DISCLAIMER: The solutions presented on this page are the property of ACME LABS Sp. z o.o. and are subject to legal protection in Poland and abroad, on the basis of intellectual and industrial property rights.
CERT Polska informs about the threat, which came across false news, where fraudsters imitate the mobile operator Play Poland. The fraudsters are not well prepared, because the content lacks Polish characters. However, this is what the victim may overlook. The fraudsters have placed an Excel file in the message that you should not open.
Did you notice 0 instead of O in the title? Text messages signed as "INP0ST" (through zero) are now being massively sent to Poles' telephones. They encourage you to download the application, suggesting that we will then receive our package's receiving code: You will receive the receiving code after downloading our new appinp0st [.] Com. Text messages are also sent from the overscription: IMPORTANT.
Electronic mail is the most common "gate" that ransomware [1] gets into company systems - according to a study by Sophos. [2] The source of up to 39% of attacks of this type in Poland are malicious links or attachments sent by email. The vast majority enterprises regain access to information encrypted by criminals. Only every fourth decides to pay the ransom, while 56% relies [...]
One group of criminals run by a 34-year-old that was responsible for many frauds using BLIK was detained last week . Six of his companions had already been detained and the counting of the number of victims is still underway. We wrote about "BLIK" scams last year. They consist in the fact that the criminal breaks into a Facebook account and then asks the victim's friends to send BLIK codes and other data.
The Polish Post Office warns against cyber criminals impersonating the company. These include, for example, fake SMS messages about stopping the disinfection shipment and emails that may contain malware. The company said in a Monday announcement that since the onset of the ongoing epidemic, it had seen a worrying increase in customer information about phishing-based cybercrime, i.e. brand impersonation for phishing or theft of money.
Sophos writes about quite surprising technique. During the infection, the 122MB "weight" installer is used, containing a 282 MB virtual, all to hide the 49 kB ransomware bin.
CERT Polska warns of a new threat. Fraudsters impersonate well-known brands again. This time customers of the Play and Orange networks were targeted. Don't click on attachments. It is malware that steals money from bank accounts.
Is it possible to buy an induction hob for PLN 1 instead of PLN 1,999? Yes, you can, but first you need to hack into someone else's IKEA Family account and use the discount code found there. Read the story of the victim of such theft. Four days ago we described an interesting attack on the accounts of IKEA store customers.
Literally a few moments ago we received two new scams imitating Orange Polska. One pretends to be an invoice for telecommunications services, while the other reports an alleged error in the extension of services. The number of notifications that have reached CERT Orange Polska indicates that we are dealing with an extremely large wave of fake emails, just as it was in the recent weeks.
It is no longer just the access to the account via the Internet, but the banking services offered via telephone communication channels that are becoming a weak point of remote banking. Unfortunately, in the pandemic era, banks make it possible to perform a growing range of operations over the phone. When we come to the bank in person, we need to "identify ourselves" with an ID card.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.