Coronavirus | Spurt in cyberattacks on personal computers since ‘work from home’ protocol began, says CERT-In

“Cyber criminals are exploiting the COVID-19 outbreak as an opportunity to send phishing emails claiming to have important updates or encouraging donations, impersonating trustworthy organisations,” the CERT-In said in its latest advisory to internet users.

Updated - March 27, 2020 06:58 pm IST

Published - March 27, 2020 06:50 pm IST - New Delhi:

Representational image.

Representational image.

There has been an increase in the number of cyberattacks on personal computer networks and routers since professionals were asked to work from home in the wake of coronavirus ( COVID-19 ) outbreak in the country, the national cyber security agency said on Friday.

India coronavirus lockdown, day 3 live updates | State Helpline numbers

“Cyber criminals are exploiting the COVID-19 outbreak as an opportunity to send phishing emails claiming to have important updates or encouraging donations, impersonating trustworthy organisations,” the CERT-In said in its latest advisory to internet users.

Interactive map of confirmed coronavirus cases in India | U.S. tops world in COVID-19 cases, overtaking China and Italy

The Computer Emergency Response Team of India (CERT-In) said the phenomenon has been witnessed as many organisations have asked their staff to work from home to help stop the spread of the coronavirus that has claimed thousands of live worldwide and infected millions.

“Switching to remote working because of the COVID-19 can create cyber security problems for employers and employees.

News Analysis | COVID-19 an opportunity for India’s health diplomacy

“There is an increase in the number of cyberattacks on computers, routers and unprotected home networks used by employees who have switched to remote working due to the spread of COVID-19,” it said.

With most employees working from home, the agency said, enterprise VPN servers have now become paramount to a company’s backbone, and their security and availability must be the focus for IT (information technology) teams.

“It is important that the VPN service is patched and up-to-date because there will be way more scrutiny against these services,” it added.

Also Read | Android vulnerable to cyberattack: Union Home Ministry

The CERT-In also suggested some countermeasures and best security practices in this context: Change default passwords of your home Wi-Fi router to prevent hackers from accessing your network; use strong and unique passwords on every account and device and use two-factor authentication (2FA).

Some other countermeasures include: Not allowing sharing of work computers and other devices. When employees bring work devices home, those devices should not be shared with or used by anyone else in the home, it said.

“This reduces the risk of unauthorised or inadvertent access to protected company information,” the advisory stated.

It asked users to update VPNs, network infrastructure devices, and devices being used to remote into work environments with the latest software patches and security configurations.

“Only use software your company would typically use to share files and refrain from using your personal email or 3rd party services unless reliably informed otherwise,” it added.

It is recommended that even remote user activity is covered by the organisation’s perimeter security tools, the advisory said.

“Ensure that remote sessions automatically time out after a specified period of inactivity and that they require re-authentication to gain access,” the CERT-In said.

It also urged IT teams of the organisations to remind employees of the types of information that they need to safeguard.

“This often includes information such as confidential business information, trade secrets, protected intellectual property and other personal information,” the advisory said.

“Also, ‘remember password’ functions should always be turned off when employees are logging into company information systems and applications from their personal devices,” it said.

A specific suggestion for IT teams was to “consider Mobile Device Management (MDM) and Mobile Application Management (MAM).”

“These tools can allow organisations to remotely implement a number of security measures, including data encryption, malware scans, and wiping data on stolen devices,” it said.

The CERT-In is the country’s nodal agency to combat cyberattacks like hacking and phishing and is also mandated to fortify the security of the country’s internet domain.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in


Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.