Skip to main content

Coronavirus grifts crop up online for political gain and profit

These days capitalism and democracy seem to mean that it’s never too early to take advantage of the misery of others, and the outbreak of the novel coronavirus, COVID-19, is the latest proof point.

On Saturday the Washington Post reported that an agency within the State Department had compiled a report of two million tweets, which peddled conspiracy theories about the COVID-19 coronavirus outbreak.

Among the hoaxes compiled in the report and reported by the Post included the suggestion that the virus had been created by the Bill and Melinda Gates Foundation or was the result of a bioweapon developed by the Chinese government.

In all, these tweets represent about 7 percent of the total tweets surveyed by the government, according to the Post’s reporting.

Critically, the report indicated that some of the misinformation spread online appeared to be the result of “inauthentic and coordinated activity,” the Post reported the document saying.

The report mirrors warnings from cybersecurity firms like Check Point Software, which issued a report tracking the launch of new websites linked to themes around the coronavirus outbreak earlier this month.

According to the company’s Global Threat Index for January 2020, “cyber-criminals are exploiting interest in the global epidemic to spread malicious activity, with several spam campaigns relating to the outbreak of the virus.”

The company correlated Google search terms with what it deemed to be “malicious discussions” about the virus, and showed them to be tightly correlated.

In one instance, a hacking campaign targeting web users in Japan distributed malicious email attachments by pretending to be a Japanese disability welfare service provider. The email provided misinformation about the spread of the coronavirus in several Japanese cities, and when a user opened an attachment to the email, they downloaded a modular, self-propagating Trojan virus onto their computer.

Email campaigns represent one threat, but another one that the security firm tracked was new websites with domain names linked to the virus.

The company already spotted one fake website, “vaccinecovid-19.com”. It was first created on February 11, 2020 and registered in Russia. According to Check Point, “the website is insecure, and offers to sell ‘the best and fastest test for Coronavirus detection at the fantastic price of 19,000 Russian rubles (about US$300)’.

Facebook, Amazon, and Twitter have all taken steps to remove misinformation about the novel coronavirus from their platforms including advertisements offering purported cures for the disease.

Earlier this month, the big tech companies met with representatives of the World Health Organization to come up with a plan and coordinate on ways to combat misinformation and scams online.

Earlier this week, Facebook issued the following statement about its continuing response to misinformation campaigns on the site:

As world health officials issue new guidance and warnings about coronavirus (COVID-19), we’re continuing our work to connect people to information from regional and local health organizations and limit the spread of misinformation and harmful content about the virus.

Connecting People to Accurate Information and Helpful Resources

Anyone who searches for information related to the virus on Facebook is shown educational pop-ups on top of search results connecting them to expert health organizations including the World Health Organization (WHO). We’ve launched these globally over the last few weeks in all languages on Facebook, directing people to the WHO. In several countries we are directing people to their local ministry of health. For example, in the US we are directing people to information from the Centers for Disease Control and Prevention (CDC) and in Singapore, we’re directing people to the Singapore Ministry of Health. Moreover, in countries where the WHO has reported person-to-person transmission and deaths, we’ve shown additional messages to people toward the top of News Feed with more information.



from TechCrunch https://ift.tt/39hT5uI

Comments

Popular posts from this blog

How To Play Doom – And More – On An NES

Doom was a breakthrough game for its time, and became so popular that now it’s essentially the “Banana For Scale” of hardware hacking. Doom has been ported to countless devices, most of which have enough processing ability to run the game natively. Recently, this lineup of Doom-compatible devices expanded to include the NES even though the system definitely doesn’t have enough capability to run it without special help. And if you want your own Doom NES cartridge, this video will show you how to build it . We featured the original build from [TheRasteri] a while back which goes into details about how it’s possible to run such a resource-intensive game on a comparatively weak system. You just have to enter the cheat code “RASPI”. After all the heavy lifting is done, it’s time to put it into a realistic-looking cartridge. To get everything to fit in the donor cartridge, first the ICs in the cartridge were removed (except the lockout IC) and replaced with custom ROM chips. Some modifica...

Try NopSCADlib for your Next OpenSCAD Project

Most readers of this site are familiar by now with the OpenSCAD 3D modeling software, where you can write code to create 3D models. You may have even used OpenSCAD to output some STL files for your 3D printer. But for years now, [nophead] has been pushing OpenSCAD further than most, creating some complex utility and parts libraries to help with modeling, and a suite of Python scripts that generate printable STLs, laser-ready DXFs, bills of material, and human-readable assembly instructions complete with PNG imagery of exploded-view sub-assemblies. Recently [nophead] tidied all of this OpenSCAD infrastructure up and released it on GitHub as NopSCADlib . You can find out more by browsing through the example projects and README file in the repository, and by reading the announcement blog post on the HydraRaptor blog . Some functionality highlights include: a large parts library full of motors, buttons, smooth rod, et cetera many utility functions to help with chamfers, fillets, precis...

The Newbie’s Guide To JTAG

Do you even snarf? If not, it might be because you haven’t mastered the basics of JTAG and learned how to dump, or snarf, the firmware of an embedded device. This JTAG primer will get you up to snuff on snarfing, and help you build your reverse engineering skills. Whatever your motivation for diving into reverse engineering devices with microcontrollers, JTAG skills are a must, and [Sergio Prado]’s guide will get you going. He starts with a description and brief history of the Joint Test Action Group interface, from its humble beginnings as a PCB testing standard to the de facto standard for testing, debugging, and flashing firmware onto devices. He covers how to locate the JTAG pads – even when they’ve been purposely obfuscated – including the use of brute-force tools like the JTAGulator . Once you’ve got a connection, his tutorial helps you find the firmware in flash memory and snarf it up to a file for inspection, modification, or whatever else you have planned. We always apprec...