DISCLAIMER: The solutions presented on this page are the property of ACME LABS Sp. z o.o. and are subject to legal protection in Poland and abroad, on the basis of intellectual and industrial property rights.
Oszu?ci podszywaj?c si? pod Poczt? Polsk? wysy?aj? spam z informacj? o rzekomej przesy?ce. Op?aty za ni? nale?y dokona? poprzez podanie danych karty p?atniczej na z?o?liwej stronie, do ktej odno?nik znajduje w tre?ci wiadomo?ci email. Przechwycone w ten sposób dane s? wykorzystywane przez oszustów do kradzie?y naszych pieni?dzy z konta bankowego.
These are the methods of criminals to extort in a pandemic: on the main sanitary inspectorate, on the bank, searching for leaked databases, etc. The time of the coronavirus pandemic is definitely a period of increased activity of cybercriminals trying to extort our personal data.
Fraudsters do not sit idle! Once again, they impersonate financial institutions to extort money. This time, customers of Bank Millenium are exposed, and the bank warns against fake e-mails.
Scammers pretend to be the DPD courier company. This time they send messages to Poles' e-mail boxes. They ask for a surcharge of PLN 4.20. In fact, they are trying to steal all the money from the account.
Unfortunately, someone else's Trusted Profile can be maliciously hijacked and the fraudsters already do it, and then with a few clicks they take loans on the victims' data and automatically get them. The procedure is apparently facilitated by shortcomings in the mechanisms for creating a profile in ... a post office (did you know that you can set up a Truted Profile there as well?).
We warn you against calls from people who claim to be bank employees, refer to security reasons and urge you to provide confidential banking data and install a remote verification application on your device. Watch out for any messages (SMS, Messenger, WhatsApp, etc.)
False e-mails also appear in the Polish language version. A fraudster impersonating PKO BP suggests that he sends a copy of the payment to the recipient on behalf of the client. The link takes you to an archive of files stored in the Microsoft OneDrive cloud. As CERT Polska warns, the files in the archive are infected and an attempt to run them after downloading will result in the installation of a Trojan from the AgentTesla group.
Phishing attacks are the most popular method of attacks on the web. They consist in the fact that cybercriminals impersonate credible companies or institutions in order to gain the trust of potential victims. Their goal is to install malicious software or phishing. Their popularity is based on the fact that, once a crime has been committed, it is often too late to track down the perpetrators.
Cyber attacks are becoming more and more common and more and more people and organizations are exposed to them. Therefore, when using the Internet for private and professional purposes, we should be particularly careful to minimize the risk of a cyber attack.
The scam exposes a hole in the system. We have been contacted by a lawyer who is fighting to recover PLN 200,000 for his client, to whom someone "cloned" the SIM card and took the money out of the account. The scam is known and already described on "Subjectively about finances", but it is not easy to recover the money. And thieves still take advantage of the credulity of telecoms and their lack of communication with banks.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.