PKO Bank Polski warns against a new campaign of cybercriminals impersonating the bank. Scammers send emails with malware.
PKO BP posted a warning on its website. “We warn against a new malicious spam campaign. Fake messages impersonating the Bank have the subject ‘TRANSACTION CONFIRMATION DETAILS’. The address field of the fake message contains the description ‘PKO WEB BANKINGTransakcje email@example.com’,” we read.
The bank emphasized that it was not the author of these messages.
As indicated, “the message has attachments with the double extension .pdf.gz or .pdf.tar, which contain malware.”
“Do not open attachments or click on links in this type of e-mails. If you click on the link, you may lose your money and control of your account,” explained representatives of the largest bank in Poland.
It was emphasized that the goal of the cybercriminals’ campaign is to infect computers with malware.
The warning is accompanied by a screenshot of a sample message from the scammers.
Recently, the cybersecurity team at the Polish Financial Supervision Authority (CSIRT KNF) warned against fraudsters impersonating the BNP Paribas bank. As reported, in this case, cybercriminals also sent e-mails with false information. It was about the alleged need to update data.
Moreover, the CERT Polska team warned against another dangerous email campaign. “Fraudsters ask you to send an offer for an order allegedly included in the attachment,” we could read in the message. Team representatives indicated that the attachment actually contained GuLoader malware.
GuLoader is malicious software whose task is to download malware to the victim’s computer. “It may be malware that steals data from browsers – passwords, logins, or even software that gives the attacker remote access to the victim’s device,” explained a recent warning posted on government websites.
Main photo source: Shutterstock