
The services responsible for cybersecurity at the Agency for Restructuring and Modernization of Agriculture received information that approx. 1 thousand logins and passwords of users of ARiMR IT systems are available on the Darknet.
– The data leak did not occur due to ARiMR reasons – the Agency emphasizes in the announcement.
The reason may be the compilation of the so-called “log stealer”, i.e. a set of data from Beneficiaries’ private computers, which may have been infected with malware (stealer) that steals passwords entered by Beneficiaries or passwords saved in browsers while using online portals.
Password change required!
Therefore, in the ARiMR systems, the identified Beneficiaries’ logins have been forced to change their passwords, i.e. the Beneficiaries will not be able to log in to the ARiMR systems without first changing the password, which will take place immediately at the first attempt to log in. Information about this was sent by the Agency via SMS to the Beneficiaries who provided ARiMR with their mobile phone numbers. For those of you who have not provided your phone numbers, please check whether you have access to the ARiMR application. If the system requests you to change your password, please change your current password. We also recommend changing other passwords used on this device. Experts also suggest updating antivirus software on computers or contacting a cybersecurity specialist.

Beneficiary, act
If you find or suspect that your data is or may be available on the Dark Web, ARiMR together with CERT Polska encourages you to take the following steps:
- Use an antivirus program to check the security of your computer. However, please note that antivirus software may not detect the threat. Therefore, if there is a suspicion that the system may be infected, it is best to secure the most important data and restore it to the factory state.
- When using a secured or cleaned computer, you should change any login passwords that you have used before.
Important! If the same password was used to log in to different websites, you need to change it on the other websites as well! Do not use the same password on different websites! - On the websites you use, enable additional security that enables two-step verification.
- Pay special attention to attempts to log in to private accounts and check for alerts sent to your email address.

– .










