833-847-3280
Schedule a Call

The New Threat: COVID-19 Vaccine Scams

Vaccine scams

As if COVID-19 hasn’t deeply affected everyone’s lives already, now there are criminals who are sending COVID-19 vaccine email scams to unsuspecting victims and creating fake websites.

The Threat – Vaccine Scams

The FBI has already started warning the public about these fraudulent websites and emails.  Two such websites were seized in Maryland.  The two domains were for biotechnology companies that were purportedly developing COVID-19 treatments. These sites are collecting personally identifiable information (PII) of individuals visiting the site.  With this information, the criminals could then send phishing emails or deploy malware.

Criminals are also texting and cold calling people offering their fake vaccines.

Reuters did a little research and found seven different offers for these fake COVID-19 vaccines.  Some included scam emails offering access to a super-secret list for early access to the vaccine, while others were listing on more of the dark-web message boards.  A Few of these offers have asked for $110 to $180 per vaccine. This should be a red flag. However, many people are worrying about getting the vaccine so they will likely pay for it.

The Misunderstanding

The small number of real vaccines that are available has led to miscommunication and caused confusion for the public.  This makes many people prime targets for scams.  People who are fearful or desperate will often overlook red flags such as the high cost of supposed vaccines, or that the vaccines are intended to be distributed by healthcare professionals and not by someone who claims to be from Wuhan, China.

The Takeaway

The biggest takeaway form this is if you receive a text or email offering a link where you can sign up for your vaccine, don’t click on it.  It is likely a scam and will either capture your information for criminal use later or will happily give you malware. You can learn more about phishing and social engineering on our blog.

If you have questions, contact your healthcare provider, but please be kind to them.  They are working hard to get people the information they need but are inundated with questions.

Latest Posts

A transparent image used for creating empty spaces in columns
Here’s a conversation that happens in boardrooms everywhere: “Why do we need a separate cybersecurity team? Our IT department handles all our technology. Can’t they just… handle security too?” It sounds reasonable. IT manages your systems. Security protects your systems. Same systems, right? Why pay…
A transparent image used for creating empty spaces in columns
Your clients trust you with something that keeps them up at night: their data. Whether you’re running their cloud infrastructure, managing their network, developing their applications, or processing their transactions, you’re not just a vendor. You’re the one standing between their sensitive information and everyone…
A transparent image used for creating empty spaces in columns
   Most MSPs are terrified to bring in pen testers. Let’s just say it out loud. You’ve spent years building trust with your clients. You’re their go-to for IT problems. They rely on you. They trust your judgment. And then someone suggests bringing in…
A transparent image used for creating empty spaces in columns
Imagine you want to secure your home against burglars. You have two options for testing your security: Option 1: Hire a security consultant to walk around your house with a checklist, examining every door, window, and lock. They document everything: “Front door lock is 10…
A transparent image used for creating empty spaces in columns
In cybersecurity, no single crack in the wall is usually enough to bring an organization down. Real attackers don’t stop at one weak point; they look for ways to chain vulnerabilities together, linking minor oversights into a path that leads to serious compromise. This is…
A transparent image used for creating empty spaces in columns
In the world of cybersecurity, absolute security is a myth. Every organization, regardless of size or sophistication, faces an uncomfortable truth: vulnerabilities exist, threats are evolving, and resources are finite. This reality brings us to one of the most critical concepts in modern security practice,…
contact

Our Team

This field is for validation purposes and should be left unchanged.
Name(Required)
On Load
Where? .serviceMM
What? Mega Menu: Services