It looks like a legitimate traffic with a QR code. But behind there is a false and cybercriminal page

At first glance, it seems one more traffic fine: official paper, DGT logo and a message that invites you to pay as soon as possible. But it is a trap. Actually, it is a fraudulent impression that is appearing in car windshield in Malaga and that seeks to supplant the General Directorate of Traffic to steal bank data. The Local Police and the City of Malaga have already launched a public warning after detecting the first cases this week. As explainedthe document uses both the shield of the Ministry of Interior and the DGT logo to appear authenticity. Its objective: to make unexpected drivers with false sanctions. A scam to steal bank card data The mechanism is direct. The supposed fine incorporates a QR code That, when scanning with the mobile, redirects to a website that mimics a digital DGT environment. There the user is asked to enter the data of their bank card. Everything is designed to seem legitimate, even a “support chat” headed with the institutional image of traffic. This is how fines that have appeared in Malaga are seen in recent days The objective is evident: to capture the data of the credit or debit card of those who fall into the trap. The fraudulent website: Thus try to steal your data with the DGT appearance However, deception is not perfect. Some details betray falsification: the header says “boss” instead of “headquarters” and “apartadp” instead of “section.” Also Key elements of an authentic fine are missingsuch as the agent number, the vehicle data or the place where the infraction was supposedly committed. Even so, the risk is real. In the middle of the daily routine, and given the pressure to solve the matter as soon as possible, it is not difficult for someone to scan the code and enter their data without thinking too much. Scams through QR codes are not new. In fact, they have their own name: Qrishing. The National Institute of Cybersecurity (INCIBE) and other organisms have not been warning of this type of fraud. What is new is this campaign located in Malaga, which It could extend Easily to other cities if scammers replicate the pattern with slight adjustments. An image of an authentic fine, with all official elements The City Council has made available to citizens the phones 951 926 010 and 010 to consult doubts or verify whether a fine is real. The aspect of an authentic sanction has also been shared to help differentiate it from falsification. Who is behind? At the moment, there is no official information. What we do know is that the fraudulent website is still operational. The domain used, dgtmultamalaga.sbsis lodged under the umbrella Webnica low Asian cost registrar, which makes it difficult to track the person in charge or know if the registration data has also been supplanted. Images | Local Police of Malaga and Malaga City Council | Screen capture (xataka) In Xataka | Our password managers serve much more than passwords. So you can get the most out of them

Melilla cyber attack points to a Russian cybercriminal group

On June 25 we echoed the news: the Autonomous City of Melilla indicated that, since Sunday 22 of this month, Its computer services were interrupted by a technical incidence. Although the causes were not known, everything pointed to a cyber attack. And there are already those who have assumed responsibility. What happened. Last Sunday, June 22, the City Council of Melilla reported technical problems in their computer systems. The president trusted that “in two days” they were active again, noting that the technicians had been working on their restoration from dawn. From the beginning, the hypothesis of a cyber attack that could subtract confidential information from the administration and citizens was considered. Keep passing. Despite what The incidence was expected to last a couple of daysMelilla has been plunged into computer chaos for almost a week. The computer blackout has interrupted the operation of the administration servers of the Autonomous City, preventing access to their systems and suspending all electronic procedures. The attack. The Qilin Group, linked to Russia and the cybercriminal scene of Eastern Europe, The authorship of this attack has been attributed. The group claims to have “completely destroyed the administrative and network infrastructure of the city”, in addition to having taken information in a volume of 4 to 5 terabytes. “We have in our hands an almost complete list of the personal data of all the native inhabitants of Melilla. We also have in our power a significant list of data on tourists (their personal data). And the interesting thing is that the main reason why we are waiting for negotiators is another! The threat. The group, in addition to ensuring a database of practically each of the inhabitants of the city, threatens to reveal information about supposed inappropriate use of public funds, pointing directly to members of the administration. The answer. On Monday Juan José Imbroda, president of the city, claimed that the police would be alert to “Go against those malefactors” In case of being a cyber attack. Melilla has confirmed that the incident has been caused by “a computer attack of international origin”, and ensures that technical and cybersecurity teams continue to work to restore the service. At the moment, there is still no estimated date for the return to normal. Image | Jkijewski In Xataka | The “miracle” of the sixth vaccine: this is how Melilla has put 102.1% of the vaccines received and we could increase the available dose up to 20%

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.