The Limited Times

Now you can see non-English news...

Fraud: Impersonating a Popular Website and Stealing Credit Information | Israel today

2020-04-04T12:51:28.846Z


Cyber


Police warn: SMS messages are sent to the public and contain links to phishing sites for Netflix and PayPal - stealing credit information from anyone who opens the message

  • Impostors for Netflix and Paypal // Photo: AFP

Police Cyber ​​Unit in Lahav 433 reports on Saturday a phishing scam activity aimed at collecting customer and bank account information from citizens in Israel by sending SMS messages.

The messages contain a link to the Netflix streaming service and Pay-Pal payment impersonation content. Police are asking the public to be vigilant and not to open the messages, and recommend that accounts and sites be accessed only through the official link and through secure sites.

The message posing to Netflix is: "We were unable to process your last payment. To continue enjoying Netflix. Please update your payment information" and the following link: opu57.com?Netflix.com . If you received such notice - it should not be opened.

The message posing to Paypal: "Hello Sir. There is a suspicious activity in your account, sign in now to confirm your account", and add the following links: https://bit.ly/ppl_benni or https://www.hellohomedoctor.com.au/ login or https: // bit / ppl_securt

Police recommend the following steps to prevent falls as a victim of network fraud and "Fishinig":

- The sender's identity must be noted.

- If you receive a suspicious message / message requesting to update payment details, it is often necessary to check with the sending company.

- In case of doubt, we recommend re-entering the official website of the company in the usual way through the browser and not through the link received in the message.

- Software downloads should only be downloaded from the official website.

- Note the address bar in the browser and pay attention to the URL (it can sometimes be a predicted address even with a single character change).

- Please note whether the site is secure. A secure site usually has a green lock icon and the URL begins with the letters https.

- Keep in mind that the customer / user details are fixed until the customer requests his or her initiative to make any changes.

As mentioned, two days ago we reported that in the past two weeks there has been a significant increase of between 2,600 and 5,000 cyber attacks, many of them under the pretense of Netflix, even around the Corona issue. According to Check Point, 84 percent of these attacks were made through phishing - hackers impersonate an existing site under a different address and entice the victim to enter credit or paypal information.

The Netflix brand, which became especially popular during this period, has become more usable by hackers. Check Point has doubled the number of phishing sites using the brand name. Most of them have been registered in recent months and some actually contain the brand name along with the corona netflixcovid19s \ .com.

Corona-related attacks are defined as attacks that include sites containing the terms corona / covid in their domain, emails containing malicious files containing the term corona in the file name, and malicious files sent in emails that have the virus-related content.

Source: israelhayom

All tech articles on 2020-04-04

You may like

Trends 24h

Latest

© Communities 2019 - Privacy

The information on this site is from external sources that are not under our control.
The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.