International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies


:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

ISSN 2228-9860
eISSN 1906-9642


Vol.12(3) (2021)

  • Cyber Security Threats During Covid-19 Pandemic

    Rajesh Yadav (Department of Computer Science, School of Engineering & Technology, BML Munjal University, INDIA ).

    Disciplinary: Computer and Network Security (Cyber Security & Threat Intelligence).

    ➤ FullText

    doi: 10.14456/ITJEMAST.2021.59

    Keywords: Covid-19 epidemic; Cyber security, CT, Security threats, Privacy concerns; Mobile threat; Cyber attack; DDoS attack; Malicious Social Media Messaging.

    During 2020, Covid-19 was declared as a pandemic, affecting almost every part of societies, because of its impacts economy worldwide faced a big loss which included most of the economic sectors. During that time, technology played a very crucial role worldwide in keeping people connected. Educational institutions adopted online learning, employees started working from home, in addition to that there has been high demand of different types of businesses like online healthcare, delivery of food and grocery shopping etc. Although technology helped in many different ways but we also observed a sudden increase in cyber-attacks. Attackers worldwide took covid-19 situation as a big opportunity to perform various malicious activities and attacks for financial benefits and to promote their evil demands. This paper identifies major threats in cyber security which have taken place worldwide during the situation of covid-19. All these attacks played a big role in bringing harm to different sectors of our society.

    Paper ID: 12A3Q

    Cite this article:

    Yadav, R. (2021). Cyber Security Threats During Covid-19 Pandemic. International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 12(3), 12A3Q, 1-7.


  1. Accenture. (2020). COVID-19:Managing the human and business impact of coronavirus.: (Accessed May 2020).
  2. Bajema, K. L., et al. (2020). Persons evaluated for 2019 novel coronavirus - United States, Morb. Mortal. Wkly. Rep., 69(6), 166.
  3. Berman, S. P., and J. W. Gately. (2020). COVID-19 and Its Impact on Data Privacy & Security. (Accessed May 2020).
  4. Brohi, S. N., N. Z. Jhanjhi, N. N. Brohi, and M. N. Brohi. (2020). Key Applications of State-of-the-Art Technologies to Mitigate and Eliminate COVID-19.
  5. Burgess, S. and H. H. Sievertsen. (2020). Schools, skills, and learning: The impact of COVID-19 on education, VoxEu. org, vol.1.
  6. Cook, A. (2020). COVID-19: Companies and Verticals at Risk for Cyber- Attacks. (Accessed May 2020).
  7. CP. (2020). Update: Coronavirus-themed domains 50% more likely to be malicious than other domains. (Accessed: May-2020).
  8. Dion, Y., and S. N. Brohi. (2020). An Experimental Study to Evaluate the Performance of Machine Learning Algorithms in Ransomware Detection. J. Eng. Sci. Technol., 15(2), pp.967-981.
  9. Han, J. W., O. J. Hoe, J. S. Wing, and S. N. Brohi. (2017). A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware, in Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence, pp. 222-226.
  10. Humayun, M., M. Niazi, N. Z. Jhanjhi, M. Alshayeb, and S. Mahmood. (2020). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study, Arab. J. Sci. Eng., pp. 1-19.
  11. Interpol. (2020). COVID-19 cyberthreats. /COVID-19- cyberthreats Accessed: May 2020).
  12. JHU. (2020). Coronavirus COVID-19 Global Cases by the Center for Systems Science and Engineering (CSSE) at Johns Hopkins University (JHU). (Accessed May 2020).
  13. Khan, N. A., S. N. Brohi, and Jhanjhi. NZ. (2019). UAV's Applications Architecture Security issues and Attack Scenarios: A Survey, in 1st International Conference on Technology Innovation and Data Sciences (ICTIDS).
  14. Khan, N., S.N. Brohi and N.Zaman. (2020). Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic. (Accessed: July 2020).
  15. Malwarebytes. (2020). Fake Corona Antivirus distributes Black NET remote administration tool. (Accessed May 2020).
  16. M-Security. (2020). Sophisticated COVID-19-Based Phishing Attacks Leverage PDF Attachm- ents and Saas to Bypass Defenses. (Accessed May 2020).
  17. Perez, S. (2020). Videoconferencing apps saw a record 62M downloads during one week in March. (Accessed May2020).
  18. Peterson, P. (2020). Business Email Compromise (BEC): Coronavirus a Costly New Strain of Email Attack. (Accessed May 2020).
  19. Ren, C. Liang, I. Hyug, S. Broh, and N. Z. Jhanjhi. (2020). A Three- Level Ransomware Detection and Prevention Mechanism, EAI Endorsed Trans. Energy Web, vol. 7, no. 26.
  20. Stein, S. and J. Jacobs. (2020). Cyber-Attack Hits U.S. Health Agency Amid Covid-19 Outbreak. agency-suffers-cyber-attack-during-covid-19-response (Accessed May 2020).
  21. Stevens, P. (2020). Oil plunges 24% for worst day since 1991 hits multi-year low after OPEC deal failure sparks price war. (Accessed May 2020).
  22. TM. (2020). Developing Story: COVID-19 Used in Malicious Campaigns. (Accessed: May 2020).
  23. Vigliarolo. (2020). Who has banned Zoom? Google, NASA, and more, available: (Accessed May 2020).
  24. WHO. (2020). Statement on the second meeting of the International Health Regulations (2005) Emergency Committee regarding the outbreak of novel coronavirus (2019-nCoV). World Health Organization (Accessed May 2020).
  25. Worldometers. (2020). Reported Cases and Deaths by Country, Territory or Conveyance. (Accessed May 2020).

Other issues:


Call-for-Scientific Papers
Call-for-Research Papers:
ITJEMAST invites you to submit high quality papers for full peer-review and possible publication in areas pertaining engineering, science, management and technology, especially interdisciplinary/cross-disciplinary/multidisciplinary subjects.

To publish your work in the next available issue, your manuscripts together with copyright transfer document signed by all authors can be submitted via email to Editor @ (no space between). (please see all detail from Instructions for Authors)

Publication and peer-reviewed process:
After the peer-review process (4-10 weeks), articles will be on-line published in the available next issue. However, the International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies cannot guarantee the exact publication time as the process may take longer time, subject to peer-review approval and adjustment of the submitted articles.