833-847-3280
Schedule a Call

The New Threat: COVID-19 Vaccine Scams

Vaccine scams

As if COVID-19 hasn’t deeply affected everyone’s lives already, now there are criminals who are sending COVID-19 vaccine email scams to unsuspecting victims and creating fake websites.

The Threat – Vaccine Scams

The FBI has already started warning the public about these fraudulent websites and emails.  Two such websites were seized in Maryland.  The two domains were for biotechnology companies that were purportedly developing COVID-19 treatments. These sites are collecting personally identifiable information (PII) of individuals visiting the site.  With this information, the criminals could then send phishing emails or deploy malware.

Criminals are also texting and cold calling people offering their fake vaccines.

Reuters did a little research and found seven different offers for these fake COVID-19 vaccines.  Some included scam emails offering access to a super-secret list for early access to the vaccine, while others were listing on more of the dark-web message boards.  A Few of these offers have asked for $110 to $180 per vaccine. This should be a red flag. However, many people are worrying about getting the vaccine so they will likely pay for it.

The Misunderstanding

The small number of real vaccines that are available has led to miscommunication and caused confusion for the public.  This makes many people prime targets for scams.  People who are fearful or desperate will often overlook red flags such as the high cost of supposed vaccines, or that the vaccines are intended to be distributed by healthcare professionals and not by someone who claims to be from Wuhan, China.

The Takeaway

The biggest takeaway form this is if you receive a text or email offering a link where you can sign up for your vaccine, don’t click on it.  It is likely a scam and will either capture your information for criminal use later or will happily give you malware. You can learn more about phishing and social engineering on our blog.

If you have questions, contact your healthcare provider, but please be kind to them.  They are working hard to get people the information they need but are inundated with questions.

Latest Posts

A transparent image used for creating empty spaces in columns
Imagine you want to secure your home against burglars. You have two options for testing your security: Option 1: Hire a security consultant to walk around your house with a checklist, examining every door, window, and lock. They document everything: “Front door lock is 10…
A transparent image used for creating empty spaces in columns
In cybersecurity, no single crack in the wall is usually enough to bring an organization down. Real attackers don’t stop at one weak point; they look for ways to chain vulnerabilities together, linking minor oversights into a path that leads to serious compromise. This is…
A transparent image used for creating empty spaces in columns
In the world of cybersecurity, absolute security is a myth. Every organization, regardless of size or sophistication, faces an uncomfortable truth: vulnerabilities exist, threats are evolving, and resources are finite. This reality brings us to one of the most critical concepts in modern security practice,…
A transparent image used for creating empty spaces in columns
 If you’re an MSP, IT consultant, or compliance professional, you’ve probably faced this dilemma: your clients need penetration testing, but security testing isn’t your core expertise. Maybe you’re brilliant at compliance frameworks, exceptional at client relationships, or a generalist IT provider who keeps businesses…
A transparent image used for creating empty spaces in columns
For small and mid-sized businesses (SMBs), cybersecurity is often viewed as something reserved for larger enterprises with deep budgets and dedicated security teams. But the reality is stark: SMBs are prime targets for attackers precisely because they’re perceived as easier to breach. What separates resilient…
A transparent image used for creating empty spaces in columns
For many small and mid-sized businesses (SMBs), achieving compliance with standards like HIPAA, PCI DSS, or SOC 2 feels like reaching the finish line. After all, auditors sign off, certifications are awarded, and customers gain confidence that the business takes cybersecurity seriously. But here’s the…
contact

Our Team

This field is for validation purposes and should be left unchanged.
Name(Required)
On Load
Where? .serviceMM
What? Mega Menu: Services