ING Bank has customers in the center of a Extremely serious warnings that come because of a very big problem targeting those who use the bank’s services, and that’s because phishing attacks are still intensifying.
As you can see below, we are talking about a new approach that attackers have to trick people into giving up their personal data which in return could be used to gain access to their accounts, and more.
ING Bank has sent customers enough warnings so far about the fact that in Romania there are many phishing attacks, and this in the conditions in which the problems have existed for over a year.
We are now seeing new approaches being attempted to trick customers into having their accounts accessed by third parties, with IP addresses used to reinforce the idea that people have had linen account ternet banking from ING Bank accessed by an unknown person.
ING Bank tells us that whenever we receive an email that looks suspicious, that is, exactly as it is in the image above, we always avoid accessing the links in it.
This is exactly the situation here, and that’s because accessing that link leads us to a malicious website, and the data we enter in it they go directly to the servers of the hackers, and they can use them to steal our money, but unfortunately they may not be able to be recovered.
ING Bank recommends them to Romanians that in case they become the victims of such an attack, they should immediately notify the bank and the authorities so that in case of theft of money, something can be recovered.
Everything needs to be done very quickly by customers to make sure they still have a chance to solve the problem before they arrive. ga at the point where nothing can be solved, so we have to be very careful about what we do.
ING Bank has more information on its website important things to do or not to do when it comes to phishing attacks, and they need to be looked at carefully.
Note: This article has been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the above content. To see the article at original source Click Here