We would like to warn you about a rise in phishing scams, which have been reported to us frequently through our customer helpline recently.
Currently, these messages may include:
With the holiday season approaching, online fraud is expected to increase.
Please do not respond to such e-mails, answer any questions, or fill in any personal or payment details. These e-mails are not part of any official marketing campaign by Alza.cz.
i
In the world of e-commerce, one of the most common cyber threats is phishing. These attacks are becoming increasingly sophisticated and are often carried out via email, SMS, or instant messaging. They aim to create a sense of urgency or fear to trick victims into sharing sensitive information or clicking harmful links.
Often, it's immediately clear that the e-mail is not a legitimate message from Alza.cz.
The primary goal of phishing attacks is to obtain sensitive data from victims. This includes login credentials for online accounts, banking information, e-mail access, and personal details such as names, addresses, phone numbers, or national ID numbers.
Attackers use this information for various purposes. They may leverage it for criminal activities like identity theft, fraudulent transactions, or money laundering. Sensitive data can also be sold on the black market or dark web to other criminals.
Gaining control of victims’ online accounts can lead to further fraud or blackmail. In corporate espionage cases, attackers may obtain sensitive information about competitors or business partners. Another risk is extortion, where the attacker threatens to leak sensitive data unless the victim pays a ransom.
If you've fallen victim to a phishing attack and attackers have obtained your private information, it's crucial to act quickly and take steps to minimise the damage. Here's a general course of action:
Do not engage with the blackmailer: Avoid negotiating or meeting any demands. Responding can encourage more extortion attempts.
Preserve evidence: Save all evidence of the blackmail, including e-mails, messages, screenshots, and any other communication. This documentation may be crucial for investigations.
Contact the police: Report the blackmail to law enforcement immediately. Provide all collected evidence and cooperate with the investigation. Blackmail is a crime, and the police can offer support and protection.
Consult a lawyer: A legal expert specialising in cybersecurity or criminal law can advise you on next steps and help protect your rights.
Review your privacy settings: Review your privacy settings on social media and other platforms to minimise what personal information is publicly visible.
i
Has the attacker encrypted your hard drive?
If your hard drive has been encrypted, it’s likely a ransomware attack—a different form of cybercrime from phishing. In a ransomware attack, your files are locked, and the attacker demands a ransom to restore access.
What’s the recommended course of action for encrypted data? Learn more in our article: What is Ransomware?
At a general level, it is recommended not to pay the ransom and not to communicate with the attacker. Of course, such advice is easier given than followed—in practice, the situation is rarely straightforward. But why is it still worth sticking to this principle?
What happened? Attackers used phishing emails disguised as legitimate communications to trick employees into clicking malicious links or opening infected attachments.
Damage: This attack resulted in a massive leak of sensitive information. Thousands of e-mails, employees’ personal data, financial details, unreleased films, and business plans were made public. In addition to the direct financial losses from operational disruptions and system recovery costs, the company also faced significant reputational damage. Total damages were estimated in the hundreds of millions of dollars.
i
Lessons learned
Always verify emails that contain links or attachments, especially if they come from unknown or unexpected senders. Use security software that scans attachments and links for malware.
John Podesta was the chairman of Hillary Clinton’s presidential campaign during the 2016 U.S. elections.
What happened? Podesta received a fake Google security alert, leading him to a phishing site where he entered his credentials.
Damage: The attack led to the leak of thousands of John Podesta’s emails, which were subsequently published on WikiLeaks. These e-mails contained sensitive information about Hillary Clinton’s campaign, resulting in a significant political impact and potentially influencing the outcome of the 2016 U.S. presidential election. Although the direct financial damages are unknown, the political and reputational harm was considerable.
i
Lessons learned
Never click on links in e-mails claiming to be security alerts. Always log in directly through the official website of the service. Use two-factor authentication (2FA) for an extra layer of protection.
Target is one of the largest retail chains in the USA.
What happened? Attackers used phishing emails to compromise computers of a third-party HVAC vendor. These unwitting providers then became the entry point to Target's network.
Damage: Attackers gained access to payment information from approximately 40 million credit and debit cards, as well as personal data belonging to around 70 million customers. This resulted in direct financial losses in the form of replacement cards and customer compensation, legal expenses, and fines. The total cost of addressing the attack was estimated at around