New Norton by Symantec research tracks how cyber criminals are misusing Netflixs global expansion to steal users credentials in order to provide the streaming service at black market prices. While these infection figures do not include the UAE, users should still be wary of potential threats. The Security Response team at Symantec/Norton has observed two […]
New Norton by Symantec research tracks how cyber criminals are misusing Netflixs global expansion to steal users credentials in order to provide the streaming service at black market prices. While these infection figures do not include the UAE, users should still be wary of potential threats.
The Security Response team at Symantec/Norton has observed two different attack methods. The first is a malware campaign aimed at stealing bank information from the affected computer where the malicious files are downloaded by users who were tricked by fake ads or offers of free or cheaper Netflix access. The second attempts to steal Netflix login credentials through phishing campaigns that redirect users to a fake Netflix website and tricks them into providing their login credentials, personal information, and payment cards details.
One malware campaign involves malicious files posing as Netflix software on compromised computers desktops. The files are downloaders that, once executed, open the Netflix home page as a decoy and secretly download Infostealer.Banload. Banload steals banking information from the affected computer. The Trojan has primarily been used in Brazil.
The Netflix-disguised files arent dropped through drive-by downloads. Instead, the files are most likely downloaded by users who may have been tricked by fake advertisements or offers of free or cheaper access to Netflix.
Aside from delivering malware, attackers may target Netflix users by attempting to steal their login credentials through phishing campaigns. Netflix subscriptions allow between one and four users on the same account. This means that an attacker could piggyback on a users subscription without their knowledge.
In these phishing campaigns, attackers redirect users to a fake Netflix website to trick users into providing their login credentials, personal information, and payment cards details. These tactics are not uncommon; cybercriminals are still using them on a daily basis.
Symantec observed one Netflix phishing campaign on January 21 which was crafted for Danish users. The phishing email tried to trick users into believing that their Netflix account needed to be updated, as there was an issue with their monthly payment. The emails were sent from email@example.com with the subject Opdater Betalingsinformation. The site that the email linked to is no longer active.
There is an underground economy targeting users who wish to access Netflix for free or a reduced price. The products could even allow customers to open their own illegal store.
The most common offers are for existing Netflix accounts. These accounts either provide a month of viewing or give full access to the premium service. In most advertisements for these services, the seller asks the buyer not to change any information on the accounts, such as the password, as it may render them unusable. This is because a password change would alert the user who had their account stolen of the compromise.
Another offering includes Netflix account generators. The accounts created through these tools may come from stolen Netflix subscriptions or payment card details. The generators creators regularly update their databases with new accounts and disable ones that dont work anymore. Buyers can use this software for themselves or resell the generated accounts on the black market.
Symantec advises users to only download the Netflix application from official sources. Additionally, users should not take advantage of services that appear to offer Netflix for free or a reduced price, as they may contain malicious files or steal data.