Do not panic. Follow the rules of conduct below.
If you suspect that you have fallen victim to a cyberattack and your data is encrypted:
If you suspect that you are a victim of a cyberattack and your login details have been extorted:
Phishing is a type of fraud where a cybercriminal impersonates another person or institution to obtain personal information (e.g., credit card details,login details) or infect a computer with malware.
Phishing poses a threat to all internet users, both private individuals, and businesses. A phishing attack is dangerous to companies due to the risk of financial losses and a negative impact on their brand image. Cybercriminals use malicious messages to encourage the recipient to click on a link contained in the message. Usually, redirects to a website that is confusingly similar to the actual website of the institution such as bank, court, courier, or telecommunications company. However, the website is already prepared made by scammers. A user is convinced that the website is legit and types in login and password that hackers are actually stealing.
A common practice of hackers is sending fake-mail messages that encourage recipients to download malicious files added as attachments. Cybercriminals can also proliferate spyware, keyloggers (malware that records keystrokes), or Trojan (malware) by using fake messages.
Phishing attacks are the subject of over 50% of all security incidents in Poland.
The consequences of a successful phishing attack are:
Malware is malicious software designed to infect a device, computer networks, and corporate networks. There are many types of malware, including viruses, adware, scareware, worms, ransomware, trojans, rootkit, fileless malware, spyware, keyloggers, cryptojacking or even camjacking.
Malware usually reaches devices via e-mail or the Internet (hacked websites, demo versions of programs, games, or other files downloaded to a device with insufficient security. All users are at risk of attacking malware. However, entities with essential files and public or private systems are particularly vulnerable to hacking (government agencies, healthcare institutions, HR departments, manufacturing companies, etc.).
The damage caused by malware attack can be as follows:
ATO (Account Takeover) is a type of identity theft in which a cybercriminal takes over access to credit or debit cards, bank accounts, or other online services accounts of the user.
AML stands for “Anti Money Laundering.” It is a set of actions, procedures, and regulations implemented by institutions providing financial services to counteract and neutralize the event related to money laundering.
KYC stands for “Know Your Customer.” It is a set of regulations and procedures by which the customer’s identity is authenticated, confirming the credibility of information and verifying its activities and source of funds to carry out the transaction according to the law. The main priority of KYC activities are combating AML money laundering fraud and preventing terrorist financing.
SCA stands for "Strong Customer Authentication." It is a method of two-factor authentication that verifies the user's identity while performing payment operations. Two-factor authentication means that at least two of the following three categories were used:
The strong authentication mechanism is aimed to ensure the security of payment services and resistance to fraud.
PREBYTES SIRT stands for Security Incident Response Team. The main duty of the PREBYTES SIRT team is incident analysis and the mitigation of cyber threats.
SOC stands for "Security Operations Center." It is a separate organizational unit in companies that are accountable for the security of IT infrastructure. SOC deals with network monitoring, detection of cyber threats and their analysis, and responding to crisis situations in cyberspace. The SOC primary duty is to ensure the organization's critical assets and data protection continuity.
Discover how PREBYTES can protect your business against cyber attacks
Protect network and block access to dangerous websites.
Ensure business continuity and defend your online assets.
Prevent Account Takeover, stop fraud and money laundering.
Device digital fingerprint and Strong User Authentication (SCA)
Prevent remote access scam and remote desktop takeover.
Protect your application against emulators, malware, and takeover.
Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.
Investigate the internet for harmful content for your organization.
Protect your business against malware attacks.
Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.
Professional cyberthreats analysis
Professional cyberthreats mitigation
Protect network and block access to dangerous websites.
Investigate the internet for harmful content for your organization.
Protect your brand against phishing attacks.
Cybersecurity awareness newsletter to keep your organization up to date.