Connect with us

Hi, what are you looking for?

HEADLINES

Fake movie-streaming sites are cybercrime baits

Trend Micro Incorporated has found over 1,500 fake streaming sites that took advantage of recent summer box office hits. The top two movie titles used to entice users to these fake sites were “Man of Steel” and “Fast and the Furious 6”, which jointly accounted for almost half of the links tracked by Trend Micro.

Trend Micro Incorporated  has found over 1,500 fake streaming sites that took advantage of recent summer box office hits. In its analysis of data collected from late April to the end of June (2013), the attackers drive users to the fake streaming pages through various social media sites, leading users to download suspicious video players, sign up for streaming sites, or take surveys that will generate financial gain for the scammers.

The finding also revealed the top two movie titles used to entice users to these fake sites were “Man of Steel” and “Fast and the Furious 6”, which jointly accounted for almost half of the links tracked by Trend Micro.

Trend Micro had detected some of these fake streaming sites before the movies were released in theaters.

“Summer blockbusters like ‘Man of Steel’ are typical cybercrime baits because they have been effective in tricking users into visiting shady websites. Be wary of sharing posts and clicking links that could propagate these scams,” said Paul Oliveria, Security Focus lead of Trend Labs, Trend Micro Incorporated. “As these movies have just been released, copies that are supposedly being streamed online are either fake or pirated, the latter of which is, by itself, risky and illegal.”

Advertisement. Scroll to continue reading.

Targeting unsuspecting fans and film enthusiasts, the attackers use various social media sites, such as Facebook, Google+, Youtube and LinkedIn, to bring users to the fake streaming pages, many of which are hosted on Tumblr, WordPress, Blogger or other blogging services.

Based on TrendLabs’ analysis, “Man of Steel”, “Fast and the Furious 6” and “Iron Man 3” got the highest number of viewers. Many of the common keywords used were expected, such as “watch”, “online”, and “free”. One of the more surprising keywords was “putlocker”, which refers to a UK-based file locker. In terms of countries involved, while the United States accounted for more than two-thirds of the traffic to these sites, other countries were also represented.

Trend Micro Smart Protection Network already blocks the URLs related to these fake streaming sites. The Trend Micro Smart Protection Network cloud data mining framework rapidly and accurately identifies new threats, delivering global threat intelligence to all its products and services. Ongoing advances in the depth and breadth of the Smart Protection Network allow Trend Micro to look in more places for threat data, and respond to new threats more effectively, to secure data wherever it resides.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

Advertisement