Scammers are spreading malware through... physical mail

When it comes to digital scams, the last thing you think of is physical mail. However, some crafty scammers have figured out how to trick people into installing malicious apps that steal their banking details, and it all starts with a hand-delivered letter in the post. But how do they do it, and how can you stay safe?

Scammers impersonate official agencies to spread malware that steals money from banks

Scammers are spreading malware through... physical mail

Switzerland is being hit by malware that is being “spread” via physical mail, The Register reports. The attack begins with a fake letter claiming to be from the Federal Meteorological and Climate Office, asking the recipient to download an app. The app is a malicious clone of Alertswiss, a legitimate app that warns people about severe weather patterns.

The letter provides the victim with a QR code, through which they can download the fake app. After scanning the code, it does not open Google Play to download the app; instead, it takes the user to a third-party website. If the target proceeds to download the app, it begins intercepting the two-factor authentication code and attempts to access the victim’s bank account through their banking app. From there, the scammer can transfer money to their account.

Luckily, you can easily protect yourself from this scam. First, remember that there are many security risks when scanning QR codes. Only scan a code if you are sure it comes from an official, trusted source.

Additionally, the safest way to download Android apps is to use the Google Play Store. Legitimate companies will usually release their apps through official channels, so if a company asks you to download them through a third-party site, be cautious. And if you do download and install a malicious app, factory reset your Android phone immediately.

Sign up and earn $1000 a day ⋙

Leave a Comment

Cybercriminals are spreading malware using... Google Search

Cybercriminals are spreading malware using... Google Search

A new attack campaign that spreads malware through Google search results has been discovered by security experts from Palo Alto Networks.

How to know if a link is safe or not?

How to know if a link is safe or not?

Nowadays, malicious links appear more and more and are shared through social networks at a dizzying speed. Just clicking on a malicious link can bring potential dangers to you.

New ransomware strain discovered that specializes in stealing login information from Chrome browser

New ransomware strain discovered that specializes in stealing login information from Chrome browser

A new strain of ransomware called Qilin has been discovered using a relatively sophisticated, highly customizable tactic to steal account login information stored in the Google Chrome browser.

Microsoft Outlook Contains a Critical Vulnerability That Could Easily Spread Malware

Microsoft Outlook Contains a Critical Vulnerability That Could Easily Spread Malware

Microsoft has just officially warned users about the existence of a vulnerability that could allow hackers to easily spread malware through the Outlook email application.

More than 200 apps containing malicious code were discovered and downloaded millions of times on the Google Play Store.

More than 200 apps containing malicious code were discovered and downloaded millions of times on the Google Play Store.

A cybersecurity firm has discovered a huge number of Android apps containing malicious code (adware), a discovery that also raises big questions about how Google monitors its online store.

Should You Use Public Wi-Fi in 2025?

Should You Use Public Wi-Fi in 2025?

Nowadays, free wifi networks are installed everywhere, from coffee shops, amusement parks, shopping malls, etc. This is very convenient for us users to be able to connect to the network everywhere to surf Facebook and work. However, is using free wifi safe?

How do criminals use CAPTCHAs to spread malware?

How do criminals use CAPTCHAs to spread malware?

Unfortunately, bad actors know this and have created fake CAPTCHAs that will infect your PC with malware.

Hackers Use Malicious Google Ads to Steal Users Microsoft Accounts

Hackers Use Malicious Google Ads to Steal Users Microsoft Accounts

There is a dangerous trend being deployed by the global hacker community, which is abusing the Google Ads platform to spread malicious code.

Stuxnet: The Worlds First Terrifying Digital Weapon

Stuxnet: The Worlds First Terrifying Digital Weapon

Stuxnet is a malicious computer worm that was first discovered in June 2010 after it paralyzed Iran's nuclear facilities. And to this day, Stuxnet is still a terrifying obsession for the global Internet.

Why is Infostealer malware the biggest new malware concern?

Why is Infostealer malware the biggest new malware concern?

Often distributed in a malware-as-a-service model, infostealer malware is often used to steal data, remaining hidden for as long as possible.

Modern malware has more sophisticated ways of hiding

Modern malware has more sophisticated ways of hiding

Why is new malware being developed to hide from users, and what does that say about the current cybercrime world?

How to Protect Yourself from the Latest WordPress Malware Attack

How to Protect Yourself from the Latest WordPress Malware Attack

As one of the most popular website building tools in the world, WordPress is once again a target for malware.

Nearly Half of Steam Gamers Still Use Windows 10

Nearly Half of Steam Gamers Still Use Windows 10

Even though Windows 10 will stop being supported after October 14, 2025, many Steam users are still using the operating system.

How to Find and Remove Keyloggers Completely from Your Computer

How to Find and Remove Keyloggers Completely from Your Computer

Keyloggers are extremely dangerous programs that hackers install on any user's system with the aim of stealing passwords, credit card information, etc. Keyloggers store all the keystrokes that users perform on the computer and provide hackers with important user information.

How to regain access to hard drive, fix error of not being able to open hard drive

How to regain access to hard drive, fix error of not being able to open hard drive

In this article, we will guide you how to regain access to your hard drive when it fails. Let's follow along!

How to use dental floss

How to use dental floss

Dental floss is a common tool for cleaning teeth, however, not everyone knows how to use it properly. Below are instructions on how to use dental floss to clean teeth effectively.

How to gain muscle according to experts

How to gain muscle according to experts

Building muscle takes time and the right training, but its something anyone can do. Heres how to build muscle, according to experts.

The Best Diets for Heart Health

The Best Diets for Heart Health

In addition to regular exercise and not smoking, diet is one of the best ways to protect your heart. Here are the best diets for heart health.

How to cure insomnia for pregnant women in the last 3 months

How to cure insomnia for pregnant women in the last 3 months

The third trimester is often the most difficult time to sleep during pregnancy. Here are some ways to treat insomnia in the third trimester.

Scientifically Proven Ways to Automatically Burn Calories

Scientifically Proven Ways to Automatically Burn Calories

There are many ways to lose weight without changing anything in your diet. Here are some scientifically proven automatic weight loss or calorie-burning methods that anyone can use.

All about iOS 26

All about iOS 26

Apple has introduced iOS 26 – a major update with a brand new frosted glass design, smarter experiences, and improvements to familiar apps.

Yoga exercises to treat insomnia

Yoga exercises to treat insomnia

Yoga can provide many health benefits, including better sleep. Because yoga can be relaxing and restorative, its a great way to beat insomnia after a busy day.

What is the flower of the other shore? Meaning and legend of the flower of the other shore

What is the flower of the other shore? Meaning and legend of the flower of the other shore

The flower of the other shore is a unique flower, carrying many unique meanings. So what is the flower of the other shore, is the flower of the other shore real, what is the meaning and legend of the flower of the other shore?

Healthy snacks that help you lose weight

Healthy snacks that help you lose weight

Craving for snacks but afraid of gaining weight? Dont worry, lets explore together many types of weight loss snacks that are high in fiber, low in calories without making you try to starve yourself.

What to do when you have trouble sleeping?

What to do when you have trouble sleeping?

Prioritizing a consistent sleep schedule and evening routine can help improve the quality of your sleep. Heres what you need to know to stop tossing and turning at night.

How to add a printer to Windows 10

How to add a printer to Windows 10

Adding a printer to Windows 10 is simple, although the process for wired devices will be different than for wireless devices.

The most commonly deficient nutrients in the diet

The most commonly deficient nutrients in the diet

Diet is important to our health. Yet most of our meals are lacking in these six important nutrients.

How to get beautiful nails quickly

How to get beautiful nails quickly

You want to have a beautiful, shiny, healthy nail quickly. The simple tips for beautiful nails below will be useful for you.

The best laptops for students in 2025

The best laptops for students in 2025

Students need a specific type of laptop for their studies. It should not only be powerful enough to perform well in their chosen major, but also compact and light enough to carry around all day.