Asian International University, Imphal, west Manipur
The COVID-19 pandemic (beginning early 2020) triggered a rapid and unprecedented global shift to remote work, telehealth, online education, and digital commerce. This shift expanded the attack surface for cybercriminals, accelerated adoption of cloud and collaboration tools, and exposed gaps in organizational preparedness. This paper synthesizes empirical reports and peer-reviewed literature to describe the major cyber threats observed during the pandemic, their impacts (with emphasis on healthcare and critical infrastructure), and effective technical, organizational, and policy mitigations.
The COVID-19 pandemic forced near-instantaneous operational changes across governments, businesses, schools, and healthcare providers. In many regions, large portions of the workforce shifted to remote setups and institutions adopted or scaled digital services (telehealth, remote learning, cloud collaboration) in a matter of days. While these changes preserved continuity of operations, they also created a fertile environment for malicious actors to exploit fear, uncertainty, and rapid technology adoption. This paper examines the threat landscape that emerged, quantifies impacts using authoritative reports, and proposes mitigations for organizations and policymakers.
2. Background & Context
On March 13, 2020, key national cyber agencies publicly urged organizations to adopt a heightened state of cybersecurity as telework options were rapidly deployed; multiple governments and security organizations released telework and pandemic-specific guidance throughout 2020–2021. These advisories recognized that rushed deployments, broadly distributed endpoints, and overwhelmed security staff increase risk.
Early monitoring in 2020 recorded large volumes of COVID-themed malicious content: spam, malware, phishing, and malicious URLs tied to pandemic topics. INTERPOL’s analysis and public summaries reported hundreds of thousands of COVID-related spam messages and tens of thousands of malicious URLs in early 2020, illustrating how threat actors weaponized pandemic information.
3. Major Threats Observed During the Pandemic
3.1 COVID-themed Phishing, Scams, and Fraud
Phishing remained a dominant vector: attackers used COVID-related themes (vaccine news, travel restrictions, financial relief, PPE offers) to harvest credentials, deliver malware, or defraud victims. Malicious domains and impersonation campaigns were widespread and highly effective because recipients expected legitimate pandemic communications. INTERPOL’s aggregated data highlighted phishing/scam as a major proportion of pandemic threats.
3.2 Ransomware and Targeted Disruption
Ransomware grew in frequency and impact during 2020–2021. Several intelligence and industry reports showed a marked increase in ransomware incidents, with attackers focusing on organizations that could least afford downtime — healthcare, logistics, and manufacturing. IBM X-Force and related analyses noted that attacks on industries supporting the COVID-19 response doubled in 2020 relative to prior periods and that ransomware became a top attack category.
3.3 Vulnerabilities in Videoconferencing and Collaboration Tools
The mass adoption of videoconferencing and collaboration platforms (e.g., Zoom, Teams) created new privacy and security challenges. “Zoombombing” and misconfigured meeting defaults led to high-visibility disruptions; researchers and security teams documented encryption and configuration weaknesses that were exploited early in the pandemic. These incidents illustrated how default settings, user behavior (publicly posted meeting links), and rapid scaling can combine to produce serious risks.
3.4 Telehealth & Remote Care Risks
Healthcare systems rapidly pivoted to telehealth, introducing new privacy and security requirements. Studies and systematic reviews found that telehealth implementations often faced insufficient privacy protections, insecure platforms, and incomplete compliance with health data regulations — all while healthcare staff were stretched thin. These weaknesses made telehealth an attractive target for data theft and operational disruption.
3.5 Supply-chain & Critical Infrastructure Exposure
Critical infrastructure and supply chains were targeted because disruption would produce cascading effects during the pandemic. Increased remote access to industrial control systems (often via hastily deployed VPNs or remote desktop solutions) and third-party dependencies raised systemic risk. Reports emphasized the need to prioritize defenses for supply-chain and medically critical operations.
4. Impacts: Quantitative & Qualitative Evidence
Qualitatively, the pandemic exposed how organizational dependency on digital services — when combined with constrained budgets and stretched human resources — amplified consequences of breaches: patient care interruptions, supply chain delays, privacy breaches, and trust erosion.
5. Why the Pandemic Changed the Attack Surface (Analysis)
Key structural drivers:
6. Case Studies
6.1 INTERPOL: Pandemic-Themed Cybercrime Metrics (Early 2020)
INTERPOL’s August 2020 analysis catalogued the rapid emergence of COVID-themed cybercrime — from fraudulent online sales of PPE to large volumes of COVID-related spam and malicious URLs. These real-time metrics were critical to law enforcement and public awareness efforts.
6.2 Zoom & Videoconferencing Security
Zoom’s explosive growth (from ~10 million daily meeting participants in late 2019 to hundreds of millions in early 2020) created an environment where default configuration weaknesses were consequential. Reports and academic analysis documented the technical and human causes of “Zoombombing” and how vendor-led fixes and user education mitigated but did not eliminate risk.
6.3 Ransomware Targeting Healthcare (IBM X-Force)
IBM X-Force observed that groups opportunistically targeted healthcare and related sectors during 2020, leveraging ransomware and data-exfiltration extortion schemes; the industry reported increases in both number and severity of incidents. These events highlighted the ethical and operational dilemmas in paying ransoms and the systemic consequences of encrypted clinical systems.
7. Mitigation Strategies: Technical, Organizational & Policy
7.1 Technical Controls
7.2 Organizational & Human Measures
7.3 Policy & Public Sector Actions
DISCUSSION
Lessons Learned & Long-term Implications
COVID-19 demonstrated that cyber risk is fundamentally socio-technical: technology changes quickly, but human workflows, incentives, and institutional readiness often lag. Key lessons:
9. Recommendations (Actionable Checklist)
For leadership:
For security teams:
For policymakers:
For vendors:
CONCLUSION
The COVID-19 pandemic was a stress test for global cybersecurity. While threat actors actively exploited the situation—using phishing, ransomware, and platform weaknesses—the crisis also catalyzed important improvements: increased awareness, faster vendor hardening, and stronger cooperation among public and private actors. Future pandemics or global disruptions will be met first in the digital domain; the lessons from COVID-19 must be institutionalized so that resiliency, secure defaults, and preparedness are permanent features of organizational and public policy design.
REFERENCE
Gauri Sethi*, Cybersecurity in the Era of the COVID-19 Pandemic, Int. J. Sci. R. Tech., 2025, 2 (10), 90-93. https://doi.org/10.5281/zenodo.17292829