{"id":24167,"date":"2025-06-09T17:22:47","date_gmt":"2025-06-09T13:22:47","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=24167"},"modified":"2025-06-09T17:22:47","modified_gmt":"2025-06-09T13:22:47","slug":"how-hackers-attack-gen-z","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/how-hackers-attack-gen-z\/24167\/","title":{"rendered":"How hackers target Gen Z"},"content":{"rendered":"<p>Gen Z, or \u201cZoomers\u201d, are those born between ~1997 and 2012. That\u2019s a 15-year age gap between the oldest and youngest. So what could they possibly have in common? Well, every member of Gen Z is a digital native. They barely remember a time before computers, smartphones, and social media. More than any other generation, Gen Z loves games (especially our own \u2014 <a href=\"https:\/\/case404.kaspersky.com\/\" target=\"_blank\" rel=\"noopener\"><em>Case 404<\/em><\/a> \u2014 we hope!), TV shows, and movies. Sometimes, they even shape their identities by constantly connecting with their favorite characters. Naturally, this level of immersion makes them a prime target for malicious actors.<\/p>\n<p>Kaspersky experts have released two reports detailing how cybercriminals target Gen Z through their love of games, movies, TV shows, and anime. Check out the full versions of the <a href=\"https:\/\/www.kaspersky.com\/blog\/gen-z-streaming-report-2025\/\" target=\"_blank\" rel=\"noopener nofollow\">first<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/gen-z-gaming-report-2025\/\" target=\"_blank\" rel=\"noopener nofollow\">second <\/a>reports to dive deeper.<\/p>\n<h2>How gamers get attacked<\/h2>\n<p>In the one-year period from April 1, 2024, we recorded at least 19 million attempts to distribute malware disguised as games popular with Gen Z. The top three games targeted by these attacks were <em>GTA<\/em>, <em>Minecraft<\/em>, and <em>Call of Duty<\/em>, together accounting for a staggering 11.2 million attempts. So, why are these particular games at the top of both gamers\u2019 and cybercriminals\u2019 lists? We just might know the reason. They\u2019re replayable; that is, players can dive back in any time and still get a fresh experience. Besides, these titles boast massive online communities. Players are constantly creating content, making mods, and searching for cheats and cracked versions.<\/p>\n<p>One of the most common threats facing Gen Z gamers is phishing \u2014 where cybercriminals impersonate a trusted entity and tempt players with promises of free in-game rewards to lure them into sharing personal data. Enticing trade offers and easy ways to earn money are some of the most popular tricks used against gamers.<\/p>\n<p>We uncovered a phishing site that looked eerily similar to a legitimate Riot Games campaign. The campaign aimed to blend two different universes: the game <em>Valorant<\/em> and the animated series <em>Arcane<\/em>. Players were invited to \u201cspin the wheel\u201d for a chance to win exclusive new skins. In reality, gamers who participated in this \u201ccontest\u201d essentially handed over their gaming accounts, banking details, and phone numbers to third parties. Of course, they received no skins in return.<\/p>\n<div id=\"attachment_53623\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/09171315\/how-hackers-attack-gen-z-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53623\" class=\"size-large wp-image-53623\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/09171315\/how-hackers-attack-gen-z-01-1024x819.jpg\" alt=\"A beautiful background and recognizable characters \u2014 what more do you need to fall for a scam?\" width=\"1024\" height=\"819\"><\/a><p id=\"caption-attachment-53623\" class=\"wp-caption-text\">A beautiful background and recognizable characters \u2014 what more do you need to fall for a scam?<\/p><\/div>\n<p>But it\u2019s not just about scams. In November 2024, our experts from the Global Research and Analysis Team (GReAT) uncovered a campaign where attackers were distributing the Hexon stealer disguised as game installer files. Once installed, this malware attacked gaming platforms; for example, it could extract user data from Steam. On top of that, Hexon targeted messaging apps like Telegram and WhatsApp, and other social media platforms, such as TikTok, YouTube, Instagram, and Discord.<\/p>\n<p>These fake installers flooded gaming forums, chats on Signal and Telegram, Discord channels, and popular file-sharing sites. The cybercriminals promoted the Hexon stealer using a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/malware-as-a-service-maas\/\" target=\"_blank\" rel=\"noopener\">malware-as-a-service<\/a> model, where some malicious actors provide malware to others \u2014 often less tech-savvy ones \u2014 for a fee.<\/p>\n<div id=\"attachment_53622\" style=\"width: 811px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/09171338\/how-hackers-attack-gen-z-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53622\" class=\"size-large wp-image-53622\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/09171338\/how-hackers-attack-gen-z-02-801x1024.jpg\" alt=\"Example of attackers' message in a Discord channel\" width=\"801\" height=\"1024\"><\/a><p id=\"caption-attachment-53622\" class=\"wp-caption-text\">Example of attackers\u2019 message in a Discord channel<\/p><\/div>\n<p>Interestingly, a short while later, the creator of Hexon announced a rebrand. The stealer was now called \u201cLeet\u201d, and was offered at a 50% discount. Unlike its predecessor, the updated version can bypass sandboxes by checking the infected device\u2019s public IP address and system specifications. If the stealer detects signs of being in a virtual machine, it shuts down immediately.<\/p>\n<h2>How movie, TV show, and anime fans get attacked<\/h2>\n<p>We dug into some data provided by the <a href=\"https:\/\/www.kaspersky.com\/ksn\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Network Security (KSN)<\/a> \u2014 our global threat intelligence network which processes cyberthreat information from every corner of the world. We analyzed the data for the same one-year period starting April 1, 2024, and here\u2019s what we found:<\/p>\n<ul>\n<li>Netflix was dangled as bait in about 85\u00a0000 attacks. That\u2019s nearly 233 times a day.<\/li>\n<li>Gen Zers aren\u2019t the only ones passionate about anime. Cybercriminals are big fans too, with 250\u00a0000 attacks recorded during the reporting period.<\/li>\n<li>The total number of leaked streaming-service accounts exceeded seven million.<\/li>\n<\/ul>\n<p>When it comes to the most exploited <strong>streaming platforms<\/strong>, alongside Netflix, we found Amazon Prime Video, Disney+, Apple TV+, and HBO Max at the top of the list. Scammers used these brand names in their campaigns throughout the year, with no significant peaks or troughs in popularity. Mostly, they used a classic approach: sending phishing links to fake websites while pretending to represent a streaming platform. The pretexts, however, varied. In some instances, attackers would prompt users to renew their subscriptions or update payment details \u2014 only to direct them to a fake site to do so. Such emails often mimicked the streaming service\u2019s official style, making it easy to miss the red flags.<\/p>\n<div id=\"attachment_53621\" style=\"width: 986px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/09171703\/how-hackers-attack-gen-z-03.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53621\" class=\"size-full wp-image-53621\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/09171703\/how-hackers-attack-gen-z-03.png\" alt=\"Phishing website imitating the official Netflix page\" width=\"976\" height=\"655\"><\/a><p id=\"caption-attachment-53621\" class=\"wp-caption-text\">Phishing website imitating the official Netflix page<\/p><\/div>\n<p>Beyond just harvesting personal data, these bad actors also distributed various malware. <a href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/risktool\/\" target=\"_blank\" rel=\"noopener\">RiskTool<\/a> was a big one, accounting for around 80% of all attempts. While not malicious on its own, it\u2019s often used in conjunction with other threats, such as miners, helping them conceal their presence in the infected system.<\/p>\n<p>Many of the attacks were designed to <strong>steal users\u2019 personal information<\/strong>. We uncovered roughly seven million compromised accounts across Netflix, Amazon Prime Video, Disney+, Apple TV+, and HBO Max. Stolen accounts are typically used by cybercriminals to spread phishing links and malware to more users, or they\u2019re sold off to other malicious actors at a low price.<\/p>\n<p><strong>Anime<\/strong> fans weren\u2019t spared by the digital villains, either. Unsurprisingly so \u2014 recent data shows that <a href=\"https:\/\/www.cbr.com\/gen-z-watches-more-anime-other-generation\/\" target=\"_blank\" rel=\"nofollow noopener\">over 65% of Gen Z watch anime<\/a>. To gauge just how often attackers targeted fans of Japanese animation, we focused on five popular anime titles: <em>Naruto<\/em>, <em>One Piece<\/em>, <em>Demon Slayer<\/em>, <em>Attack on Titan<\/em>, and <em>Jujutsu Kaisen<\/em>. We recorded over 250\u00a0000 attack attempts centered around just these five titles. The undisputed leader? <em>Naruto<\/em>, with over 114\u00a0000 attempts.<\/p>\n<h2>How Gen Zers can stay cybersafe<\/h2>\n<p>Zoomers should protect themselves in the same way as everyone else who enjoys TV shows, games, movies, and anime, and is generally active online. Here\u2019s a short list of the \u201cgolden rules\u201d to help protect your accounts, banking details, and devices from prying eyes.<\/p>\n<p>(If you want to learn more about cybersecurity, try your hand as a detective in our new, free browser-game, <a href=\"https:\/\/case404.kaspersky.com\/\" target=\"_blank\" rel=\"noopener\">Case 404<\/a>. It features three storylines, each showing what can go wrong when you skip out on proper digital hygiene. But for now, let\u2019s get back to those rules.)<\/p>\n<ul>\n<li><strong>Stick to official sources<\/strong> <strong>when downloading games, TV shows, and anime.<\/strong> Seriously, <a href=\"https:\/\/www.kaspersky.com\/blog\/miner-xmrig-delivered-via-torrents\/53061\/\" target=\"_blank\" rel=\"noopener nofollow\">ditch the torrents<\/a>, sketchy third-party sites, and random links strangers share on forums and in chats. And here\u2019s a heads-up: even official game stores can sometimes get infiltrated by malware. To learn more, read <a href=\"https:\/\/www.kaspersky.com\/blog\/games-with-trojans-in-steam\/53038\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Gamers beware: Trojans have invaded Steam<\/strong><\/a>.<\/li>\n<li><strong>Enable <\/strong><a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>two-factor authentication (2FA)<\/strong><\/a><strong> everywhere you can.<\/strong> By the way, tokens can be conveniently stored in <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>.<\/li>\n<li><strong>Remember the adage about a free lunch? <\/strong>Yep \u2014 there\u2019s no such thing. Be skeptical of giveaways of skins, cheats, in-game currency, or supposedly leaked episodes of your favorite TV show or anime.<\/li>\n<li><strong>When you\u2019re paying online, only use virtual cards with spending limits.<\/strong> That way, your main bank account stays safe \u2014 even if something goes sideways.<\/li>\n<li><strong>Use <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">robust security<\/a>.<\/strong> A security solution will warn you when you\u2019re about to open a phishing website, and help you detect threats in time, even if they\u2019ve already made their way onto your device.<\/li>\n<li><strong>Read the full reports on attacks targeting Gen Z. <\/strong>The report on movies, TV shows, and anime is <a href=\"https:\/\/www.kaspersky.com\/blog\/gen-z-streaming-report-2025\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>, and the one on gaming attacks can be found <a href=\"https:\/\/www.kaspersky.com\/blog\/gen-z-gaming-report-2025\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/li>\n<\/ul>\n<p>The last, but perhaps one of the most important, rules is to stay one step ahead.<strong>\u00a0<\/strong>Subscribe to our <a href=\"https:\/\/t.me\/+hfDEDRUTiLJlOGE8\" target=\"_blank\" rel=\"noopener nofollow\">Telegram channel<\/a>\u00a0to make your online life safer.<\/p>\n<blockquote><p>How else attackers target Gen Z as well as other demographic groups:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/arcane-stealer-instead-of-cheats-for-minecraft\/53178\/\" target=\"_blank\" rel=\"noopener nofollow\">Arcane stealer instead of Minecraft cheats<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/netflix-phishing\/42927\/\" target=\"_blank\" rel=\"noopener nofollow\">Phishing in Netflix and beyond<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/tales-from-steam\/38691\/\" target=\"_blank\" rel=\"noopener nofollow\">Steam and mirrors: how gamers get duped<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-play-tanks-and-catch-backdoor\/52561\/\" target=\"_blank\" rel=\"noopener nofollow\">How (not) to play tanks and catch a backdoor<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/what-happens-if-you-download-cracked-program\/53278\/\" target=\"_blank\" rel=\"noopener nofollow\">What happens if you download a cracked program?<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Malicious actors are busy setting up fake Netflix websites, trying to trick visitors into paying for supposedly legitimate subscriptions, and promising in-game currency and skins for popular games. How else are they scamming Gen Zers, and what can we do to fight back?<\/p>\n","protected":false},"author":2706,"featured_media":24170,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,1486],"tags":[1474,80,617,163,89,2368,2151,164,2269,521],"class_list":{"0":"post-24167","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-threats","9":"tag-accounts","10":"tag-fraud","11":"tag-gamers","12":"tag-gaming","13":"tag-kids","14":"tag-movies","15":"tag-stealers","16":"tag-steam","17":"tag-streaming","18":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-hackers-attack-gen-z\/24167\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-hackers-attack-gen-z\/28941\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-hackers-attack-gen-z\/29045\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-hackers-attack-gen-z\/39871\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-hackers-attack-gen-z\/53617\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-hackers-attack-gen-z\/29264\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-hackers-attack-gen-z\/34981\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-hackers-attack-gen-z\/34615\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24167"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24167\/revisions"}],"predecessor-version":[{"id":24171,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24167\/revisions\/24171"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24170"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}