{"id":91113,"date":"2020-03-25T10:04:49","date_gmt":"2020-03-25T17:04:49","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91113"},"modified":"2020-03-25T10:04:49","modified_gmt":"2020-03-25T17:04:49","slug":"cybercriminals-are-preying-on-coronavirus-fears","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/","title":{"rendered":"Cybercriminals are preying on coronavirus fears"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-91121\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-600x300-1.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-600x300-1-300x150.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-600x300-1-150x75.jpg 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Whenever there are global news headlines that generate a lot of public interest, especially stories that may cause panic, you can bet that cybercriminals will try to leverage the situation to their advantage. Such is the case with the coronavirus (COVID-19) pandemic.<\/p>\n<h3>Coronavirus scams abound<\/h3>\n<p>Last week, the SANS Internet Storm Center <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/COVID19+Themed+Multistage+Malware\/25922\/\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> that fraudulent e-mails have begun circulating that claim to be from the World Health Organization (WHO), with a link to a deceptive Microsoft Word document that, when activated by an unsuspecting victim, attempts to disable the built-in malware protection on Windows computers, and then attempts to download Windows malware.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-91116\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/Microsoft-Office-documents-Word-Excel-PowerPoint-300x103.png\" alt=\"\" width=\"200\" height=\"69\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/Microsoft-Office-documents-Word-Excel-PowerPoint-300x103.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/Microsoft-Office-documents-Word-Excel-PowerPoint-150x51.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/Microsoft-Office-documents-Word-Excel-PowerPoint-657x225.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/Microsoft-Office-documents-Word-Excel-PowerPoint.png 727w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Similar reports have surfaced from other malware analysis labs, detailing malicious Microsoft Office (Word, Excel, and PowerPoint) documents that attempt to infect Windows PCs.<\/p>\n<p>In early March, there was even a fraud site claiming to offer a &#8220;Corona Antivirus&#8221; to allegedly &#8220;combat the virus using a mobile phone app.&#8221; Obviously, this is a ridiculous claim, but scammers will try just about anything if they think they can trick a few people into giving them money or installing malware. The earliest version of this scam site asked for donations in Bitcoin, and a later rebranding of the site instead distributed Windows malware.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">&quot;Our scientists from Harvard University have been working on a special AI development to combat the virus using a mobile phone app.&quot;<br \/>&quot;Your mobile device actively protects you against the Coronaviruses (Cov) while the app is running.&quot;<br \/>Sounds totally believable, no?<br \/>\ud83d\ude02 <a href=\"https:\/\/t.co\/c1xYOTyTfo\">pic.twitter.com\/c1xYOTyTfo<\/a><\/p>\n<p>&mdash; MalwareHunterTeam (@malwrhunterteam) <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1236182669559545857?ref_src=twsrc%5Etfw\">March 7, 2020<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>At this time, we are not aware of any coronavirus-related malware specifically designed to infect Macs.<\/strong> We will update this article if any such Mac-infecting malware is discovered.<\/p>\n<p>Aside from malware campaigns, cybercriminals have been making other attempts to defraud victims. One example is a fraudulent site that deceived victims into purchasing a supposed &#8220;WHO vaccine kit&#8221; for COVID-19\u2014even though no vaccine actually exists at this time. The U.S. Department of Justice issued an <a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-files-its-first-enforcement-action-against-covid-19-fraud\" target=\"_blank\" rel=\"noopener noreferrer\">advisory<\/a> on Sunday detailing its efforts to take down the scam site.<\/p>\n<p>The DOJ&#8217;s COVID-19 fraud information site (<a href=\"https:\/\/www.justice.gov\/coronavirus\" target=\"_blank\" rel=\"noopener noreferrer\">justice.gov\/coronavirus<\/a>) advises:<\/p>\n<blockquote><p>If you think you are a victim of a scam or attempted fraud involving COVID-19, you can report it without leaving your home though a number of platforms. Go to:<\/p>\n<p>&nbsp;<\/p>\n<p>\u2022 Contact the\u00a0<a href=\"https:\/\/www.justice.gov\/disaster-fraud\">National Center for Disaster Fraud<\/a>\u00a0Hotline at 866-720-5721 or via email at\u00a0<a class=\"mailto\" href=\"mailto:disaster@leo.gov\">disaster@leo.gov<\/a><br \/>\n\u2022 Report it to the FBI at <a href=\"https:\/\/tips.fbi.gov\/\">tips.fbi.gov<\/a><br \/>\n\u2022 If it&#8217;s a cyber scam, submit your complaint through <a href=\"https:\/\/www.ic3.gov\/default.aspx\">https:\/\/www.ic3.gov\/default.aspx<\/a><\/p><\/blockquote>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Be aware that criminals are attempting to exploit <a href=\"https:\/\/twitter.com\/hashtag\/COVID19?src=hash&amp;ref_src=twsrc%5Etfw\">#COVID19<\/a> worldwide through a variety of scams. If you think you are a victim of a scam or attempted <a href=\"https:\/\/twitter.com\/hashtag\/fraud?src=hash&amp;ref_src=twsrc%5Etfw\">#fraud<\/a> involving COVID-19, you can report it without leaving your home. Learn how: <a href=\"https:\/\/t.co\/1G8b5BBqRn\">https:\/\/t.co\/1G8b5BBqRn<\/a> <a href=\"https:\/\/t.co\/4ht7aHx3aH\">pic.twitter.com\/4ht7aHx3aH<\/a><\/p>\n<p>&mdash; Justice Department (@TheJusticeDept) <a href=\"https:\/\/twitter.com\/TheJusticeDept\/status\/1242072274511056897?ref_src=twsrc%5Etfw\">March 23, 2020<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Intego is working hard to keep you safe<\/h3>\n<p>Several Intego customers have inquired about the impact of COVID-19 on our company operations and staff. Our teams around the globe are following local guidance and are safely working from home, and there has not been any negative impact on Intego operations.<\/p>\n<p>Our threat hunters and analysts are constantly on the lookout for new Mac malware, including but not limited to any malware exploiting the COVID-19 situation. Users of Intego&#8217;s <strong>VirusBarrier X9<\/strong> software\u2014included with <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Mac Internet Security X9<\/strong><\/a> and <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Mac Premium Bundle X9<\/strong><\/a>\u2014can take comfort in knowing that Intego will protect you from any new malware threats.<\/p>\n<p>If any coronavirus-related malware that infects Macs is discovered, VirusBarrier X9 users will be protected via automatic updates, and we will also update this article with additional information to keep you informed.<\/p>\n<h3>Where can I learn more?<\/h3>\n<p>You can avoid COVID-19 scams by sticking to safe, official sources of news and information, such as:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.cdc.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">CDC.gov<\/a> \u2014 U.S. Centers for Disease Control and Prevention<\/li>\n<li><a href=\"https:\/\/www.who.int\/\" target=\"_blank\" rel=\"noopener noreferrer\">WHO.int<\/a> \u2014 World Health Organization<\/li>\n<\/ul>\n<p>If you are among the many workers worldwide who&#8217;s having to work from home, be sure to read our tips for setting up a productive home work environment and routine, and listen to our latest podcast episode:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"zTYs5B0R1Y\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-working-at-home-comfortably-and-productively\/\">5 Tips for Working at Home \u2013 Comfortably and Productively<\/a><\/p><\/blockquote>\n<p><iframe title=\"&#8220;5 Tips for Working at Home \u2013 Comfortably and Productively&#8221; &#8212; The Mac Security Blog\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-working-at-home-comfortably-and-productively\/embed\/#?secret=zTYs5B0R1Y\" data-secret=\"zTYs5B0R1Y\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+UG-CQSCa?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Subscribe to Intego&#8217;s <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple, security, and privacy news.<\/p>\n<p>Follow Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whenever there are global news headlines that generate a lot of public interest, especially stories that may cause panic, you can bet that cybercriminals will try to leverage the situation to their advantage. Such is the case with the coronavirus (COVID-19) pandemic. Coronavirus scams abound Last week, the SANS Internet Storm Center reported that fraudulent [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":91122,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[86,4039,116],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Whenever there are global news headlines that generate a lot of public interest, especially stories that may cause panic, you can bet that cybercriminals\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals are preying on coronavirus fears - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Whenever there are global news headlines that generate a lot of public interest, especially stories that may cause panic, you can bet that cybercriminals\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-25T17:04:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"coronavirus scam header image\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/\",\"name\":\"Cybercriminals are preying on coronavirus fears - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#primaryimage\"},\"datePublished\":\"2020-03-25T17:04:49+00:00\",\"dateModified\":\"2020-03-25T17:04:49+00:00\",\"description\":\"Whenever there are global news headlines that generate a lot of public interest, especially stories that may cause panic, you can bet that cybercriminals\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminals are preying on coronavirus fears\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Cybercriminals are preying on coronavirus fears\",\"datePublished\":\"2020-03-25T17:04:49+00:00\",\"dateModified\":\"2020-03-25T17:04:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#webpage\"},\"wordCount\":654,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-400x260-1.jpg\",\"keywords\":[\"Malware\",\"Online Scams\",\"Scam\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Whenever there are global news headlines that generate a lot of public interest, especially stories that may cause panic, you can bet that cybercriminals","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/","og_locale":"en_US","og_type":"article","og_title":"Cybercriminals are preying on coronavirus fears - The Mac Security Blog","og_description":"Whenever there are global news headlines that generate a lot of public interest, especially stories that may cause panic, you can bet that cybercriminals","og_url":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2020-03-25T17:04:49+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-400x260-1.jpg","width":400,"height":260,"caption":"coronavirus scam header image"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/","name":"Cybercriminals are preying on coronavirus fears - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#primaryimage"},"datePublished":"2020-03-25T17:04:49+00:00","dateModified":"2020-03-25T17:04:49+00:00","description":"Whenever there are global news headlines that generate a lot of public interest, especially stories that may cause panic, you can bet that cybercriminals","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Cybercriminals are preying on coronavirus fears"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Cybercriminals are preying on coronavirus fears","datePublished":"2020-03-25T17:04:49+00:00","dateModified":"2020-03-25T17:04:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#webpage"},"wordCount":654,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-400x260-1.jpg","keywords":["Malware","Online Scams","Scam"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/cybercriminals-are-preying-on-coronavirus-fears\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/03\/coronavirus-scam-header-image-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nHz","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91113"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91113"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91113\/revisions"}],"predecessor-version":[{"id":91126,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91113\/revisions\/91126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/91122"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}