Scammers are spreading malware through... physical mail

When it comes to digital scams, the last thing you think of is physical mail. However, some crafty scammers have figured out how to trick people into installing malicious apps that steal their banking details, and it all starts with a hand-delivered letter in the post. But how do they do it, and how can you stay safe?

Scammers impersonate official agencies to spread malware that steals money from banks

Scammers are spreading malware through... physical mail

Switzerland is being hit by malware that is being “spread” via physical mail, The Register reports. The attack begins with a fake letter claiming to be from the Federal Meteorological and Climate Office, asking the recipient to download an app. The app is a malicious clone of Alertswiss, a legitimate app that warns people about severe weather patterns.

The letter provides the victim with a QR code, through which they can download the fake app. After scanning the code, it does not open Google Play to download the app; instead, it takes the user to a third-party website. If the target proceeds to download the app, it begins intercepting the two-factor authentication code and attempts to access the victim’s bank account through their banking app. From there, the scammer can transfer money to their account.

Luckily, you can easily protect yourself from this scam. First, remember that there are many security risks when scanning QR codes. Only scan a code if you are sure it comes from an official, trusted source.

Additionally, the safest way to download Android apps is to use the Google Play Store. Legitimate companies will usually release their apps through official channels, so if a company asks you to download them through a third-party site, be cautious. And if you do download and install a malicious app, factory reset your Android phone immediately.

Sign up and earn $1000 a day ⋙

Leave a Comment

How to know if a link is safe or not?

How to know if a link is safe or not?

Nowadays, malicious links appear more and more and are shared through social networks at a dizzying speed. Just clicking on a malicious link can bring potential dangers to you.

New ransomware strain discovered that specializes in stealing login information from Chrome browser

New ransomware strain discovered that specializes in stealing login information from Chrome browser

A new strain of ransomware called Qilin has been discovered using a relatively sophisticated, highly customizable tactic to steal account login information stored in the Google Chrome browser.

Microsoft Outlook Contains a Critical Vulnerability That Could Easily Spread Malware

Microsoft Outlook Contains a Critical Vulnerability That Could Easily Spread Malware

Microsoft has just officially warned users about the existence of a vulnerability that could allow hackers to easily spread malware through the Outlook email application.

More than 200 apps containing malicious code were discovered and downloaded millions of times on the Google Play Store.

More than 200 apps containing malicious code were discovered and downloaded millions of times on the Google Play Store.

A cybersecurity firm has discovered a huge number of Android apps containing malicious code (adware), a discovery that also raises big questions about how Google monitors its online store.

Should You Use Public Wi-Fi in 2025?

Should You Use Public Wi-Fi in 2025?

Nowadays, free wifi networks are installed everywhere, from coffee shops, amusement parks, shopping malls, etc. This is very convenient for us users to be able to connect to the network everywhere to surf Facebook and work. However, is using free wifi safe?

How do criminals use CAPTCHAs to spread malware?

How do criminals use CAPTCHAs to spread malware?

Unfortunately, bad actors know this and have created fake CAPTCHAs that will infect your PC with malware.

Hackers Use Malicious Google Ads to Steal Users Microsoft Accounts

Hackers Use Malicious Google Ads to Steal Users Microsoft Accounts

There is a dangerous trend being deployed by the global hacker community, which is abusing the Google Ads platform to spread malicious code.

Stuxnet: The Worlds First Terrifying Digital Weapon

Stuxnet: The Worlds First Terrifying Digital Weapon

Stuxnet is a malicious computer worm that was first discovered in June 2010 after it paralyzed Iran's nuclear facilities. And to this day, Stuxnet is still a terrifying obsession for the global Internet.

Why is Infostealer malware the biggest new malware concern?

Why is Infostealer malware the biggest new malware concern?

Often distributed in a malware-as-a-service model, infostealer malware is often used to steal data, remaining hidden for as long as possible.

Modern malware has more sophisticated ways of hiding

Modern malware has more sophisticated ways of hiding

Why is new malware being developed to hide from users, and what does that say about the current cybercrime world?

How to Protect Yourself from the Latest WordPress Malware Attack

How to Protect Yourself from the Latest WordPress Malware Attack

As one of the most popular website building tools in the world, WordPress is once again a target for malware.

Nearly Half of Steam Gamers Still Use Windows 10

Nearly Half of Steam Gamers Still Use Windows 10

Even though Windows 10 will stop being supported after October 14, 2025, many Steam users are still using the operating system.

How to Find and Remove Keyloggers Completely from Your Computer

How to Find and Remove Keyloggers Completely from Your Computer

Keyloggers are extremely dangerous programs that hackers install on any user's system with the aim of stealing passwords, credit card information, etc. Keyloggers store all the keystrokes that users perform on the computer and provide hackers with important user information.

7 Types of Malware Attacks and How to Prevent Them

7 Types of Malware Attacks and How to Prevent Them

They are advantages and disadvantages with the advent of technology being used in almost every angle of day-to-day lives. Technology has brought in a lot of ease in our operations at home, our offices, and businesses as well.

Stunning pictures of the supermoon from around the world

Stunning pictures of the supermoon from around the world

Beautiful moon pictures are not rare on the Internet. This article will summarize for you the most beautiful moon pictures in the world.

AMD Ryzen Users Should Install This BIOS Update for a Free Performance Boost

AMD Ryzen Users Should Install This BIOS Update for a Free Performance Boost

Now, AMD has responded to the issues with its underperforming flagship CPU line with a new update that could deliver a few more frames per second.

Xs value drops from $44 billion to below $10 billion

Xs value drops from $44 billion to below $10 billion

In October 2022, Elon Musk spent $44 billion to acquire X, but the platform's value has now dropped 78.6% to about $9.4 billion.

How the Orion spacecraft is being protected from extreme radiation

How the Orion spacecraft is being protected from extreme radiation

When NASA's Artemis I mission successfully launches into space and begins its journey around the moon in 2022, there won't be any astronauts on board — instead, there will be two adult-sized mannequins.

How to make cleaning fun

How to make cleaning fun

Cleaning doesn't have to be a chore if you know how to make it fun. Here are some simple ways to make cleaning fun.

What is the Infinity Fortress in Demon Slayer?

What is the Infinity Fortress in Demon Slayer?

Demon Slayer: Infinity Fortress is getting a lot of attention from fans. So what's inside Demon Slayer's Infinity Fortress? Let's find out together!

ChatGPT May Be Running Silently on Your Phone and How to Fix It

ChatGPT May Be Running Silently on Your Phone and How to Fix It

Background Conversations keep a user's conversation with ChatGPT going while using other apps or when the screen is off. This means ChatGPT can listen or monitor a user's phone usage behavior 24/7.

Googles Gemini Responds With Weird, Repeated Nonsense Words to Some Users

Googles Gemini Responds With Weird, Repeated Nonsense Words to Some Users

Recently, some users noticed that Google Gemini has been giving repetitive text, weird characters, and complete nonsense in some responses.

Full code of Luc Tung Tam Quoc latest and instructions to redeem code

Full code of Luc Tung Tam Quoc latest and instructions to redeem code

Code Luc Tung Tam Quoc gives new players everything they need to start their journey.

Code Giang Ho Ngu Tuyet and how to enter code

Code Giang Ho Ngu Tuyet and how to enter code

Giang Ho Ngu Tuyet is an MMORPG game based on the five elements of mutual generation and mutual inhibition. With 5 sects: Shaolin, Minh Giao, Vo Dang, Duong Gia, Thien Nhan based on the five elements of Metal, Wood, Water, Fire, Earth.

MIUI 13 Wallpaper, MIUI 13 Wallpaper

MIUI 13 Wallpaper, MIUI 13 Wallpaper

MIUI 13 wallpapers with many different wallpaper themes from abstract to landscape, combined with vivid and attractive colors for users to choose from.

How to fix Your virus & threat protection is managed by your organization error

How to fix Your virus & threat protection is managed by your organization error

What do you need to do to resolve the error Your virus & threat protection is managed by your organization?

How to fix Chromebook not turning on

How to fix Chromebook not turning on

If your Chromebook won't turn on, you're probably feeling frustrated and hopeless. Luckily, many of the reasons why a Chromebook won't turn on are easy to fix.

Why should you always check app permissions before pressing install?

Why should you always check app permissions before pressing install?

Taking a moment to review your app permissions can save you a lot of privacy and security problems later on!

How to play Rengar DTCL season 14, standard items, lineup...

How to play Rengar DTCL season 14, standard items, lineup...

Rengar DTCL season 14 will play the main assassin role, with the ability to jump to the enemy with the lowest health and deal strong physical damage.