{"id":19109,"date":"2021-11-17T14:59:33","date_gmt":"2021-11-17T10:59:33","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/netflix-phishing\/19109\/"},"modified":"2021-11-17T15:00:49","modified_gmt":"2021-11-17T11:00:49","slug":"netflix-phishing","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/netflix-phishing\/19109\/","title":{"rendered":"Phishing in Netflix and beyond"},"content":{"rendered":"<p>Movies and TV shows have been a huge source of comfort for many in these COVID times, and the number of new shows on Netflix, Amazon Prime, and the like has skyrocketed. But when searching for the latest megahit, don\u2019t neglect basic security measures or you might find that someone else is enjoying it at your expense \u2014 or worse, that the money in your bank account has evaporated.<\/p>\n<p>It\u2019s more fun to ponder what to watch next than to dig through security settings, but attackers are ready and waiting to siphon off your personal and payment information.<\/p>\n<h2>Phishing bait<\/h2>\n<p>Streaming services offer a variety of payment plans, but generally they all involve paying with a credit card. And where there are card details, there is phishing. What\u2019s more, newbies and seasoned account holders may experience different forms of bait. We collected some examples from users who agreed to share threat information.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n<p><\/p><h3>\u201cSubscribe now!\u201d<\/h3>\n<p>To sign up for a streaming service, you need a valid e-mail address; and to pay, you need some form of online payment such as a credit card or PayPal account. (If you plan to watch Apple TV, you\u2019ll also need an Apple ID.)<\/p>\n<p>Unsurprisingly, cybercriminals have created fake sign-up pages to net all of those goodies in one go. Armed with your info, they can withdraw or spend your money right away; your e-mail address should come in handy for future attacks.<\/p>\n<p>In the example below, the fake site is not very convincing. Can you spot the <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing signs<\/a>?<\/p>\n<div id=\"attachment_42929\" style=\"width: 1770px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17145946\/netflix-phishing-screen-1-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-42929\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17145946\/netflix-phishing-screen-1-EN.png\" alt=\"Fake Netflix sign-up page\" width=\"1760\" height=\"940\" class=\"size-full wp-image-19110\"><\/a><p id=\"caption-attachment-42929\" class=\"wp-caption-text\">Fake Netflix sign-up page<\/p><\/div>\n<h3>\u201cRefresh data\u201d<\/h3>\n<p>If you already have a paid subscription, then attackers will threaten to block it, assuming, logically, that you value it. Here\u2019s an e-mail from \u201cfriends at Netflix,\u201d telling the recipient to update or confirm payment details or they\u2019ll close the account. And it includes a big, red button. Don\u2019t rush to click that \u2014 remember what happens in the movies when they push the big, red button?<\/p>\n<div id=\"attachment_42930\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17150002\/netflix-phishing-screen-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-42930\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17150002\/netflix-phishing-screen-2.jpg\" alt=\"\" dear costumer please update your account width=\"800\" height=\"800\" class=\"size-full wp-image-19112\"><\/a><p id=\"caption-attachment-42930\" class=\"wp-caption-text\">\u201cDear costumer, please update your account\u201d<\/p><\/div>\n<p>The link takes you to a payment confirmation page. <\/p>\n<p>Now, many phishing messages contain such obvious mistakes as addressing \u201ccostumers,\u201d but take the form below as an example that actually looks plausible. It has no spelling mistakes or weird design elements, but the inattentive user who falls for it could lose money from their bank account.<\/p>\n<div id=\"attachment_42931\" style=\"width: 1246px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17150010\/netflix-phishing-screen-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-42931\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17150010\/netflix-phishing-screen-3.png\" alt=\"Fake Netflix website prompts to enter personal and banking data, allegedly for account reactivation\" width=\"1236\" height=\"963\" class=\"size-full wp-image-19114\"><\/a><p id=\"caption-attachment-42931\" class=\"wp-caption-text\">Fake Netflix website prompts to enter personal and banking data, allegedly for account reactivation<\/p><\/div>\n<h3>A dangerous premiere<\/h3>\n<p>In the example below, cybercriminals used popular shows to attract fans who didn\u2019t have subscriptions, offering them the opportunity to watch the shows on the fake website.<\/p>\n<div id=\"attachment_42932\" style=\"width: 1079px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17150024\/netflix-phishing-screen-4.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-42932\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17150024\/netflix-phishing-screen-4.png\" alt=\"This unofficial page invites fans to watch or download The Mandalorian\" width=\"1069\" height=\"960\" class=\"size-full wp-image-19116\"><\/a><p id=\"caption-attachment-42932\" class=\"wp-caption-text\">This unofficial page invites fans to watch or download The Mandalorian<\/p><\/div>\n<p>As a teaser, they show a short clip, which they sometimes try to pass off as a new, previously unaired episode. More often than not, it is cut from trailers that have long been in the public domain. Intrigued victims are then asked to buy a low-cost subscription to continue watching. What follows is a classic scenario: Any payment details users enter go straight to the crooks, and the never-before-seen episode remains such.<\/p>\n<h2>No longer your account<\/h2>\n<p>Cybercriminals are interested in more than bank account details; account credentials for streaming services are also hot. Because hijacked accounts with paid subscriptions get <a href=\"https:\/\/securelist.com\/streaming-related-cyberthreats-report-2021\/104833\/\" target=\"_blank\" rel=\"nofollow noopener\">put up for sale on the dark web<\/a>, you could log in one day and discover someone else is already there.<\/p>\n<p>After all, depending on your Netflix plan, you can stream on 1\u20134 devices simultaneously, and cybercriminals can sell your login credentials to any number of streamers. That means you might find yourself having to wait in line until some stranger decides to sign out.<\/p>\n<div id=\"attachment_42933\" style=\"width: 1842px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17150039\/netflix-phishing-screen-5.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-42933\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/11\/17150039\/netflix-phishing-screen-5.png\" alt=\"This fake Netflix login page looks just like the real one\" width=\"1832\" height=\"872\" class=\"size-full wp-image-19118\"><\/a><p id=\"caption-attachment-42933\" class=\"wp-caption-text\">This fake Netflix login page looks just like the real one<\/p><\/div>\n<p>That may not be the end of it, either: Many people <a href=\"https:\/\/www.kaspersky.com\/blog\/never-reuse-passwords-story\/24808\/\" target=\"_blank\" rel=\"noopener nofollow\">use the same password for different accounts<\/a>, and databases of stolen passwords die hard. If their password is the same everywhere, the victim need only enter it on a phishing page once.<\/p>\n<h2>Buy a subscription for yourself, not cybercriminals<\/h2>\n<p>Cybercriminals scam movie and TV show lovers in different ways. Some of their ruses are quite easy to spot, others less so. By following simple digital security rules, you can protect your data not only in online movie theaters, but elsewhere as well.<\/p>\n<ul>\n<li>Do not click links in e-mails, even if a message seems to be from a real streaming (or other) service; always go to the official website by entering the address manually or through the app;<\/li>\n<li>Do not trust any person or site promising viewings of movies or shows before the official premiere;<\/li>\n<li>Pay attention to <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">red flags<\/a> that warn of phishing e-mails or fake websites;<\/li>\n<li>Stay alert and read more about scams and phishing schemes to learn how to sense which e-mails and websites are trustworthy, and which you should avoid;<\/li>\n<li>Use different passwords for all accounts that you value, and use a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a> to remember them for you;<\/li>\n<li>Use a <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> that identifies malicious attachments and blocks phishing websites.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>We analyze some typical examples of phishing bait for movie streamers.<\/p>\n","protected":false},"author":2484,"featured_media":19120,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[1474,187,76,695,2269],"class_list":{"0":"post-19109","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-accounts","9":"tag-passwords","10":"tag-phishing","11":"tag-scam","12":"tag-streaming"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/netflix-phishing\/19109\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/netflix-phishing\/23657\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/netflix-phishing\/9553\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/netflix-phishing\/25739\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/netflix-phishing\/23790\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/netflix-phishing\/23359\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/netflix-phishing\/26456\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/netflix-phishing\/31921\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/netflix-phishing\/10286\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/netflix-phishing\/42927\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/netflix-phishing\/18131\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/netflix-phishing\/18512\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/netflix-phishing\/15546\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/netflix-phishing\/27757\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/netflix-phishing\/31977\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/netflix-phishing\/24594\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/netflix-phishing\/29972\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/netflix-phishing\/29776\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19109"}],"version-history":[{"count":5,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19109\/revisions"}],"predecessor-version":[{"id":19119,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19109\/revisions\/19119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19120"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}