German government loses 'tens of millions' in COVID-19 phishing attack

Hackers impersonated NRW's website for distributing emergency coronavirus funding

Phishing

Update: The NRW's Ministry of Economic Affairs website is now back online, enabling the self-employed and small business owners to once again apply for Coronavirus emergency aid. The NRW police say that, so far, there have been no known cases of hackers successfully managing to siphon funds. 

The government of North Rhine-Westphalia (NRW) in western Germany has reportedly lost tens of millions of Euros after hackers impersonated its website for distributing emergency coronavirus funding.

Hackers not only set up a website impersonating the legitimate NRW Ministry of Economic Affairs website but also used the personal details provided by users to file requests and collect funds on their behalf.

The blame has been attributed to NRW officials who had failed to set up a secure method of distributing funds. As opposed to other German states, which have asked users to download a form and mail it or to upload scanned documents in order to verify their identity, NRW only required local applicants to fill out an online form.

This allowed cybercriminals to impersonate applicants who had provided their personal details to the unofficial website and file requests for government aid, replacing only the bank account where funds were to be wired.

The scheme lasted for nearly a month, from mid-March until 9 April, when the NRW government finally took down the website and suspended payments.

However, the damage had already been done. German tech news site Heise reported that prior to the website being taken down, the local police had received 576 official reports of fraud related to the scam.

The situation in NRW is the latest example of hackers using coronavirus-related content in order to reap benefits from the outbreak and subsequent lockdown.

Related Resource

2020 report: The threat posed by shadow IoT devices

Unsanctioned IoT devices open a portal for chaos across the network

Download now

Last week, Google issued a warning to users working from home during the lockdown about a rise in the number of coronavirus-based phishing attacks, many of which are being sent as emails. The company stated almost two in five phishing attempts over Gmail were now related to COVID-19.

According to the BBC, about £2 million has been lost to coronavirus-related fraud in the UK. Earlier this month, both US and UK cybersecurity officials warned that hackers, some of them potentially state-backed, were using the disruption caused by the coronavirus pandemic to exploit businesses and the wider public.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Hackers using COVID vaccine as a lure to spread malware
hacking

Hackers using COVID vaccine as a lure to spread malware

15 Jan 2021
Website problems slow coronavirus vaccine rollout
hacking

Website problems slow coronavirus vaccine rollout

6 Jan 2021
Upskilling a remote workforce
training

Upskilling a remote workforce

15 Dec 2020
The IT Pro Podcast: The power of disinformation
social media

The IT Pro Podcast: The power of disinformation

11 Dec 2020

Most Popular

IT retailer faces €10.4m GDPR fine for employee surveillance
General Data Protection Regulation (GDPR)

IT retailer faces €10.4m GDPR fine for employee surveillance

18 Jan 2021
Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021
BT faces £600m class-action lawsuit for 'overcharging'
Policy & legislation

BT faces £600m class-action lawsuit for 'overcharging'

18 Jan 2021