Search
Close this search box.

Phishing Ploy Targets COVID-19 Vaccine Distribution Effort

A refrigerated truck drives out of the Pfizer Manufacturing plant in Puurs, Belgium, on Thursday, Dec. 3, 2020. British officials on Wednesday authorized a COVID-19 vaccine for emergency use, greenlighting the world's first shot against the virus that's backed by rigorous science and taking a major step toward eventually ending the pandemic. (AP Photo/Virginia Mayo)

IBM security researchers say they have detected a cyberespionage effort using targeted phishing emails to try to collect vital information on the World Health Organization’s initiative for distributing COVID-19 vaccines to developing countries.

The researchers said they could not be sure who was behind the campaign, which began in September, or if it was successful. But the precision targeting and careful efforts to leave no tracks bore “the potential hallmarks of nation-state tradecraft,” they said in a blog post Thursday.

The campaign’s targets, in countries including Germany, Italy, South Korea and Taiwan, are likely associated with the development of the “cold chain” needed to ensure coronavirus vaccines get the nonstop sterile refrigeration they need to be effective for the nearly 3 billion people who live where temperature-controlled storage is insufficient, IBM said.

“Think of it as the bloodline that will be supplying the most vital vaccines globally,” said Claire Zaboeva, an IBM analyst involved in the detection.

The U.S. Cybersecurity and Infrastructure Security Agency later issued an advisory encouraging Operation Warp Speed, the Trump administration’s vaccine program, and other organizations involved in vaccine storage and transport, to review IBM’s findings.

Whoever is behind the operation could be motivated by a desire to learn how the vaccines are best able to be shipped and stored — the entire refrigeration process — in order to copy it, said Nick Rossmann, the IBM team’s global threat intelligence lead. Or they might want to be able to undermine a vaccine’s legitimacy or launch a disruptive or destructive attack, he added.

In the ploy, executives with groups likely associated with the initiative known as Covax — created by the Gavi Vaccine Alliance, the World Health Organization and other U.N. agencies — were sent spoofed emails appearing to come from an executive of Haier Biomedical, a Chinese company considered the world’s main cold-chain supplier, the analyst said.

The phishing emails had malicious attachments that prompted recipients to enter credentials that could have been used to harvest sensitive information about partners vital to the vaccine-delivery platform.

Targets included the European Commission’s Directorate-General for Taxation and Customs Union and companies that make solar panels for powering portable vaccine refrigerators. Other targets were petrochemical companies, likely because they produce dry ice, which is used in the cold chain, Zaboeva said.

The EU agency has been busy revising new import and export regimes for coronavirus vaccines and would be a gold mine for hackers seeking stepping stones into partnering organizations, she said.

Covax has struggled to raise enough money to compete for vaccine contracts against the world’s wealthiest nations in the race to secure doses as fast as they can be produced. But the UN and Gavi have invested millions in cold-chain equipment across Africa and Asia. The investment, in the works well before the pandemic, was accelerated to prepare for an eventual global rollout of coronavirus vaccines.

Whoever was behind the phishing operation likely sought “advanced insight into the purchase and movement of a vaccine that can impact life and the global economy,” the blog post said. Coronavirus vaccines will be one of the world’s most sought-after products as they are distributed, so theft may also be a danger.

Last month, Microsoft said it had detected mostly unsuccessful attempts by state-backed Russian and North Korean hackers to steal data from leading pharmaceutical companies and vaccine researchers. It gave no information on how many succeeded or how serious those breaches were. Chinese state-backed hackers have also targeted vaccine makers, the U.S. government said in announcing criminal charges in July.

Microsoft said most of the targets — located in Canada, France, India, South Korea and the United States — were researching vaccines and COVID-19 treatments. It did not name the targets.

On Wednesday, Britain became the first country to authorize a rigorously tested COVID-19 vaccine, the one developed by American drugmaker Pfizer and Germany’s BioNTech.

Other countries aren’t far behind: Regulators not only in the U.S. but in the European Union and Canada also are vetting the Pfizer vaccine along with a shot made by Moderna Inc. British and Canadian regulators are also considering a vaccine made by AstraZeneca and Oxford University.

The logistical challenges of distributing vaccines globally are huge. The Pfizer-BioNTech one must be stored and shipped at ultra-cold temperatures of around minus 70 degrees Celsius (minus 94 degrees Fahrenheit).

(AP)



Leave a Reply


Popular Posts