{"id":17933,"date":"2021-01-26T06:21:14","date_gmt":"2021-01-26T11:21:14","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/facebook-account-hijack-through-notes\/17933\/"},"modified":"2021-01-26T17:24:26","modified_gmt":"2021-01-26T13:24:26","slug":"facebook-account-hijack-through-notes","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/facebook-account-hijack-through-notes\/17933\/","title":{"rendered":"Fake copyright violation notice aimed at stealing Facebook accounts"},"content":{"rendered":"<p>The latest phishing campaign aimed at stealing Facebook accounts is gathering momentum. Users are receiving mass e-mails threatening bans for copyright violation. The aim is to steal the users\u2019 login credentials. We explain the anatomy of the new scheme and how not to swallow the bait.<\/p>\n<h2>Who, me?<\/h2>\n<p>The message says something like: \u201cYour Facebook account has been disabled for violating the Facebook Terms. If you believe that this decision is incorrect, you may file an appeal at this link.\u201d<\/p>\n<p>What could the problem be? A video you posted last year of your friends dancing to a hit song? Could that really be it? Well, maybe: The link does lead to a notice about music copyright infringement. The address of the page is facebook.com, and the notification page contains a link to an appeal form. So far, seems plausible.<\/p>\n<p>Afraid of losing your account and without seeing any red flags in the link address, you might even enter your full name and username, as requested. Next, however, is a request no one should mindlessly obey: \u201cFor your own security, please enter your password.\u201d<\/p>\n<p>And \u2026 scene. Your login and password (i.e., your entire account) now belongs to cybercriminals.<\/p>\n<p>We\u2019ve said it before and we\u2019ll say it again: Don\u2019t follow links in suspicious e-mails. Even the savviest users can get caught off-guard by a well-written, well-designed message that gets through the spam filter, contains what looks like a good link, and generally seems legitimate.<\/p>\n<h2>What\u2019s the trick?<\/h2>\n<p>On closer inspection, the scam isn\u2019t really that clever. At every stage, there are warning signs. What\u2019s important is to stay calm and alert. Panic can lead even cautious people down dangerous paths.<\/p>\n<p>Let\u2019s start with the e-mail. First, the text itself gives the scammers away. Although it lacks the kind of egregious language errors we often see in spam, anyone familiar with Facebook\u2019s communications will note that the letter doesn\u2019t read quite right. Then, to trick spam filters, attackers introduce small intentional typos into the body of the e-mail. In this case, they used the old upper-case-I-instead-of- lower-case-L trick. If your mail client uses a serif font, the substitution is easy to spot.<\/p>\n<div id=\"attachment_38573\" style=\"width: 1225px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152320\/facebook-account-hijack-through-notes-screen-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-38573\" class=\"size-full wp-image-17934\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152320\/facebook-account-hijack-through-notes-screen-1.png\" alt=\"Here's how the message looks if the mail client uses a serif font. The substituted letters give the scammers away\" width=\"1215\" height=\"705\"><\/a><p id=\"caption-attachment-38573\" class=\"wp-caption-text\">Here\u2019s how the message looks if the mail client uses a serif font. The substituted letters give the scammers away<\/p><\/div>\n<p>If the font is sans-serif, you may not detect that sort of change. So, let\u2019s move on to the next clue. Pay attention to the sender\u2019s address. The name says Facebook, but the actual address (shown in some clients in a nondescript gray color, unfortunately) has nothing to do with the social network. Official Facebook notifications would never come from an address like this one.<\/p>\n<div id=\"attachment_38574\" style=\"width: 1110px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152335\/facebook-account-hijack-through-notes-screen-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-38574\" class=\"size-full wp-image-17936\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152335\/facebook-account-hijack-through-notes-screen-2.png\" alt=\"If your mail client uses a sans-serif font, lower-case L and upper-case i look identical, but the sender's address betrays its origin: not Facebook\" width=\"1100\" height=\"500\"><\/a><p id=\"caption-attachment-38574\" class=\"wp-caption-text\">If your mail client uses a sans-serif font, lower-case L and upper-case i look identical, but the sender\u2019s address betrays its origin: not Facebook<\/p><\/div>\n<p>Now, the link in the e-mail does point to Facebook. As we mentioned, that\u2019s another trick designed to fool spam filters \u2014 and you. But the page does not contain an official notice; it\u2019s a <em>note<\/em>. Until <a href=\"https:\/\/businessesgrow.com\/2020\/10\/14\/facebook-notes\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">last October<\/a>, any user could create one using Facebook Notes. At the time of this writing, the tool has been disabled, but old notes are still accessible. At the top of the page is the username, which in this case looks plausibly legit: Case #5918694.<\/p>\n<div id=\"attachment_38575\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152343\/facebook-account-hijack-through-notes-screen-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-38575\" class=\"size-full wp-image-17938\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152343\/facebook-account-hijack-through-notes-screen-3.png\" alt=\"The address bar reveals that the text is someone's Facebook note\" width=\"1460\" height=\"1000\"><\/a><p id=\"caption-attachment-38575\" class=\"wp-caption-text\">The address bar reveals that the text is someone\u2019s Facebook note<\/p><\/div>\n<p>The link is external but disguised as internal. Hovering over it, we can see that it redirects from Facebook to an outside website that has been shortened using Bitly.<\/p>\n<div id=\"attachment_38576\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152351\/facebook-account-hijack-through-notes-screen-4.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-38576\" class=\"size-full wp-image-17940\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152351\/facebook-account-hijack-through-notes-screen-4.png\" alt=\"The address of the link is visible in the lower left corner. At first glance, it might seem internal, but it points to an external resource via bit.ly\" width=\"1460\" height=\"1000\"><\/a><p id=\"caption-attachment-38576\" class=\"wp-caption-text\">The address of the link is visible in the lower left corner. At first glance, it might seem internal, but it points to an external resource via bit.ly<\/p><\/div>\n<p>The link opens a form that asks for the e-mail address or phone number linked to your Facebook account. The page address looks a bit like Facebook\u2019s, but a closer look reveals that it has nothing to do with the social network.<\/p>\n<div id=\"attachment_38577\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152402\/facebook-account-hijack-through-notes-screen-5.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-38577\" class=\"size-full wp-image-17942\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152402\/facebook-account-hijack-through-notes-screen-5.png\" alt=\"The address bar shows \" .com followed by a random set of numbers width=\"1460\" height=\"1000\"><\/a><p id=\"caption-attachment-38577\" class=\"wp-caption-text\">The address bar shows \u201c.com\u201d followed by a random set of numbers<\/p><\/div>\n<p>Click the Send button and a password entry form pops up. It\u2019s the final play; enter a real password in this field and it\u2019s game, set, and match to the cybercriminals.<\/p>\n<div id=\"attachment_38578\" style=\"width: 740px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152411\/facebook-account-hijack-through-notes-screen-6.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-38578\" class=\"size-full wp-image-17944\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/01\/26152411\/facebook-account-hijack-through-notes-screen-6.png\" alt=\"Finally, the password entry form\" width=\"730\" height=\"600\"><\/a><p id=\"caption-attachment-38578\" class=\"wp-caption-text\">Finally, the password entry form<\/p><\/div>\n<h2>How to protect your Facebook account from hijacking<\/h2>\n<p>You can thwart most phishing campaigns (not just Facebook ones) by following these simple rules.<\/p>\n<ul>\n<li>Take your time and do not panic;<\/li>\n<li>Check the sender address before clicking on links in e-mails. Facebook is unlikely to send notifications from non-Facebook mail domains, for example;<\/li>\n<li>Look for strange lettering, mistakes, and typos in e-mail text, and assume any message containing them is suspicious;<\/li>\n<li>Always log in to your account through the app or by entering the URL in your browser\u2019s address bar (by typing it, not by clicking a link), even if you suspect you\u2019ve received an actual notice of terms-of-service violation;<\/li>\n<li>Avoid entering your login credentials on third-party or other pages \u2014 but if you did that and lost access to your account, contact customer service immediately. Here are some more <a href=\"https:\/\/www.kaspersky.com\/blog\/tips-for-hacked-account\/36760\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">handy hints for use in the event of a hack<\/a>.<\/li>\n<li>Install a reliable security solution, such as <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>, that will warn you if you try to open a suspicious page and also guard against malware, data collection, webcam surveillance, and other threats.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>If you receive a message saying your Facebook account has been blocked for copyright violation, don&#8217;t panic. It\u2019s most likely just another phishing scam.<\/p>\n","protected":false},"author":2598,"featured_media":17946,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[2407,2061,20,76,211],"class_list":{"0":"post-17933","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-account-theft","10":"tag-copyright","11":"tag-facebook","12":"tag-phishing","13":"tag-social-media"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/facebook-account-hijack-through-notes\/17933\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/facebook-account-hijack-through-notes\/22443\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/facebook-account-hijack-through-notes\/8922\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/facebook-account-hijack-through-notes\/24148\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/facebook-account-hijack-through-notes\/22225\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/facebook-account-hijack-through-notes\/20921\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/facebook-account-hijack-through-notes\/24587\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/facebook-account-hijack-through-notes\/23795\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/facebook-account-hijack-through-notes\/30006\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/facebook-account-hijack-through-notes\/9267\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/facebook-account-hijack-through-notes\/38571\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/facebook-account-hijack-through-notes\/16311\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/facebook-account-hijack-through-notes\/16894\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/facebook-account-hijack-through-notes\/14416\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/facebook-account-hijack-through-notes\/26142\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/facebook-account-hijack-through-notes\/29924\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/facebook-account-hijack-through-notes\/26628\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/facebook-account-hijack-through-notes\/23482\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/facebook-account-hijack-through-notes\/28823\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/facebook-account-hijack-through-notes\/28629\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/facebook\/","name":"Facebook"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17933"}],"version-history":[{"count":13,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17933\/revisions"}],"predecessor-version":[{"id":17953,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17933\/revisions\/17953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17946"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}