Fake News & Disinformation In Poland  

The Polish government has said that a recent false story stating that citizens would be mobilised to fight in Ukraine that appeared on the PAP national news agency was likely a Russian cyber attack. Prime Minister Donald Tusk described the hacking attack as part of Russia’s attempts to destabilise the European Parliament elections. 

The fake news report is probably the work of Russia-sponsored hackers and was designed to interfere with the upcoming European Parliament election, according to Polish sources. 

With EU parliament elections being held in Poland, authorities are focusing on attempts by Moscow to influence  the vote. These fears intensified recently when a false article about military mobilisation appeared. These events coincide with an exploit which knocked the German CDU opposition party offline this week.

Security officials said that their experts were working to find the source of the hack, and also insulate PAP from further attempts to publish fake news on its systems. The government says that Poland, which supports Ukraine in its war with Russia, is being targeted in a hybrid war directed by the intelligence services of Russia and Belarus.  

Polish authorities say the techniques being used include sending migrants to the border from the Belarus side and cyber attacks on state administration offices. Digital affairs minister Krzysztof Gawkowski, who also serves as deputy prime minister, also announced that “an urgent investigation” has been launched into the incident. “Everything points to a cyber attack and planned disinformation!” 

Speaking to broadcaster Polsat News, Gawkowski added that “everything points to the fact that the cyber attack was directed from the Russian side”.  “The aim is to disinform and paralyse the public before the elections,” he said. Gawkowski also thanked Polish journalists and news outlets for quickly identifying the news story as disinformation. 

In response to growing threats, the government of Poland is pledged to spend $760 million to boost its national cyber security.

Reuters   |   APNews   |   Euractiv   |   Notes from Poland   |   TVP World   |    Yahoo

Image:  Ideogram 

You Might Also Read: 

Russia’s Malicious Cyber Activity Condemned:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Securing The Supply Chain
The Cyber Security Threat From Iran »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

Telefonica Global Solutions (TGS)

Telefonica Global Solutions (TGS)

Telefonica Global Solutions is the technological partner of wholesalers and enterprises, helping them to achieve the digitalization they need.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.