Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

US Seizes More Domains Used In COVID-19 Vaccine Phishing Attacks

US Seizes More Domains Used In COVID-19 Vaccine Phishing Attacks

The US Department of Justice has seized a fifth domain name used to impersonate the official site of a biotechnology company involved in COVID-19 vaccine development.

The seized domain claimed to sell the REGEN-COV2 emergency antibody-drug cocktail developed by Regeneron Pharmaceuticals and approved by the US Food and Drug Administration for emergency COVID-19 treatment in November 2020.

“However, the website was fraudulent and instead appears to have been used to collect the personal information of individuals visiting the site, in order to use the information for nefarious purposes, including fraud, phishing attacks, and/or deployment of malware,” the Justice Department said.

“Individuals visiting the site now will see a message that the site has been seized by the federal government and be redirected to another site for additional information.”

The US Attorney’s Office for the District of Maryland seized the usaregenermedicals[.]com — registered on January 21 using the NameCheap registrar — after an HSI Cyber Operations Officer discovered its malicious nature.

Also Read: The DNC Registry Singapore: 5 Things You Must Know

Image: US Department of Justice

Four other phishing domains seized in recent months

Since December 2020, the US Department of Justice seized four other domains used by fraudsters for various nefarious purposes, including fraud, phishing attacks, and/or infecting targets’ computers with malware.

Similar actions lead to domain seizures of:

  • remdesivirmx[.]com: Seized on March 1, 2021, for collecting the personal information of individuals who wanted to buy the Remdesivir antiviral drug.
  • modernatx[.]shop: Seized on January 15, 2021, for claiming to sell purported COVID-19 vaccines (impersonated the official site of biotechnology company Moderna)
  • mordernatx[.]com and regeneronmedicals[.]comSeized on December 18, 2020, for collecting the personal info of individuals visiting the sites. (impersonated the sites of biotechnology companies Moderna and Regeneron)

“The seizure of these five sites by the government has prevented third parties from acquiring the names and using them to commit additional crimes, as well as prevented third parties from continuing to access the fraudulent sites in their present form,” the DoJ added.

“The Federal government is providing the vaccine free of charge to people living in the United States. We will continue to aggressively prosecute these fraudsters who seek to prey on unsuspecting residents and their families,” Acting US Attorney Jonathan F. Lenzner said.

Over $365 million lost to COVID-19-related fraud

According to stats provided by the US Federal Trade Commission (FTC), more than 372,000 Americans reported financial losses of more than $365 million following COVID-19-related scams since the start of 2020, according to stats provided by the US Federal Trade Commission (FTC).

Threat actors have also targeted orgs associated with COVID-19 vaccine research and involved in the COVID-19 vaccine cold chain.

Chinese-sponsored hacking groups coordinated attacks targeting vaccine research orgs according to a joint public service announcement issued by the FBI and DHS-CISA.

Also Read: How To Comply With PDPA: A Checklist For Businesses

The Russian-backed APT29 hacking group has also targeted Canadian, UK, and US vaccine research organizations with the end goal of harvesting intellectual property related to vaccine testing and development.

Last but not least, Microsoft took down domains used in COVID-19-related cybercrime, such as harvesting sensitive information, later to be used in Business Email Compromise (BEC) attacks.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us