Although cyber criminals constantly change the methods of action, their goal remains the same – extort data and money. < img src = "https://zycie.news/crrops/ff9e2b/620x0/1/0/2025/01/19/4q637sdmnw8cbbb6vfxysdacc1s1s1s1s1s1s1s1s1s1s1s1s1s1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S1S alt = "Money, source: pexels" styles = "background-color: rgba (117,137,138.1)" > < p > This time there were Poles in the crosshairs, to whom & oacute; sms are sent massively with a alleged request for payment. The messages look authentic and contain a logo and names associated with state institutions. Experts from CERT Orange Polska alert: This is a new wave of perfidious fraud, which & oacute; Rej must not be underestimated.
< P >< Strong >SMS as from a government institution. But this is a trap < br />< /Strong >< br /> In the latest warning CERT Orange Polska revealed the detail of another phishing campaign in which criminals lift under the Ministry of Finance & oacute; w. False SMS messages contain information about the alleged tax debt and demand its immediate regulation & ndash; under the threat of bailiff enforcement. < p > The sender of the message is the overworks of the windk_govpl, which may mistakenly suggest a relationship with the government institution. & Amp; MDASH; This is a deliberate procedure to inspire trust — Experts warn. In addition, the messages contain a link that leads to a false side of the portal of the Ministry of Finance & v.< P >< Strong > target ? Data of cards and money from Blik < br />< /Strong >< br />On the crafted page, fraudsters inform about the alleged debt of several hundred zlotys. When the user wants to make payments, he sees limited options & amp. Transfers and Google Pay allegedly do not work & due to the technical break & rdquo;. Only Blik and payment card remain, which is not by accident.
< p > When paying by card, information appears that the recipient is & ampquo; taxes.gov.pl & ampquo; which is to sleep vigilance. & Amp; MDASH; It's a scam. The page belongs to the criminal & oacute; in which & oacute; can enter any name of the recipient — translates CERT. The situation with BLIK code looks even worse. Just enter the code, accept in the application and & Hellip; transfer money to thieves. < P >< Strong > Method known, but still effective < br />< /strong >< br />Phishing & ndash; that is, a fraud involving impersonation of trusted institutions & ndash; This is one of the oldest and most common forms of cyber criminals. Fraudsters constantly modify their methods, adapting them to current events. Earlier, in a similar way, & oacute; b informed about the alleged & the final date of the pit settlement & rdquo;, now they threaten the bailiff and debts.< p > experts emphasize that despite the warnings, many people & oacute; b are still fooled. & Amp; MDASH; It works because people are afraid that they have actually forgotten about a bill. And seeing the name associated with the government, they do not have the courage to ignore the news — explain cyber security specialists.
< P >< Strong > how to protect ?< br />< /strong >< br /> CERT Orange Polska resembles a few simple rules that & oacute; re can protect us against loss of money: < /p > < ul > < li > Do not click on the links with suspicious SMS-& oacute; in e-mails, < br />< br />< /li > < li > Do not provide data card data on unverified pages, < br />< br />< /li > < li > do not enter the code & Oacute; in Blik, if you are not 100 % sure to send them, < br />< Br />< li > < li > check the addresses of the page — Even the smallest R&MP; Oacute; Harts can mean the subtrace< p > If you have doubts if you really have any commitment to the tax office, always check it yourself, logging in through a trusted portal: epit.podatki.gov.pl.
< p > online fraud take an increasingly sophisticated form, but their effectiveness still depends on our vigilance and awareness of threats. Just a moment of inattention to lose everything. Therefore, do not ignore the warnings & ndash; Cybercriminals do not sleep.