{"id":20822,"date":"2023-03-16T07:57:43","date_gmt":"2023-03-16T11:57:43","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/copyright-infringement-backlink-scam\/20822\/"},"modified":"2023-03-17T07:38:20","modified_gmt":"2023-03-17T03:38:20","slug":"copyright-infringement-backlink-scam","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/copyright-infringement-backlink-scam\/20822\/","title":{"rendered":"Copyright infringement backlink scam"},"content":{"rendered":"<p>E-mail scams come in all shapes and sizes, with new ones keep appearing every day. No wonder, since this has always been the easiest and cheapest way to con people online \u2014 even for attackers who lack technical skills. In fact, all they need is a smidgen of both cunning and imagination. Today, we look at a crafty and rather original scheme that targets employees working with content \u2014 and their fears of copyright infringement.<\/p>\n<h2>That\u2019s copyrighted! Add a link to avoid penalties<\/h2>\n<p>\nOne not-so-fine day, an employee receives an e-mail from what seems to be a law firm. In it, the recipient is accused of using an image belonging to the firm\u2019s client in violation of copyright. There are also links to both the image and the page where the awful misdeed is being perpetrated. Both these links are quite real, so this part of the story is readily believable.<\/p>\n<p>Most likely, the picture is a bog-standard stock image, and it\u2019s hard to tell straight off whether it was purchased from the rightful owner or just downloaded on the fly. And the page where it\u2019s posted probably hasn\u2019t seen an update for a while. In short, if the e-mail recipient really wants to find out whether the picture was stolen \u2014 and who bears responsibility in such case, this will likely entail lots of back-and-forth correspondence with colleagues and a few not very pleasant meetings.<\/p>\n<div id=\"attachment_47518\" style=\"width: 784px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/03\/16160038\/copyright-infringement-backlink-scam-screen-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-47518\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/03\/16160038\/copyright-infringement-backlink-scam-screen-1.jpg\" alt=\"Scam involving SEO and copyright infringement\" width=\"774\" height=\"735\" class=\"size-full wp-image-47518\"><\/a><p id=\"caption-attachment-47518\" class=\"wp-caption-text\">E-mail threatening penalties for copyright infringement unless the recipient adds a link on their site<\/p><\/div>\n<p>However, after cowing the victim, the \u201claw firm\u201d is quick to propose a solution: its \u201cclient\u201d won\u2019t take action if, within five working days, the copyright owner is credited on the offending page with a link to the site given in the e-mail.<\/p>\n<p>This is followed by a second round of browbeating: the e-mail senders state categorically that simply deleting the problematic image from the site is not an option. In this case, there will be blood; rather \u2014 a lawsuit. Moreover, they frame the threat in intimidating legalese. In particular, they mention the Digital Millennium Copyright Act, which does indeed cover such violations, but for some reason they refer to section 512(c) \u2014 defining the limitations on liability for online service providers \u2014 which of course has the interests of those providers in mind, not the other way round.<\/p>\n<p>The attackers re-stress that deleting the image is not an option, kindly reminding the victim that a copy of the infringing page can be found in the Internet Archive and used as evidence in court.<\/p>\n<p>The e-mail itself looks pretty official. The scammers took the time to add the real address of some building where the law firm supposedly representing the claimant supposedly has its office.<\/p>\n<div id=\"attachment_47519\" style=\"width: 2714px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/03\/16160112\/copyright-infringement-backlink-scam-screen-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-47519\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/03\/16160112\/copyright-infringement-backlink-scam-screen-2.png\" alt=\"401 Congress Avenue, Austin, TX, USA\" width=\"2704\" height=\"1756\" class=\"size-full wp-image-47519\"><\/a><p id=\"caption-attachment-47519\" class=\"wp-caption-text\">Skyscraper in downtown Austin, Texas, where the law firm is purportedly based<\/p><\/div>\n<p>The domain names in the sender addresses also add credence through the use of fear-inducing words like \u201claw\u201d and \u201clegal\u201d. What\u2019s more, the attackers don\u2019t stay in one place, and constantly register new domains with similarly scary names.<\/p>\n<h2>How bad can it get?<\/h2>\n<p>\nBy all appearances, the attackers\u2019 goal is to get the victim to supply a \u201cguilty\u201d page with a backlink to the site they specify in the e-mail. Most likely, it\u2019s part of some shady search engine optimization (SEO) business: the more owners of legit sites can be forced to host such links, the faster the sites of some clients they\u2019re promoting will rise high in search results.<\/p>\n<p>What\u2019s so terrible about that, you might ask? Here\u2019s what:<\/p>\n<ul>\n<li>In the most innocent case, at the other end of the link there\u2019s a fly-by-night site, which will disappear fairly soon. When that happens, the link on your site will point to a 404 page, which isn\u2019t great for your SEO.<\/li>\n<li>A worse scenario: the site you help to pull up turns out to be so problematic that it gets pessimized by search engines \u2014 together with all sites that are linked to it, including yours. Again, your SEO will get it in the neck (plenty more so than in the first case, above).<\/li>\n<li>Finally, the most dangerous: the promoted site turns out to be phishing or malicious. In this case, you\u2019ll send your site visitors or customers into the arms of cybercriminals. Be in no doubt that when search engines get round to blocking the malicious resource, your site will get a healthy dose of karma.<\/li>\n<\/ul>\n<p>As such, there are no good options \u2014 only least bad, and no benefits to be had for your site at all. It means that the best solution is to ignore the e-mail and its ridiculous claims. To teach your employees how to react to e-mail scams \u2014 even the relatively innocent ones mentioned above, as well as far more dangerous kinds like <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/bec\/\" target=\"_blank\" rel=\"noopener\">BEC attacks<\/a>, we recommend holding regular <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">cybersecurity awareness trainings<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>How scammers force website owners to add potentially dangerous links by threatening harsh consequences for copyright infringement.<\/p>\n","protected":false},"author":2704,"featured_media":20824,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917,1486],"tags":[2061,80,2622,695],"class_list":{"0":"post-20822","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"category-threats","11":"tag-copyright","12":"tag-fraud","13":"tag-links","14":"tag-scam"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/copyright-infringement-backlink-scam\/20822\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/copyright-infringement-backlink-scam\/25383\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/copyright-infringement-backlink-scam\/27989\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/copyright-infringement-backlink-scam\/25672\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/copyright-infringement-backlink-scam\/26113\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/copyright-infringement-backlink-scam\/34869\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/copyright-infringement-backlink-scam\/47553\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/copyright-infringement-backlink-scam\/20348\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/copyright-infringement-backlink-scam\/20965\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/copyright-infringement-backlink-scam\/29928\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/copyright-infringement-backlink-scam\/25977\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/copyright-infringement-backlink-scam\/31692\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/copyright-infringement-backlink-scam\/31397\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/scam\/","name":"scam"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2704"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20822"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20822\/revisions"}],"predecessor-version":[{"id":20828,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20822\/revisions\/20828"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20824"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}