Washington, D.C. 20201

Toll Free Call Center: 1-800-368-1019

TTD Number: 1-800-537-7697

Example 2

(In this example, notice how the links they provide start with https; and not https: This is a common tactic of putting two very similar looking characters by each other so that the user won’t notice the difference and will click on the link before realizing it’s not what it appears to be) 

The outbreak of Coronavirus is a rapidly developing
situation and is likely to affect many travel plans over the coming
months. We strongly recommend that anyone travelling or planning to
travel takes guidance from the Foreign and Commonwealth office:

https;//eff.org/coronavirus-covid-19-information-for-the-staff

The WHO's designation of coronavirus as a pandemic
yesterday has significant implications for the operation of insurance
policy cover and these are clearly posing unprecedented challenges. 

The team have put together some advice for you based on current activities:

I am travelling to a country where there has been an outbreak?

If the WHO advise against travel to the area you are
visiting then in the first instance you should contact your travel
operator or medical practitioner to reschedule or ask for a protective
tips. MOST REPORTED CASES SAVES LIFES.

 Kindly take a break and read the attached articles on our site and futher refrences on the issue for our staff

https;//www.google.com/tips/coronavirus-covid-19-information-for-the-public

Book No Ordinary Stalking : a look at organized stalking and electronic harassment

Example 3

(In this example provided by Abnormal Security, the target’s name and the university the sender is pretending to be from have been removed. The link directs the target to a page asking them to login to their Outlook account. This seemingly harmless login page is actually stealing those credentials.)

Hi ______,

Kindly check the latest information about COVID-19 [Corona Virus]

https://www.[xxxxxx].edu/content/covid-19-coronavirus-information.pdf

The Trustees of [xxxxxx] University | Health Team

PDF icon Informative handout on malware from the Security Education Companion

Stillness in the Storm Editor: Why did we post this?

The news is important to all people because it is where we come to know new things about the world, which leads to the development of more life goals that lead to life wisdom. The news also serves as a social connection tool, as we tend to relate to those who know about and believe the things we do. With the power of an open truth-seeking mind in hand, the individual can grow wise and the collective can prosper. 

– Justin

Not sure how to make sense of this? Want to learn how to discern like a pro? Read this essential guide to discernment, analysis of claims, and understanding the truth in a world of deception: 4 Key Steps of Discernment – Advanced Truth-Seeking Tools.


Stillness in the Storm Editor’s note: Did you find a spelling error or grammatical mistake? Send an email to [email protected], with the error and suggested correction, along with the headline and url. Do you think this article needs an update? Or do you just have some feedback? Send us an email at [email protected]. Thank you for reading.

Source:

https://www.activistpost.com/2020/03/phishing-in-the-time-of-covid-19-how-to-recognize-malicious-coronavirus-phishing-scams.html

Filed Under: News, Uncategorized Tagged With: activist post, news, phishing

Notices and Disclaimers

We need $2000 per month to pay our costs. Help us one time or recurring. (DONATE HERE)

To sign up for RSS updates, paste this link (https://stillnessinthestorm.com/feed/) into the search field of your preferred RSS Reader or Service (such as Feedly or gReader).

Subscribe to Stillness in the Storm Newsletter

“It is the mark of an educated mind to be able to entertain a thought without accepting it.” – Aristotle

This website is supported by readers like you.

If you find our work of value, consider making a donation. 

Stillness in the Storm DISCLAIMER: All articles, videos, statements, claims, views and opinions that appear anywhere on this site, whether stated as theories or absolute facts, are always presented by Stillness in the Storm as unverified—and should be personally fact checked and discerned by you, the reader. Any opinions or statements herein presented are not necessarily promoted, endorsed, or agreed to by Stillness, those who work with Stillness, or those who read Stillness. Any belief or conclusion gleaned from content on this site is solely the responsibility of you the reader to substantiate, fact check, and no harm comes to you or those around you. And any actions taken by those who read material on this site is solely the responsibility of the acting party. You are encouraged to think carefully and do your own research. Nothing on this site is meant to be believed without question or personal appraisal.

Content Disclaimer: All content on this site marked with “source – [enter website name and url]” is not owned by Stillness in the Storm. All content on this site that is not originally written, created, or posted as original, is owned by the original content creators, who retain exclusive jurisdiction of all intellectual property rights. Any copyrighted material on this site was shared in good faith, under fair use or creative commons. Any request to remove copyrighted material will be honored, provided proof of ownership is rendered. Send takedown requests to [email protected].

What is our mission? Why do we post what we do?

Our mission here is to curate (share) articles and information that we feel is important for the evolution of consciousness. Most of that information is written or produced by other people and organizations, which means it does not represent our views or opinions as managing staff of Stillness in the Storm. Some of the content is written by one of our writers and is clearly marked accordingly. Just because we share a CNN story that speaks badly about the President doesn’t mean we’re promoting anti-POTUS views. We’re reporting on the fact as it was reported, and that this event is important for us to know so we can better contend with the challenges of gaining freedom and prosperity. Similarly, just because we share a pro/anti-[insert issue or topic] content, such as a pro-second amendment piece or an anti-military video doesn’t mean we endorse what is said. Again, information is shared on this site for the purpose of evolving consciousness. In our opinion, consciousness evolves through the process of accumulating knowledge of the truth and contemplating that knowledge to distill wisdom and improve life by discovering and incorporating holistic values. Thus, sharing information from many different sources, with many different perspectives is the best way to maximize evolution. What’s more, the mastery of mind and discernment doesn’t occur in a vacuum, it is much like the immune system, it needs regular exposure to new things to stay healthy and strong. If you have any questions as to our mission or methods please reach out to us at [email protected].

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Search Our Archives

FUNDRAISER!

Latest Videos

Guarding Against Bio Tech and EMF - Fix The World Project | Just In Stillness

From around the web

News “they” don’t want you to see

Newsletter

You can unsubscribe anytime. For more details, review our Privacy Policy.

Thank you!

You have successfully joined our subscriber list.

.

We Need Your Support

Support our work!

Weekly Newsletter Sign UP

Only want to see emails once a week? Sign up for the Weekly Newsletter here: SIGN UP. (Make sure you send an email to [email protected] to confirm the change or it won’t work).

Latest Videos

Footer

  • Menus
  • Internship Program
  • RSS
  • Social Media
  • Media
  • Privacy Policy

Copyright © 2026 · Privacy Policy · Log in · Built by

This website wouldn't be the same without the ethical web hosting provided by Modern Masters. Modern Masters ethically serves small businesses in metaphysical, paranormal, healing, spirituality, homesteading, acupuncture and other related fields. Get the perfect website for your sacred work at Modern Masters.