DISCLAIMER: The solutions presented on this page are the property of ACME LABS Sp. z o.o. and are subject to legal protection in Poland and abroad, on the basis of intellectual and industrial property rights.

How can you take over someone else's trusted profile

Unfortunately, someone else's Trusted Profile can be maliciously hijacked and the fraudsters already do it, and then with a few clicks they take loans on the victims' data and automatically get them. The procedure is apparently facilitated by shortcomings in the mechanisms for creating a profile in ... a post office (did you know that you can set up a Truted Profile there as well?).

CERT Polska warns: someone is impersonating PKO Bank Polski

False e-mails also appear in the Polish language version. A fraudster impersonating PKO BP suggests that he sends a copy of the payment to the recipient on behalf of the client. The link takes you to an archive of files stored in the Microsoft OneDrive cloud. As CERT Polska warns, the files in the archive are infected and an attempt to run them after downloading will result in the installation of a Trojan from the AgentTesla group.

The National Tax Administration warns against fraudsters. Fake tax refund emails

Phishing attacks are the most popular method of attacks on the web. They consist in the fact that cybercriminals impersonate credible companies or institutions in order to gain the trust of potential victims. Their goal is to install malicious software or phishing. Their popularity is based on the fact that, once a crime has been committed, it is often too late to track down the perpetrators.

SIM-swap-fraud causes loss of PLN 200,000. Why do banks and telecoms still allow such incidents?

The scam exposes a hole in the system. We have been contacted by a lawyer who is fighting to recover PLN 200,000 for his client, to whom someone "cloned" the SIM card and took the money out of the account. The scam is known and already described on "Subjectively about finances", but it is not easy to recover the money. And thieves still take advantage of the credulity of telecoms and their lack of communication with banks.

CONTACT US