The Evolving Cybersecurity Threats During the COVID-19 Pandemic

Cybersecurity Threats Evolution During the COVID-19 Pandemic

The U.S. Chamber of Commerce recently released a new report looking at the evolution of Cybersecurity threats during 2020, specifically during the COVID-19 pandemic. The pandemic has impacted businesses and individuals across every industry and geographic region. One of the significant areas affected is day-to-day work life. Remote work became the new normal for millions across the nation. Even as restrictions were cut back in recent months, remote work remained an option for many jobs. With the rise of remote work, cybersecurity threats have also evolved

COVID-19 has changed many aspects of our lives—working from home, virtual meetings, and digital commerce are becoming our new normal—and there’s no reason to think that all of this will revert to the old normal once the pandemic wanes. Cybercriminals have taken advantage of this ‘new normal’ and have been exploiting cyber vulnerabilities among businesses. Here are some of the ways COVID-19 has impacted Cybersecurity, according to the U.S. Chamber of Commerce.

Cybersecurity Threats Evolution During the COVID-19 Pandemic

New opportunities to take advantage of cyber vulnerabilities

This crisis has provided malicious cyber actors with opportunities to take advantage of cyber vulnerabilities on a new scale. For example, according to the multinational cybersecurity software company Trend Micro, there was a 260% increase in clickthroughs to malicious Uniform Resource Locators (URLs) related to COVID-19 from February to March 2020. Trend Micro also reports that the United States is the top location for spam and malware detections and users accessing malicious URLs. Google sees more than 240 million emails per day related to COVID-19 scams, and Trend Micro reports that 91.5% of malicious cyberattacks executed in the COVID-19 era were conducted through spam emails.

These malicious actors are preying on anxious consumers who are more susceptible to social engineering ploys and phishing emails claiming to have information on COVID-19 cures, treatments, vaccines, and government stimulus payments.

In other phishing cases, malicious actors impersonate senior executives and ask junior employees for help with financial transactions. These business email compromise cases are not new to the COVID-19 period, but the frequency for these cyber-enabled crimes has significantly increased. Additionally, the average ransom demand has increased from $800k in Q4 of 2019 to $1.3 million in Q1 of 2020, according to Trend Micro.

The remote working environment

Cybercriminals have increased their attacks on remote login services due to the transition to a remote working environment. Trend Micro reports that over 1.2 million attempts were made to compromise remote login services, with 89% of these attacks being executed through brute force.

Federal law enforcement officials have taken note of these trends and are working on handling them. Michael D’Ambrosio, assistant director of the U.S. Secret Service and head of its Office of Investigations, commented that the COVID-19 pandemic “provides criminals opportunities on a scale likely to dwarf anything seen before.” He added that significant targets include companies involved in the financial services and healthcare services industries, which often are the target of malicious ransomware designed to take down entire systems. He sees an exponential increase in phishing, spearphishing, and fraud attempts, further complicating defensive measures.

Continued focus on the same targeted industries as before the pandemic

Many of the cyber espionage, cybercrime, and even information operations campaigns have focused on the same targeted industries and regions as before the pandemic. They have not demonstrated any new or particularly sophisticated tactics. According to reporting in The Wall Street Journal, the top three areas that were ransomware targets in the first three months of 2020 were professional services, healthcare, and the public sector. However, organizations in industries related to COVID-19 response and relief efforts—such as healthcare, pharmaceutical, and research entities—may face threats due to their work nature. Over the past several months, several U.S. and foreign government agencies, including the U.S. Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Counterintelligence and Security Center, have spotlighted the threat to healthcare, research, and pharmaceutical organizations. Additionally, the shift to remote work that many organizations have undergone may result in new security challenges and risks or exacerbate existing ones.

An increase in cyberattacks linked to the pandemic

Trend Micro, in the first quarter of this year, there were nearly 1 million spam messages sent, 48,000 hits on malicious URLs, and 737 pieces of malware detected—all tailored with content relevant to COVID-19. Often, these attacks prey on people’s emotions or simply their desire to learn about the pandemic.

This is especially true in phishing (fraudulent email or website scams) attacks, which take advantage of short attention spans and seek to build trust quickly with the recipient.

Adapting to a new virtual working environment

The virtual environment has introduced other unique challenges, including increased phishing, spearphishing, and malware attacks. Cyber actors have been using existing malware and infrastructure and are creating new lures to breach networks and access proprietary data. Businesses must deal with uneven security knowledge among their employees, many of whom work remotely for the first time and are not familiar with remote work security procedures. This can lead to information leakage, cyber-enabled fraud, or disinformation spread through error or inattention. The expanded threat surface also provides additional vectors for malicious cyber actors to leverage the virtual working environment for their illicit purposes. Set forth below is a deeper dive into the six recommendations outlined earlier in this report regarding better secure virtual working environments.

Conclusions

The recent outbreak of the Coronavirus is changing the business world, and companies and individuals need to be prepared. Reviewing your cybersecurity processes and services during this time is critical.

The cybersecurity experts at Lazarus Alliance have deep knowledge of the cybersecurity field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches.

Lazarus Alliance is proactive cybersecurity®. Call 1-888-896-7580 to discuss your organization’s cybersecurity needs and find out how we can help your organization adhere to cybersecurity regulations, maintain compliance, and secure your systems.

Download our company brochure.

Glowing Neon malware sign on a digital projection background.

What Is Autonomous Malware?

We’re reaching the end of 2025, and looking ahead to 2026, most experts are discussing the latest threats that will shape the year ahead. This year, we’re seeing a new, but not unexpected, shift to autonomous threats driven by state-sponsored actors and AI.  With that in mind, a new generation of threats, broadly known as...Continue reading

Stay ahead of federal and industry security alerts with Lazarus Alliance. Featured

What CISA’s Emergency Directive 26-01 Means for Everyone

In mid-October 2025, the CISA issued one of its most urgent orders yet: Emergency Directive 26-01. The directive calls on all Federal Civilian Executive Branch (FCEB) agencies to immediately mitigate vulnerabilities in devices from F5 Networks following a state-sponsored breach of F5’s systems and access to portions of BIG-IP source code and vulnerability data. The event...Continue reading

Make sure that your software is secure with or without AI. Trust Lazarus Alliance. featured

Cybersecurity and Vetting AI-Powered Tools

A recent exploit involving a new AI-focused browser shone a light on a critical problem–namely, that browser security is a constant issue, and AI is just making that threat more pronounced. Attackers discovered a way to use that browser’s memory features to implant hidden instructions inside an AI assistant. Once stored, those instructions triggered unwanted...Continue reading

mnage security against insider threats with Lazarus Alliance. featured

Shutdown Security And Cyber Vulnerability

When the federal government shuts down, the public sees closed monuments, unpaid workers, and halted programs. What they do not see is the silent surge of cyberattacks targeting agencies already operating on fumes. During the most recent shutdown, attacks against U.S. government systems spiked by nearly 85%.  Cybersecurity failures during government disruptions rarely start with...Continue reading

Manage identity security and compliance with a trusted partner in Lazarus Alliance. featured

Identity and the Shift from Malware

The world of cyber threats is rapidly evolving, and while we can see these changes more generally, it’s always crucial to understand them concretely. As the 2025 CrowdStrike Global Threat Report shows us, the landscape of our industry is changing.  We’re digging into this report to discuss a challenging trend: the move of hackers foregoing...Continue reading

Harden security against new AI attack surfaces. Work with Lazarus Alliance. featured

Maintaining Compliance Against Prompt Injection Attacks

The increasing adoption of AI by businesses introduces security risks that current cybersecurity frameworks are not prepared to address. A particularly complex emerging threat is prompt injection attacks. These attacks manipulate the integrity of large language models and other AI systems, potentially compromising security protocols and legal compliance. Organizations adopting AI must have a plan...Continue reading

Stay ahead of CMMC changes with Lazarus Alliance. Featured

Are We Already Talking About CMMC 3.0?

The ink has barely dried on the CMMC final rule, and already the defense contracting community is buzzing with speculation about what comes next. Just when contractors thought they had a moment to catch their breath after years of regulatory limbo, whispers of CMMC 3.0 have begun circulating through the industry. But is this just...Continue reading

Lazarus Alliance helps enterprises manage identity security and data governance.

Centralizing Identity-Based Risk

As the traditional network boundary dissolves and remote work becomes standard practice, identities are the major frontier for security. Whether we’re talking about human users, service accounts, or machine identities, these have emerged as both the primary access mechanism and the most targeted attack vector.  It has become imperative for providers to centralize identity management...Continue reading

FedRAMP Authorization assessments from Lazarus Alliance. featured

Deviation and Significant Change Requests in FedRAMP: A Comprehensive Guide

FedRAMP provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by federal agencies. While the program’s rigorous baseline requirements ensure consistent security, the reality is that this consistency calls for a little flexibility.  This is where deviation requests and significant change requests come into play. These two...Continue reading

Get expert monitoring and security support with Lazarus Alliance featured

The Costs of Compliance and Data Breaches

Data is possibly one of the most valuable assets any organization holds. Customer information, employee records, and proprietary business intelligence present challenges because the data flowing through modern enterprises represents both significant opportunities and serious risks.  Businesses face a challenging balance: investing in compliance measures to protect sensitive information while also preparing for the real...Continue reading

No image Blank

Lazarus Alliance

Website: