Barrier gestures, confinement, teleworking … The better the instructions will be followed, the faster the Covid-19 will be struck down and life will resume its course. But one pandemic can hide another. Almost from the first moments of this health crisis, cyber experts have observed a sharp increase in criminal activity on the networks. A phenomenon exclusively linked to the spread of Covid-19 and all the fears it arouses. On March 20, in a joint press release, several European bodies, including the Commission, Europol and the cybersecurity agency (Enisa), were alarmed by the development of the situation: “Malicious actors are actively exploiting these new circumstances and difficult to target teleworkers, businesses and individuals. ” And if almost all of Europe has plunged into the third stage of the coronavirus crisis, cyberspace is still in the preliminary stages, according to specialists. Hackers are incredibly opportunistic. And for good reason: like the umbrella merchants – a very honorable profession, after all – they watch for the right moment to manifest themselves. A global pandemic? A boon for the international cybercrime.
At the first stage of the plague, the symptoms seem to be limited to those of a big digital cold: false mails and scams of all kinds proliferate. Sometimes it is a bank or a mutual company that asks its customers to update their data online. Another time, it’s an email that promises shattering revelations about the ongoing pandemic to whoever opens the file as an attachment. Without forgetting of course the sites that offer an official pass for a hundred euros … At this stage, it is the most gullible who fall first. In a second phase, all the reckless are struck: in the middle of an influenza epidemic, you don't hit the bus bar. Stage 2 of this cyber pandemic started when companies asked their employees to stay at home and work from home. However, not all of them are calibrated to operate 100% in telework. Far from there. Many employees are left to fend for themselves. Their new workstation is often the family computer: it can be used by children to play online games or chat on social networks, as well as parents to watch films in streaming and exchange professional emails.
This large digital gloubi-boulga makes it easier for the hacker to install malware on the various connected machines in the house: ransom demands, theft of personal data, etc. It will also allow him to prepare stage 3: when employees will connect to their corporate network from machines that are not secure … In cyberspace too, the rules of containment and barrier gestures must apply.