{"id":8850,"date":"2020-04-16T08:58:35","date_gmt":"2020-04-16T12:58:35","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8850"},"modified":"2021-11-09T14:29:01","modified_gmt":"2021-11-09T19:29:01","slug":"coronavirus-online-threats-part-4","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/","title":{"rendered":"Coronavirus Online Threats Going Viral, Part 4: Phishing"},"content":{"rendered":"\n<i><br \/> By Dr. David Barnett,<br \/>subject matter expert, brand monitoring<\/i> <span style=\"padding-left:100px\">Share this post \n<a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\" style=\"padding-left:5px\"\/><\/a>\n<a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a>\n<a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n<\/span>\n\n\n\n<p>In part four of this series of posts looking at emerging internet content relating to coronavirus, we explore phishing.<\/p>\n\n\n\n<p>In times of crisis, cyber criminals invariably take advantage of the growing concerns of the public. In the case of the coronavirus, they have done so by sending phishing emails that play on the fears surrounding the spread of the illness.<\/p>\n\n\n\n<p>A number of reports have emerged of emails purporting to provide advice or assistance relating to COVID-19, but which are actually hooks to spread malicious content, or to drive people to websites intended to harvest personal details. Many of the phishing emails use the names of trusted organizations such as the World Health Organisation or the U.S. Center for Disease Control and Prevention (CDC) to add credibility to their content. A report published on March 20, 2020 stated that victims of online scams had lost \u00a3960,000 in coronavirus-linked cases since the start of February<sup>[1]<\/sup>.<\/p>\n\n\n\n<p>Some emails encourage the user to open an attachment that may contain malware. Identified cases include examples where attackers run code on a user\u2019s computer or track their movements, steal information through keylogging, or lock files on the user\u2019s device and demand a ransom for their reinstatement. Other instances have been reported of malicious files being distributed through copies of healthcare company or government agency websites<sup>[2],[3]<\/sup>.<\/p>\n\n\n\n<p>Some types of phishing emails drive users to lookalike websites intended to harvest login details; others directly solicit for payments. One particular case asked for Bitcoin donations, allegedly to aid the CDC in the search for a vaccine<sup>[4]<\/sup>.<\/p>\n\n\n\n<p>Fraudulent coronavirus communications may purport to provide benefits. One reported SMS-based scam offered free iPhones to encourage recipients to click a link to a fake site. Other reported scams include emails offering payday loans, tax rebates, insurance schemes or trading advice in response to the crisis, or offering products billed as coronavirus cures<sup>[5],[6]<\/sup>.<\/p>\n\n\n\n<p><strong>Figure 1:<\/strong> Example of a fake government website hosted on a coronavirus-specific domain name, associated with a phishing scam using an SMS message offering a tax refund<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"740\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/DBS_Part_4-1024x740.jpg\" alt=\"\" class=\"wp-image-8851\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/04\/DBS_Part_4-1024x740.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/04\/DBS_Part_4-300x217.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/04\/DBS_Part_4-768x555.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/04\/DBS_Part_4.jpg 1106w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>As the crisis has progressed, there has been a rise in phishing activity over social media, typically involving fake accounts. Given the speed with which content can spread across social media\u2014particularly in the current climate of fear\u2014such scams have the potential to reach large numbers of people in a short time<sup>2<\/sup>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to keep your customers safe<\/strong><\/h3>\n\n\n\n<p>It\u2019s important to keep your customers, as well as your own employees, safe by making them aware of how to spot a phishing email. Tips for spotting phishing emails are generally the same as for most fraudulent campaigns. It may be a good idea to educate your customers as to what to expect from your company, and what a phishing scam may look like. Here are our tips for spotting a phishing email:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Pay attention to the originating email address and the host domain of any embedded links; fraudsters may attempt to pass off their messages as being from a legitimate organisation (say, company.com) by using variants of the official domain name, such as company.org, or company-safety.com, in order to construct a convincing sender address. Even if an email appears to use the official domain name, it\u2019s possible this information may have been spoofed.<br \/><br \/><\/li><li>Hover over links without clicking them. Many fraudulent emails may show the legitimate domain in the visible link text while actually directing elsewhere. Bear in mind that even an email linking to an official site may incorporate a malicious attachment.<br \/><br \/><\/li><li>Look out for anomalies in the email text. A phishing email could have:<br \/><br \/><ul><li>A generic rather than personalized greeting<\/li><\/ul><ul><li>Spelling or grammatical mistakes<\/li><\/ul><ul><li>Messaging that conveys a sense of urgency or has a deadline by when to act<\/li><\/ul><ul><li>Other requests for personal information<sup>[7]<\/sup>.<\/li><\/ul><\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How CSC can help brand owners<\/strong><\/h3>\n\n\n\n<p>CSC\u2019s Anti-Phishing service can aid brand owners in detecting fraudulent emails and associated websites that may incorporate their branding illegally to add credibility. Our technology makes use of a combination of honeypot email accounts and other mail sources (i.e., customer abuse mailboxes, feeds from anti-fraud and security providers) to attract as large a cross-section of general spam traffic as possible to detect phishing emails. Emails are analysed and embedded links crawled to identify potentially fraudulent sites. We then use customer-specific rules to look for brand references and other associated keywords, in addition to comparing the fingerprint of the site against other known cases of fake content. When fraudulent content is detected\u2014generally considered a contravention of terms and conditions by a number of internet service providers\u2014we have a number of enforcement options to ensure the swift removal of the website.<\/p>\n\n\n\n<p>If you\u2019d like to find out more about our Anti-Phishing services, <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/anti-phishing\/\">click here<\/a> or <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/request-consultation\/\">fill in our online form<\/a> to be contacted by one of our team.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><a href=\"#_ftnref1\">[1]<\/a> <a href=\"https:\/\/www.bbc.co.uk\/news\/uk-51964507\">bbc.co.uk\/news\/uk-51964507<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref2\">[2]<\/a> <a href=\"https:\/\/www.mayerbrown.com\/en\/perspectives-events\/publications\/2020\/03\/dont-panic-stay-calm-legal-strategies-for-addressing-coronavirus-phishing-scams-in-hong-kong\">mayerbrown.com\/en\/perspectives-events\/publications\/2020\/03\/dont-panic-stay-calm-legal-strategies-for-addressing-coronavirus-phishing-scams-in-hong-kong<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref3\">[3]<\/a> <a href=\"https:\/\/www.worldtrademarkreview.com\/anti-counterfeiting\/covid-19-phishing-warning-uspto-responds-wipo-election-microsoft-sued-news\">worldtrademarkreview.com\/anti-counterfeiting\/covid-19-phishing-warning-uspto-responds-wipo-election-microsoft-sued-news<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref4\">[4]<\/a> <a href=\"https:\/\/www.recordedfuture.com\/coronavirus-panic-exploit\/\">recordedfuture.com\/coronavirus-panic-exploit\/<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref5\">[5]<\/a> <a href=\"https:\/\/www.forbes.com\/sites\/mattperez\/2020\/03\/16\/coronavirus-scams-watch-out-for-these-efforts-to-exploit-the-pandemic\/#443d4eaa6103\">forbes.com\/sites\/mattperez\/2020\/03\/16\/coronavirus-scams-watch-out-for-these-efforts-to-exploit-the-pandemic\/#443d4eaa6103<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref6\">[6]<\/a> <a href=\"https:\/\/news.sky.com\/story\/coronavirus-criminals-exploiting-covid-19-pandemic-with-email-scams-11959433\">news.sky.com\/story\/coronavirus-criminals-exploiting-covid-19-pandemic-with-email-scams-11959433<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref7\">[7]<\/a> <a href=\"https:\/\/us.norton.com\/internetsecurity-online-scams-coronavirus-phishing-scams.html\">https:\/\/us.norton.com\/internetsecurity-online-scams-coronavirus-phishing-scams.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part four of this series of posts looking at emerging internet content relating to coronavirus, we explore phishing. In times of crisis, cyber criminals invariably take advantage of the growing concerns of the public. In the case of the coronavirus, they have done [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,548,521],"tags":[],"class_list":["post-8850","post","type-post","status-publish","format-standard","hentry","category-brands","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Coronavirus Online Threats Going Viral, Part 4: Phishing | CSC<\/title>\n<meta name=\"description\" content=\"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part four of this series of posts looking at emerging internet content\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Coronavirus Online Threats Going Viral, Part 4: Phishing | CSC\" \/>\n<meta property=\"og:description\" content=\"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part four of this series of posts looking at emerging internet content\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-16T12:58:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-09T19:29:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/DBS_Part_4-1024x740.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Coronavirus Online Threats Going Viral, Part 4: Phishing\",\"datePublished\":\"2020-04-16T12:58:35+00:00\",\"dateModified\":\"2021-11-09T19:29:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/\"},\"wordCount\":862,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/DBS_Part_4-1024x740.jpg\",\"articleSection\":[\"Brand Protection\",\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/\",\"name\":\"Coronavirus Online Threats Going Viral, Part 4: Phishing | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/DBS_Part_4-1024x740.jpg\",\"datePublished\":\"2020-04-16T12:58:35+00:00\",\"dateModified\":\"2021-11-09T19:29:01+00:00\",\"description\":\"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part four of this series of posts looking at emerging internet content\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/DBS_Part_4-1024x740.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/DBS_Part_4-1024x740.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-4\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Coronavirus Online Threats Going Viral, Part 4: Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Coronavirus Online Threats Going Viral, Part 4: Phishing | CSC","description":"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part four of this series of posts looking at emerging internet content","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/","og_locale":"en_US","og_type":"article","og_title":"Coronavirus Online Threats Going Viral, Part 4: Phishing | CSC","og_description":"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part four of this series of posts looking at emerging internet content","og_url":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2020-04-16T12:58:35+00:00","article_modified_time":"2021-11-09T19:29:01+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/DBS_Part_4-1024x740.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Coronavirus Online Threats Going Viral, Part 4: Phishing","datePublished":"2020-04-16T12:58:35+00:00","dateModified":"2021-11-09T19:29:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/"},"wordCount":862,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/DBS_Part_4-1024x740.jpg","articleSection":["Brand Protection","Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/","url":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/","name":"Coronavirus Online Threats Going Viral, Part 4: Phishing | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/DBS_Part_4-1024x740.jpg","datePublished":"2020-04-16T12:58:35+00:00","dateModified":"2021-11-09T19:29:01+00:00","description":"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part four of this series of posts looking at emerging internet content","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/DBS_Part_4-1024x740.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/DBS_Part_4-1024x740.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-4\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Coronavirus Online Threats Going Viral, Part 4: Phishing"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8850"}],"version-history":[{"count":2,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8850\/revisions"}],"predecessor-version":[{"id":8853,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8850\/revisions\/8853"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}