Trending

HomeBlog
How Hackers Targeted The Covid-19 Vaccine Supply Chain; Vaccine Sold in Darkweb

How Hackers Targeted The Covid-19 Vaccine Supply Chain; Vaccine Sold in Darkweb

As pharmaceuticals across the world race towards a vaccine, cybercrime continues to thrive in the underbelly of the Internet. In forums on the dark web, criminals continue to trade enormous repositories of critical medical data gathered through unauthorized means. As COVID-19 continues to dominate headlines, confidential vaccine research data generates enough monetization opportunities for cybercriminals. In addition to the COVID-19 databases containing confidential PII being leaked on the Internet, one of the critical security concerns is the immense cold chain logistics of the vaccine.  

Recently, IBM warned against cybercriminals targeting the distribution network of Covid-19 vaccines through a campaign that is believed to have started in September 2020. The hacker activity uncovered by IBM has shed light on a global phishing campaign specifically designed to target members of the Cold Chain Equipment Optimisation Platform (CCEOP) and with signs of being a state-sponsored incident. As per a report by the Guardian, organizations across six countries were sent emails containing malicious attachments.  These emails purported to be from Haier Biomedical, a UNICEF program member for strengthening vaccine supply chains. Incidents such as these underline the pressing need for cybersecurity rigour at every stage in the COVID-19 vaccine supply chain.  

More recently, Cyble research observed a few additional indicators and emails with the subject posing as a Draft of Contract related to the CCEOP and Vaccine Program. This phishing email masquerades as a credible email communication from Haier Biomedical and is targeted at Kraeber & Co., as shown in the image below. 

On opening the malicious HTML attachment, the user is prompted to submit login credentials for viewing PDF content, as depicted in the figure below. Our research indicates a malicious ActiveX component that automatically runs in the background as soon as the user enables the document security control. This type of ‘Precision Targeting’ involves advanced phishing attacks that are difficult to detect and takedown by security organizations. 

The attached HTML page has a malicious ActiveX function that is used to send the harvested credentials to the hacker’s server using a simple POST request, as shown below. 

The victims’ harvested credentials may be used to gain unauthorized access and conduct further cyber espionage activities. The cyber adversary may use the credentials to gain access to the targeted infrastructure and steal confidential information related to the COVID-19 vaccine research and delivery. These sophisticated phishing campaigns may also lead to further damages such as potential data breaches and undetected supply chain attacks. 

report-ad-banner

As countries prepare for the availability and effective distribution of the vaccine in the near future, there is a raising need for cyber defences at every step of the vaccine supply chain. With cyberattacks on the vaccine cold chain emerging from all corners, organizations are expected to ensure preparedness for addressing the potential challenges that may arise in the future. 

Furthermore, our researchers noted that the vaccine is now being sold in various darkweb marketplaces. Considering the limited supply of these vaccines, it is expected that they will be traded. It should be noted that the medical and health risks related to any alleged medicine or vaccine can be dangerous and lethal. We DO NOT recommend users to make any direct or indirect purchases.

Advertisement on Darkweb

Security Measures: 

This phishing campaign is a clear indication that threat actors are shifting their focus on the complex logistical network associated with the R&D and distribution of the vaccine value chain. To counter the impact of cyberattacks targeted towards the COVID-19 vaccine supply chain, here are a few security measures that organizations can adopt.  

  • Validating third-parties and ensuring that they have the necessary level of cyber defences 
  • Never clicking on unverified/unidentified links 
  • Refraining from opening email attachments before validating their authenticity 
  • Using security software and keeping it updated 
  • Training employees on cybersecurity through cyber literacy programs 
  • Periodically conducting third-party/suppliers risk assessment 

Indicators of Compromise (IOCs) 
 

SHA256 Hashes 
18D368E5EE1BBB9B7311E353CFD5475D772E8DF6C4AA1C79B41800F07059B761 
3F0CA8BF1382ACB68E303F2135ED01C595122927DEF9A40E70C0AA8CBDDF7130 
E735ABD2DA75D8782A3828BC31B2C99930058CEBCF73B093D8C7A4139BF06C93  
07DBE854A34E61349ADCC97DD3E2EB5A9158E02568BAE3E2AAE3859AEEB5B8A9 

C2 URLs 

hxxps://roud3servers[.]tk/next[.]php 

About Cyble

Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from cybercrimes and exposure in the darkweb. Cyble’s prime focus is to provide organizations with real-time visibility into their digital risk footprint. Backed by Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Startups To Watch In 2020. Headquartered in Alpharetta, Georgia, and with offices in Australia, Singapore, and India, Cyble has a global presence. To learn more about Cyble, visit www.cyble.io. 

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading