June 24, 2024 By Jennifer Gregory 3 min read

Visitors to the Polish Press Agency (PAP) website on May 31 at 2 p.m. Polish time were met with an unusual message. Instead of the typical daily news, the state-run newspaper had supposedly published a story announcing that a partial mobilization, which means calling up specific people to serve in the armed forces, was ordered by Polish Prime Minister Donald Tusk beginning on July 1, 2024.

Deputy Prime Minister Krzysztof Gawkowski refuted the claim on X (formerly Twitter). His post read: “The message [from] @PAPinformacje regarding partial mobilization is false. We have started urgently investigating the matter. Everything points to a cyberattack and planned disinformation! I will keep you updated on further arrangements.”

After this cyberattack, Poland announced that it is increasing its cybersecurity spending to almost $760 million to improve digital security.

Suspected Russian-directed malware attack spreading misinformation

In an interview, Gawkowski told Polsat News that the goal of the attack was to spread disinformation before the elections, to paralyze society. He also shared that the false posts were delivered through malware and were spotted within two minutes.

“Everything indicates that we are dealing with a cyberattack that was directed from the Russian side,” says Gawkowski. “And the goal: disinformation before the elections, paralyzing society, showing that Russia can interfere in the elections in Poland today,” he said.

While Gawkowski states that Russia allegedly conducted the attack, Russia has denied all claims.

Using funds to improve digital security

The Polish government wants to be prepared for future attacks. Gawkowski announced a plan for an increased cybersecurity budget on June 3, 2024.

“We want to allocate over 3 billion zlotys for a ‘Cyber Shield,’” said Gawkowski in a news conference. “Today, Poland is on the frontline of the cyber fight against Russia. Poland has the most attacks. (Russia) has one goal — to destabilize the situation and ensure that the forces supporting the breakup of the EU can benefit,” Gawkowski added.

Gawkowski said that the new funding plan will be a joint effort by the government, of the Ministries of Interior and Digitalization. The additional funds will be used to create a cyber shield that will carry out regular security reviews and build resilience at the critical infrastructure level. The goal of these efforts is to show the world that Poland is a leader in both digital security and digital change in Europe. He said that specific details regarding the steps the government is planning to take are being kept confidential to protect the country.

Protecting against disinformation attacks

Poland suffered a disinformation attack, which happens when cyber criminals mislead, cause harm or profit from spreading falsehoods. The goal of this type of attack is deception. Often, it’s multi-pronged, with the information being disseminated in different ways and locations.

Here are tips for reducing risk and preparing to manage a disinformation attack:

  1. Use social media monitoring tools. Because social media is often the channel used for disinformation attacks, organizations can reduce their risk by monitoring social media platforms for potential attacks.
  2. Provide training. Often, training for this type of attack is overlooked, both in how to spot it and how to respond. Because there is a public relations component, be sure to include your communications team in the preparation.
  3. Include disinformation attacks in your crisis response plan. Because the response to this attack is usually a bit different, be sure to include a section in your plan detailing how to respond.

By focusing on this type of attack as well as creating a cyber shield, businesses and nation-states can reduce the risk of a disinformation attack and recover more quickly when it happens.

To learn how IBM X-Force can help you with anything regarding cybersecurity including incident response, threat intelligence, or offensive security services schedule a meeting here.

If you are experiencing cybersecurity issues or an incident, contact X-Force to help: US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.

More from News

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally.The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets.Who is exploiting the NGFW zero-day?As of now, little is known about the actors behind the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

CISA adds Microsoft SharePoint vulnerability to the KEV Catalog

3 min read - In late October, the United States Cybersecurity & Infrastructure Security Agency (CISA) added a new threat to its Known Exploited Vulnerability (KEV) Catalog. Cyber criminals used remote code execution vulnerability in Microsoft SharePoint to gain access to organizations’ networks. The CISA press release states that “these types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.” However, Microsoft identified and released a patch for this vulnerability in July 2024. Cybersecurity experts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today