menu szukaj
Weekly Online Magazine
ISSN 2544-5839

new articles each monday
zamknij
Work In Media

13.05.2024 Law in media

Cyber Threats 2023: Phishing Dominates, AI Targeted

Krzysztof Fiedorek

The CERT Orange Polska 2023 report reveals a rapidly evolving cyber threat landscape. Phishing has taken a decisive lead, accounting for over 44% of reported incidents. Advanced social engineering techniques, deepfakes, and a surge in malicious ads lure users with promises of quick profits or easy opportunities.

Cyber Threats 2023: Phishing Dominates, AI Targetedillustration: bing.com/create

Cybersecurity data concerning Poles is alarming. Millions fall victim to online scammers, clicking suspicious links and sharing sensitive data. The CERT Orange Polska report highlights the scale of this phenomenon.

Phishing Takes the Lead


The most popular method of online fraud remains phishing. Cybercriminals create fake websites or emails that closely mimic those of well-known companies or institutions. Their goal is to steal personal data, credit card information, or login credentials for online banking by tricking users into downloading malicious files or clicking on links to fake websites.

In 2023, CERT Orange Polska`s security systems blocked over 360,000 fake websites, and around 5.5 million Poles clicked links leading to them. Victims lost money, personal data, and even control over their online accounts.

This marks a significant shift over the past decade. In 2014, spam—unwanted messages cluttering inboxes—was the top threat with around a 40% share, while phishing accounted for just 1% of incidents recorded by CERT Orange Polska.

advertisement

- "Today, the leader is multi-vector, advanced phishing targeting both users and companies, which accounted for over 44% of reports last year," says Robert Grabowski, head of CERT Orange Polska, quoted by Newseria Biznes. - "As an operator aware of these threats, we aim to block them before users even encounter them. We do this at the network level, using CyberShield."

Social Engineering, Malvertising, and DDoS Tsunami


According to the CERT report, social engineering plays an increasingly prominent role in attacks, as cybercriminals use ever more sophisticated methods to manipulate network users.

  • In 2023, scammers created over 360,000 fake websites.
  • A staggering 5.5 million Poles fell victim to them.

In addition to phishing, malvertising—ads with links to malicious sites—has gained popularity. In 2023, CERT Orange Polska’s security systems blocked three times as many such sites as the previous year.

CERT Orange Polska experts point to other growing threats:

  • Fake investments: Scammers lure victims with promises of quick profits, encouraging them to invest in fictitious ventures.
  • Fake payment links: Cybercriminals send emails or SMS messages with links to supposedly secure payment sites where victims enter credit card details.
  • Buyer scams: On auction and shopping platforms, scammers send fake messages asking for deposits or credit card details.
  • Spyware: Malicious software that steals confidential data from infected devices.
  • DDoS attacks: Cybercriminals attempt to paralyze websites or online services by flooding them with network traffic.

Work In Media
- "The number of attacks exceeding 10 Gbps has doubled (from 3.8% to 7.7%), as has the number of attacks with the smallest volume—below 0.2 Gbps (from 24.3% to 40.8%). The record-breaking 93 Gbps attack in 2014 would barely raise an eyebrow today (attacks over 100 Gbps are now routine). Last year`s record hit 543 Gbps, nearly six times stronger than a decade ago," explains Robert Grabowski, quoted by Newseria. - "We’re also seeing much more advanced attacks that are harder to defend against, such as carpet bombing, which targets entire address blocks rather than single addresses, and complex attacks like Web DDoS Tsunami."

How to Protect Yourself


To guard against cybercriminals, vigilance and caution online are essential:

  • Avoid clicking suspicious links: Even if an email or SMS looks legitimate, check the sender`s address and the link`s content before clicking.
  • Do not provide personal information on unfamiliar websites: Websites where you share personal data should use HTTPS protocol and have SSL certificates.
  • Use strong passwords: Passwords should be unique, at least 12 characters long, and include lowercase and uppercase letters, numbers, and special symbols.
  • Use antivirus software: Regularly updated antivirus software can protect against malicious software.
  • Familiarize yourself with online security practices: Websites like CERT Orange Polska and other cybersecurity organizations offer valuable information and tips.

- "Last year saw critical vulnerabilities in security devices and access solutions, and that trend will continue. We`ve moved a large portion of our work into the digital realm, enabling hybrid or fully remote work, which is now a primary medium for accessing companies," explains Robert Grabowski. - "For cybercriminals, discovering such vulnerabilities is a prime opportunity, and they will continue to exploit and attack these solutions."

Share the article:

dodaj na Facebook prześlij przez Messenger dodaj na Twitter dodaj na LinkedIn

COMMERCIAL BREAK

See articles on a similar topic:

Local Media in Poland - Freedom of Speech

Bartłomiej Dwornik
Abuse of freedom of speech is as common as imposing muzzles on journalists. Although the Press Law and the Constitution guarantee this fundamental freedom to everyone.

Cyberwarfare on the Internet. The ESET Report

KF
Governments, corporations, and even the education sector are becoming targets of advanced cyber attacks. The report for the period from October 2023 to March 2024, prepared by ESET, sheds light on the intensification of activities by Advanced Persistent Threat (APT) groups, which conduct espionage, sabotage, and destabilization operations in key sectors on behalf of states.

Cyber Attack on a Corporate Smartphone. How to Protect Yourself

KrzysztoF
Internet-connected mobile devices are an attractive target for cybercriminals. The key to protecting sensitive business data is employee awareness, hardware solutions, and appropriate software. This mini-guide provides a quick overview of how to protect each of these areas.

Local Media in Poland - Corrections

Bartłomiej Dwornik
The regulations regarding corrections are perhaps the most frequently violated rule in Polish media. There is a clear division between those who never admit to mistakes and those who can humbly accept their faults.

Local Media in Poland - The Press Owner Influence

Bartłomiej Dwornik
The editor-in-chief, according to the provisions of the Press Law, should be responsible for the content of the materials prepared by the editorial team as well as for the editorial and financial matters of the editorial office. This is the theory.

Local Media in Poland - Court Cases

Bartłomiej Dwornik
Investigative journalists in local newsrooms often remain in the shadow of their colleagues from national outlets, despite frequently being the first to uncover a scandal.

Quishing. How to Protect Yourself from QR Code Scams

Krzysztof Fiedorek
According to analysts from Keepnet Labs, quishing will be one of the most serious threats to businesses and individuals in 2024. In 2023, the number of data or money theft cases using this method increased globally by 587%.

More in the section: Law in media

community

Facebook LinkedIn X Twitter Google RSS

Work in media

United States
New York • Washington DC • Los Angeles • Chicago • Houston • Phoenix • Philadelphia United Kingdom
London • Birmingham • Manchester • Liverpool • Glasgow • Edinburgh Canada
Toronto • Ottawa • Monstreal • Calgary Australia
Sydney • Melbourne • Brisbane • canberra Ireland, New Zealand, India

advertisement





Reporter shopping

Reporter shopping

Affordable laptops, notebooks and netbooks
Affordable laptops, notebooks and netbooks
for writing
Digital SLR and compact cameras
Digital SLR and compact cameras
for photographers
Books and e-books about media
Books and e-books about media
for reading
Video drones and flying cameras
Video drones and flying cameras
for pilots
Gimbals for stabilizing video
Gimbals for stabilizing video
for those on the move
Software and apps for creative work
Software and apps for creative work
for nerdy ones
More occasions

advertisement
Read books and e-books

Read books and e-books

Okładka Understanding Media: The Extensions of Man
Understanding Media: The Extensions of Man
Okładka The 40-Day Social Media Fast
The 40-Day Social Media Fast
Okładka Social Media Marketing All-in-One For Dummies
Social Media Marketing All-in-One For Dummies
Okładka Mass Communication: Living in a Media World
Mass Communication: Living in a Media World
Okładka Beyond The Feed: A Social Media Success Formula
Beyond The Feed: A Social Media Success Formula
Okładka Hate, Inc.: Why Today`s Media Makes Us Despise One Another
Hate, Inc.: Why Today`s Media Makes Us Despise One Another
more books and e-books

Reporterzy.info

More about us

Our tools and services

Contact


© Dwornik.pl Bartłomiej Dwornik 2oo1-2o24