Lost24

Are you waiting for a parcel from the UPS Express courier company?

If so, be careful, because you may be the target of a cyberattack.

Experts from the Avlab have checked the authenticity of suspicious e-mail massages received lately by many network users. In comparison to the the original, the examen e-mails differed only by order number, while the IP address, content, pdf attachment, and website from which the "invoice" should be downloaded were identical.

To make it look even more credible, the messages contained the invoice number, along with the order amount.

Avlab has confirmed that the attached pdf file is not malicious, but the URL adders, redirecting to the external website, is. If the us

Lost24

Having the web browser remember passwords and/or logins can be convenient, but it poses some security risks.

The experts from ESET company warn the Internet users about the e-mail messages, presumably sent by the Delta Air Lines, confirming the purchase of air tickets to Washington, DC. In reality it is a clever scam aim at stealing sensitive data (like logins and passwords) stored in a web browser and e-mail programs.

The imprudent recipient of such e-mail, who, without a second thought, decides to open the attached file (or a link), will instantly download an malicious malware designed to look like a proper Microsoft Word document. The malware has a password stealing component, desinge to extract bank, PayPal or other financial details along

Lost24

Experts from CERT Poland have informed about the new e-mail campaign of Polish Stalking Group, aimed at extorting a ransom of 1000 PLN using bitcoin wallet. This new method can be desribed only as a blackmail. The extortionists threaten the victim to send 100 courier parcels from random e-shops, if the victim does not agree to pay the ransom.

In order to confirm the authenticity and seriousness of the threat, the victim revives a e-mail massage containing the victim's sensitive data, such as social security number (PESEL), address and phone number. The message also implies that some courier parcels may contain illegal substances, like drugs, which may endanger the victim to legal repercussions from law enforcement agencies.

The victim is left

Lost24

Have you ever downloaded pirated content from the P2P network (commonly known as  torrent sites)?
If so... then, you can expect to get an e-mail massage with a warning.

British Internet providers have joined the “Get it right from a genuine site” action. The campaign aims to reduce the scale of piracy, and to support the download of music and movie files from legal sources.

The “Get it Right...” monitors peer to peer (P2P) networks for illegal downloads. Each Internet user that downloads files form torrent sites may receive an email massage with an warning. The email cautions subscribers they have 20 days to stop downloading copyrighted material using P2P websites. Should the warning be ignored a second time – an an

Lost24

Minecraft – one of the most popular games has been exploited by cyber criminals.
Most recently the experts from ESET company have reported that the Google Play app store contains 87 apps for popular Minecraft game that in reality are malicious malwares disguised as mods. So far the harmful apps have been installed by almost 1 million of Android users.

Among the identified fake mods, 14 were responsible of displaying aggressive advertisement banners while the remaining 73 were redirecting the users to scam websites. ESET security software detects those threats as Android/TrojanDownloader.Agent.JL (ad-displaying downloaders) and Android/FakeApp.FG (fake apps).

Moreover, the language of the scareware advertisements was based on the geo

Thursday 30 March 2017, Safety Guide

A fake Google Chrome phishing fraud

Lost24

Cybercriminals have created a fake version of popular Google Chrome browser, which resembles the original application, but in truth can only be described as a scam, designed to fool the Internet users into revealing their payment card details.


Experts from the Malware Hunter Team report that after the fake browser is installed on the victim’s computer, it displays the “standard” Google Chrome icon on the desktop. Moreover, even after launching,  the fake browser behaves almost identical like the authentic application. There is hoverer one impotent difference. Namely, at some point the fake browser asks the user to make a transfer (of 0.50 EUR) and reveal  an critical payment card details, like credit card number,expirat

Lost24

Another wave of attacks, this time aimed at Netia clients, was reported by a portal Zaufana Trzecia Strona. Thousands of mails with malicious programs have been sent to this group of Internet users. The massages contained all the original data of the clients (previously stolen from the company's database) and an attached folder with false invoice.

After opening such message the computer can be infected with a trojan that was designed to collect sensitive data, such as mailbox logins and passwords. However, the installation process of the virus can not be perform without the “help” from the users themselves. According to the portal Zaufana Trzecia Strona to run malicious code, the user must first unpack the attached folder (RAR file) by entering a password in

Lost24

Are You a satisfied user of Kodi media player? Stay alert, because You might unwillingly participate in DDoS attacks. How is this possible? Due to recent actualization of Exodus add-on.


The Exodus is the most popular Kodi add-on which allows users to stream movies and TV-shows content from a variety of sources. Unfortunately, the creator of this popular add-on has recently injected a piece of code which turned every Exodus user into an unwilling DDoS botnet (occasionally referred to as a “zombie army”).


The alteration of the code was revealed and described by the users of tvaddons.ag forum. They have noticed that every time a user tried to play something through Exodus add-on, the plugin attempted to e

Lost24

The Russian group of hackers known as APT28 is targeting MacOS users with a new variant of the X-Agent spyware, which has previously attacked other popular OS systems.


According to the security researchers from Bitdefender Labs the maleware is capable of stealing passwords, taking screenshots, exfiltrating iPhone backups stored on the device, detecting system configurations, and creating a “backdoor” for other malicious wares.


"Once successfully installed, the backdoor checks if a debugger is attached to the process. If it detects one, it terminates itself to prevent execution. Otherwise, it waits for an Internet connection before initiating communication with the C&C (co

Lost24

The researchers at the King Abdullah University of Science and Technology (KAUST) in Saudi Arabia have developed a new technology that can reduce the theft of smartphone or laptops. The method, however, may seem a bit extreme because it leads to COMPLETE DESTRUCTION of the stolen device.


How dose it work?


The technology involves the usage of expandable polymers that can expand to seven-times its original size when heated to temperature above 80°C. The energy needed to generate that amount of heat comes from the battery of the device enabling the polymer to literally rip the device from the inside out.


What triggers the self-destruction mechanism?


The developers claim th

Lost24

If you own an older  Android operating system  (OS ver. 4 or 5) and you have downloaded the app from the unofficial, third-party app stores, you may be at risk of catching a new virus named Gooligan.


The maleware takes advantage of multiple Android 4 and 5 exploits. It first roots into the system and then downloads a new, malicious rootkits.


The installed malewares grant the hackers full control over your device, allowing them access to all the Google services related to the user, including Google Play, Gmail, Google Docs, Google Drive, and Google Photos.


The removal of the virus from the infected device is not easy. The software was designed to bury

Wednesday 8 March 2017, Safety Guide

Satan – a custom-made ransomware

Lost24

An unknown group of hackers has recently developed a new method for extorting money.


The hackers have created a user-friendly platform named Satan, which allows the wannabe cybercriminals to create their own ransomware. The users just need to register on the Satan's domain and connect their bitcoin wallet to the account. Moreover, they don't even have to pay an upfront fee.

The developers of the virus get paid by taking a 30% cut of victims' payments.


The platform provides the wannabe hackers with tips on how to customize their ransomware, i.e. how to specify the ransom amount or increase the amount of money to pay after a specific deadline.


The Satan virus encrypts stored data an

Sunday 5 March 2017, Safety Guide

City surveillance system hacked

Lost24

It seems that hackers are no longer satisfied with compromising the security of cell phones or computers and peeking just into private users' webcams. Most recently the unidentified group has successfully infiltrated and compromised police surveillance cameras in Washington, D.C.


According to the Technobuffalo portal, cyberattack took place a week before President Donald Trump’s inauguration.
The surveillance system was infected with ransomware, granting the hackers access to 123 out of 187 cameras spread around the city, briefly curbing police’s ability to record footages.


Fortunately, the problem was quickly resolved by deactivating the infected devices, removing all software and restarting the system. However,

Sunday 5 February 2017, Safety Guide

The fraud "for pipelines"

Lost24

The fraud "for the grandson" or "for police officer" is probably already well-known to everyone. Have you heard about a new method "for pipelines"? 

The swindlers make use of the lack of knowledge of the residents and impersonate the  employees of the Water and Sewerage Service. 


Thieves under the guise of controlling the meters or the breakdown of the network in the apartment block, enter the flats in groups consisting of two persons and loot. 

One of swindlers shifts away attention of residents e.g. by ordering to turn on and off water in the bathroom, and second thief at that time robs the flat from valuables. 

&l