The FBI warned today of specific COVID-19-themed email phishing campaigns targeting U.S.-based medical providers.

The campaigns leverage email subject lines and content related to COVID-19 to distribute malicious attachments, which exploit Microsoft Word document files, 7-Zip compressed files, Microsoft Visual Basic Script, Java, and Microsoft Executables. The FBI alert contains specific indicators of compromise and malware hash signatures, which providers can use to identify and mitigate these threats.

The FBI requests, and AHA strongly encourages, organizations targeted by a phishing campaign to contact their local FBI Cyber Task Force with a copy of the email, the full email header and any attachments. Organizations should not open the attachment unless they are able to examine it in a controlled and safe manner. If an organization is a victim of a cyber-intrusion, they should retain any logs, images of infected devices, and memory capture of all affected equipment, if possible, to assist in the response by the FBI.

For assistance in contacting the FBI or questions on this or other cyber and risk issues, contact John Riggi, AHA senior advisor for cybersecurity and risk, at jriggi@aha.org.

Headline
The White House issued an executive order March 6 to combat cybercrimes by threat groups. The order highlights how such groups can receive willing or…
Headline
The Administration for Strategic Preparedness and Response has released a new cybersecurity module for organizations to conduct risk assessments. The free…
Perspective
Public
As the world has learned in recent years, today’s conflicts are fought with many weapons, and cyber warfare is an integral part of the arsenal.As of this…
Headline
The FBI is reminding critical infrastructure organizations to implement mitigations from a June 2025 fact sheet on potential actions by Iranian-affiliated…
Headline
The Cybersecurity and Infrastructure Security Agency Feb. 26 released a report that updates findings from last year on RESURGE malware used to gain covert…
Headline
U.S. and international agencies Feb. 25 released guidance on protecting Cisco Software-defined Wide-area Networking systems from exploitation by malicious…