June 24, 2024 By Jennifer Gregory 3 min read

Visitors to the Polish Press Agency (PAP) website on May 31 at 2 p.m. Polish time were met with an unusual message. Instead of the typical daily news, the state-run newspaper had supposedly published a story announcing that a partial mobilization, which means calling up specific people to serve in the armed forces, was ordered by Polish Prime Minister Donald Tusk beginning on July 1, 2024.

Deputy Prime Minister Krzysztof Gawkowski refuted the claim on X (formerly Twitter). His post read: “The message [from] @PAPinformacje regarding partial mobilization is false. We have started urgently investigating the matter. Everything points to a cyberattack and planned disinformation! I will keep you updated on further arrangements.”

After this cyberattack, Poland announced that it is increasing its cybersecurity spending to almost $760 million to improve digital security.

Suspected Russian-directed malware attack spreading misinformation

In an interview, Gawkowski told Polsat News that the goal of the attack was to spread disinformation before the elections, to paralyze society. He also shared that the false posts were delivered through malware and were spotted within two minutes.

“Everything indicates that we are dealing with a cyberattack that was directed from the Russian side,” says Gawkowski. “And the goal: disinformation before the elections, paralyzing society, showing that Russia can interfere in the elections in Poland today,” he said.

While Gawkowski states that Russia allegedly conducted the attack, Russia has denied all claims.

Using funds to improve digital security

The Polish government wants to be prepared for future attacks. Gawkowski announced a plan for an increased cybersecurity budget on June 3, 2024.

“We want to allocate over 3 billion zlotys for a ‘Cyber Shield,’” said Gawkowski in a news conference. “Today, Poland is on the frontline of the cyber fight against Russia. Poland has the most attacks. (Russia) has one goal — to destabilize the situation and ensure that the forces supporting the breakup of the EU can benefit,” Gawkowski added.

Gawkowski said that the new funding plan will be a joint effort by the government, of the Ministries of Interior and Digitalization. The additional funds will be used to create a cyber shield that will carry out regular security reviews and build resilience at the critical infrastructure level. The goal of these efforts is to show the world that Poland is a leader in both digital security and digital change in Europe. He said that specific details regarding the steps the government is planning to take are being kept confidential to protect the country.

Protecting against disinformation attacks

Poland suffered a disinformation attack, which happens when cyber criminals mislead, cause harm or profit from spreading falsehoods. The goal of this type of attack is deception. Often, it’s multi-pronged, with the information being disseminated in different ways and locations.

Here are tips for reducing risk and preparing to manage a disinformation attack:

  1. Use social media monitoring tools. Because social media is often the channel used for disinformation attacks, organizations can reduce their risk by monitoring social media platforms for potential attacks.
  2. Provide training. Often, training for this type of attack is overlooked, both in how to spot it and how to respond. Because there is a public relations component, be sure to include your communications team in the preparation.
  3. Include disinformation attacks in your crisis response plan. Because the response to this attack is usually a bit different, be sure to include a section in your plan detailing how to respond.

By focusing on this type of attack as well as creating a cyber shield, businesses and nation-states can reduce the risk of a disinformation attack and recover more quickly when it happens.

To learn how IBM X-Force can help you with anything regarding cybersecurity including incident response, threat intelligence, or offensive security services schedule a meeting here.

If you are experiencing cybersecurity issues or an incident, contact X-Force to help: US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.

More from News

Has BlackCat returned as Cicada3301? Maybe.

4 min read - In 2022, BlackCat ransomware (also known as ALPHV) was among the top malware types tracked by IBM X-Force. The following year, the threat actor group added new tools and tactics to enhance BlackCat's impact. The effort paid off — literally. In March 2024, BlackCat successfully compromised Change Healthcare and received a ransom payment of $22 million in Bitcoin. But here's where things get weird: Immediately after taking payment, BlackCat closed its doors, citing "the feds" as the reason for the…

Biden-⁠Harris administration releases roadmap to enhance internet routing

2 min read - The Biden-Harris Administration has taken another step toward improving the nation’s cybersecurity. In September, the White House Office of the National Cyber Director (ONCD) announced it was putting policies in place to address a key security vulnerability associated with the Border Gateway Protocol (BGP). BGP is a set of rules that helps the internet work by selecting the best route for data to travel between networks. It is a fundamental protocol that allows networks to communicate with each other. However,…

CISA warns about credential access in FY23 risk & vulnerability assessment

3 min read - CISA released its Fiscal Year 2023 (FY23) Risk and Vulnerability Assessments (RVA) Analysis, providing a crucial look into the tactics and techniques threat actors employed to compromise critical infrastructure. The report is part of the agency’s ongoing effort to improve national cybersecurity through assessments of vulnerabilities in key sectors. Meanwhile, IBM’s X-Force Threat Intelligence Index 2024 has identified credential access as one of the most significant risks to organizations. Both reports shed light on the persistent and growing threat of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today