30. June 2021

SMS scam targeting postal service users

The National CERT warns all postal service users of an ongoing scam against „Pošta Srbije“. The users are sent an SMS informing them about a supposedly incoming order for which it is necessary to pay due costs.

The link from the message redirects the user to a fake page where he/she is asked to enter their personal credit card data, which then enables the attackers to empty the bank account. The fake page visually mimics the legitimate page of „Pošta Srbije“, although a random combination of English and Serbian languages, as well as latin and cyrillic alphabets is noticeable.

The Public Enterprise „Pošta Srbije“ has informed the public that it does not communicate with its users in such a manner and that special attention is solicited with respect to this issue.

The National CERT urges all users who have received similar SMS not to open the link from the message nor to enter the required data.

You can report this scam to „Pošta Srbije“ through their call center numbers 0700 100 300 and 011 3607 788, from 8h to 20h on weekdays, and from 8h to 15h at weekends, as well as to the National CERT.


7. June 2021

Phishing scam attempt

The National CERT of the Republic of Serbia wishes to inform all Internet users of a new ongoing phishing campaign titled „**SPAM** Ulazak u sistem je uspešno završen, svi podaci sa Vašeg uredaja su kopirani. Pročitajte uputstva dalje.“ The phishing message further reads a threatening information about all the user’s data having been copied and locked, and even a video caption of the user been taken, including all of his/her social network contacts. In exchange for the „recovery“ of the stolen data, a Bitcoin payment in the amount of 1400 USD within 50 hours is requested. The message itself does not contain a fake link, but fraudulently influences the user to willingly make a payment in order to recover their data.

The National CERT recommends that all such emails be deleted. Careful scrutiny of similar incoming messages makes it harder for the attackers to take advantage of your lack of attention on the Internet. Users are advised to be particularly watchful when receiving emails from unknown senders, containing grammatical errors, where an immediate action is required from them.

9. April 2021

Phishing campaign against users of postal services

The National CERT of the Republic of Serbia wishes to inform the public that a new phishing campaign against users of postal services is under way, during which the users can receive an email notification about the arrival of the user‘s parcel, which supposedly could not be delivered due to an unpaid customs fee in the amount of 36.14 dinars. The message is sent from a fake address: Post of Serbia ''Postas@’’, with an email subject: Your parcel could not be delivered on April 7, 2021 due to unpaid customs fee in the amount of 36.14 RSD. The email further asks the user to click on the link stating ''In order to confirm delivery of your parcel, please click here'', after which the user is to receive a delivery confirmation email or SMS for the item. By clicking on the offered link, the user is then transferred to a fake page posing as the Post of Serbia online payment page, where the following personal data are required to be entered: credit card number, name and surname, credit card expiry date and CVV2/CVC2 numbersAll the information supplied by the user on the fake form/page can end up being abused.

The National CERT advises all users who have possibly received similar emails neither to open them, nor to disclose their personal details, but to delete such emails permanently.


3. March 2021

Abuse of e-commerce platforms

The National CERT warns the public of a scam directed against e-commerce platform users. This abuse targets the advertisers, contacted through an application by the supposed buyers interested in specific products. The communication is made in bad Serbian, with contact telephone numbers usually from abroad. The advertisers are asked to answer if the product is available, following which a link is provided to them on behalf of a supposed platform administrator, along with an explanation that the supposed buyer has already purchased the product via an application and that the advertiser is now required to enter their credit card number and CVV number in the offered field, so that the payment to the advertiser can be finalized. As soon as the advertiser enters the data, the funds from their bank account are transferred to the bank account of the supposed buyer, after which the latter leaves the conversation, blocking any further contact.

The National CERT advises all e-commerce platform users to be vigilant when asked to disclose their personal bank account data and to pay special attention to payment conditions on the platforms they use.

More on safe e-commerce activities can be found here.

1. March 2021

ICT Systems – submitting of statistical reports

The National CERT of the Republic of Serbia wishes to inform all operators of ICT  systems of special importance that, in the period between January 1, 2021 and February 28, 2021, the entry of statistical data on all incidents for the previous year will be made available through a web form created for this purpose, accessible to the ICT systems registered users at this link. The statistical data to be submitted should relate to incidents that have not significantly compromised the ICT systems’ operation over the last year, as set forth in the Law on Information Security (Article 6a, paragraph 1, Item 7).

For all information regarding access and entry of data, as well as other questions pertaining to the above activity, all registered ICT systems users are welcome to write to us at

25. December 2020

Solar Winds Cyberattack

In mid-December Solar Winds suffered a highly sophisticated cyberattack causing public concern. The company is a leader in monitoring and management software. This was a supply chain attack trojanizing SolarWinds Orion business software updates in order to distribute malware. The attacker gained backdoor access to victims via trojanized updates. In this way the attackers gained access to organizations worldwide, including the US Finance, Trade and Energy Departments, US National Security Agency, National Nuclear Security Administration and several State Department networks.

Suspecting a massive cyber espionage financed by a foreign government, the US Cybersecurity and Infrastructure Security Agency published the Emergency Directive with instructions to Mitigate SolarWinds Orion Code Compromise.

So far, there are around 18000 confirmed cases of users who installed the infected updates.

SolarWinds published a Security Advisory for users of Orion Platform v2020.2 with no hotfix or 2020.2 HF 1 to urgently upgrade to Orion Platform version 2020.2.1 HF 2, and the users of Orion Platform v2019.4 HF 5 to urgently upgrade to Orion Platform 2019.4 HF 6.

This attack was very sophisticated since it installed malicious software during standard updates, published in March this year and identified by FireEye company a couple of months later. Also, Microsoft, as the products user, announced that malware software was identified and successfully isolated and eliminated. No indicators of access to development services or user data have been found, nor the evidence that the company products had been used for further spread of malware.

Recovery recommendations are highly demanding and require extraordinary competence of experts, more information is available here  


Useful links:


Reuters- us-usa-cyber-breach

19. October 2020

Phishing campaign against bank clients in Serbia

The National CERT wishes to inform all banking service clients that a malicious phishing campaign is under way in the Republic of Serbia, targeting one of the banks operating in this country.

Phishing emails appear to be sent from the legitimate bank’s domain, but actually contain malicious attachments on foreign exchange inflow activating a malicious code in the background intended to infect the recipient’s computer.

According to the available information, we would like to notify the citizens that these emails are not being sent from the bank's servers. The bank has undertaken all necessary activities in order to block these messages from reaching its clients.

Based on the past experience, such phishing campaigns are usually directed against several banks, so the National CERT recommends to all users to be cautious and delete similar emails right away, without opening the attachment. The users are also advised to check with the bank the status of any suspicious payment, since the banks normally send to clients digitally signed notifications, so that the identity of the sender can be verified even before the email is opened.

An example of a phishing message can be seen at the following link:

Banca Intesa

6. October 2020

National CERT awarded permission by Carnegie Mellon University to use CERT Trademark

The National CERT is pleased to announce that it became authorized by the Carnegie Mellon University to use CERT Trademark in performing its activities.

CERT is a registered Trademark, protected by the Carnegie Mellon University seal since 1997. It provides visual, internationally recognizable identification, guaranteeing a high level of service quality.

In this way, the National CERT has officially become a part of the community of Centers for safety risk prevention in ICT systems, dedicated to continuous improvements in the area of ICT systems security.

24. September 2020

Knowledge is power

The Regulatory Agency for Electronic Communications and Postal Services, in its capacity of the National CERT of the Republic of Serbia, will mark this year's international Cybersecurity Month with a campaign entitled “Knowledge is power”.

The cybersecurity month is celebrated throughout the world, while in Europe it was first observed in 2012, with the slogan „Cybersecurity is a common responsibility", uniting the European countries in their combat against cyber threats. Ever since, this capmaign has yearly promoted not only a safer and more responsible online behaviour, but also introduced trainings and seminars aimed at educating end-users, preparing them for ever-emerging challenges. In 2019, the year when the Republic of Serbia joined in, 525 activities were recorded in 36 countries.

This year's campaign „Knowledge is power“ kicks off with a workshop for the media representatives, with presentations on current cyber news, events and advices on how to prevent the most frequent cyber attacks and threats.

A webinar for the small and medium-sized enterprises will provide information about legal regulations in the area of cyber security, current free tools and recommendations for a safe work and reduced business risk. The webinar is set to take place on October 15, 2020, whereas all interested parties can apply by email (

In order to raise awareness on the issue of cybersecurity, the National CERT regularly updates its website with news, notifications, recommendations, publications and brochures on best prevention measures and practices against security risks, including information about current cyber threats to citizens, companies and governmental bodies. Since the beginning of the COVID-19 pandemic, the National CERT's recommendations have been focused on how to safely work from home and maintain cybersecurity, with the following brochures being published: Safety recommendations for remote workers, VPN access for small and medium-sized enterprises, Abuse of COVID-19 pandemic in cyberspace, Social engineering, How to reduce the risk of receiving phishing emails (SPF, DMARC, DKIM), Compromised business emails – all of which can be found in the Publications segment of the website. In addition, a promotional video has been created, to be available soon on the same platform.

The National CERT invites you to follow the prepared content featuring as part of the „Knowledge is power“ campaign, as well as on social media.

11. August 2020

New TeamViewer update

The National CERT of the Republic of Serbia wishes to inform all users of TeamViewer application that a new update containing CVE 2020 13699 vulnerability patch has been published. This vulnerability can be abused by malicious attackers to acquire the user’s system passwords and compromise their desktop or mobile device.

The most worrying fact is that the attack can be carried out almost automatically, i.e. the interaction of the victim is not necessary – the attack is performed through a simple invitation to visit the malicous Internet page only once.

TeamViewer is one of the most popular applications offering support from a remote location, enabling the user to safely share desktop or mobile screen or take complete control online on their desktop or mobile device from any location.

The National CERT’s recommendation for the users working from home is to make sure all applications, antivirus softwares and OS are regularly updated, as well as to update their TeamViewer app as soon as possible.

More on this vulnerability abuse is available at this link

The website uses cookies for improvement of user experience and website functionality. By continuing to browse this website, you agree to the use of cookies.