Real police never send messages like this

Additional code has also been found in scam messages sent in the name of the police. The Cybersecurity Center urges caution when opening attachments of suspicious messages.

Traficom’s Cyber ​​Security Center reminds us of scam messages circulating in the name of the police. Cybersecurity Center / Jenni Gästgivar

The Finnish Transport and Communications Agency’s Traficom Cybersecurity Center reminds you in his weekly review about blackmail messages spreading in the name of the police.

The Cybersecurity Center warned about the messages last time in Augustand we also reported on a case connected to the same scam in October.

– Scam messages made in the name of police authorities do not necessarily seem very believable to those used to Finnish official services. However, the persistent existence of such scam messages indicates that sending them is profitable for criminals, the Cybersecurity Center points out.

The messages sent by the “police” state that the defendant is suspected of crimes against children. The threats vary slightly from message to message, but typically the recipient is threatened with a long prison sentence and huge fines.

The story continues below the picture.

In the summer, the Cyber ​​Security Center published a picture of one of the fraudulent messages distributed in the name of the police. Cyber ​​Security Center

Some messages contain extra code

In the past, the pdf attachments of the fraudulent messages distributed in the name of the police have not had extra content. Now, however, the Cyber ​​Security Center has been reported about messages with javascript code attached to pdf attachments.

In the Cybersecurity Center’s investigation, the code has not been found to do anything more dangerous than offering the user a print window to print a document. There is still reason to be cautious.

– When a PDF or Office document attached to an unknown email asks for permission to execute commands, it is always wisest to answer them in the negative. The start of malware can also be hidden behind the command, the Cybersecurity Center warns.

Source: Cyber ​​Security Center

ttn-54