El Corte Inglés, a major Spanish retailer, has recently been the target of a cyberattack that resulted in the unauthorized access to customer data. The company has assured that the compromised information, which includes personal identification and contact details, does not allow for fraudulent payments or transactions. However, the Organization of Consumers and Users (OCU) has warned of potential fraud stemming from this security breach, affecting around 50,000 users. Following the cyberattack, a smishing campaign has been detected, where cybercriminals impersonate El Corte Inglés's financial services. They send text messages claiming a non-existent purchase of 950 euros and urge recipients to click on a provided link if they do not recognize the transaction. This leads victims to a fake website designed to steal personal credentials such as DNI and passwords. In response to these threats, El Corte Inglés and the OCU have advised customers to be wary of suspicious messages and calls, verify website URLs before entering any data, and not to respond to urgent requests for information. They also recommend monitoring bank statements for unauthorized charges and reporting any fraud to the authorities. In a separate incident, La Poste, the French postal service, has alerted thousands of customers about a data breach involving sensitive personal information of about 5,000 people. The breach, which occurred on February 25, 2025, affected the 'Élection du Timbre' website, leading to its temporary maintenance shutdown. La Poste has confirmed that no banking or password data was stolen and has notified the CNIL and filed a complaint with judicial authorities. The FBI has issued a warning about scammers impersonating the BianLian ransomware gang, targeting U.S. corporate executives with fake ransom notes. These notes, first reported by GuidePoint Security, demand between $250,000 and $500,000 in Bitcoin, falsely claim data theft, and include a QR code linked to a Bitcoin wallet. The scammers have primarily targeted executives in the healthcare sector, but the FBI has not identified any connections between the scammers and the actual BianLian gang.
BianLian ransomware wanna-bes are targeting business execs using the actual mail, FBI says https://t.co/DQeDBC8EgE #OODA
FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail https://t.co/dL4kVIocin
Golpistas aplicam novos golpes utilizando boletos falsos https://t.co/Y9X15Q1keJ