Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/30/2017
02:45 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

Netflix Scam Spreads Ransomware

A program found on suspicious websites aims to trick Windows/PC users into creating fake Netflix logins so it can deliver ransomware.

A newly discovered threat aims to steal Netflix user credentials and hold them hostage, according to researchers at Trend Micro.

Netflix has 93 million subscribers in more than 190 countries. It's a popular app, but many people aren't willing to pay the monthly subscription fee. They'll try to bypass the cost and watch content for free - and cybercriminals are now taking advantage of them.

This newly detected ransomware, RANSOM_NETIX.A, aims to trick Windows PC users with a login generator typically used for software and account membership piracy. This type of program is found on malicious websites promising access to paid Web-based services.

How does it work? Victims click a "Generate Login" button to kick-start the encryption process. The ransomware uses fake login prompts as a distraction while it encrypts 39 file types under the C:\Users directory.

The program then demands $100 in Bitcoin from victims. While it targets Windows users, it's worth noting the ransomware destroys itself on systems not running Windows 7 or Windows 10.

Netflix, with its massive user base, presents a tempting opportunity for hackers to exploit vulnerabilities, infect systems to steal user data, and monetize data on the dark Web. Stolen credentials can be used to bargain among criminals or trick victims into installing malware, which can generate profit.

"We regularly see threat actors utilize popular apps or services as a lure to get victims to infect themselves," explains Jon Clay, global director of threat communications at Trend Micro. "Also, by using imagery that is similar to the real vendor's imagery, [criminals] trick the victim into thinking it's real."

Clay says this discovery marks a continuation of 2016 ransomware trends, which included the creation of new tactics to generate more victims. After seeing nearly 750% growth in new ransomware families in 2016, Trend Micro predicted 25% growth in new families for 2017.

The Netflix scam carries implications for how ransomware will evolve later in the year.

"We will likely see other popular vendors targeted with their brands, especially if the actors behind [the Netflix scam] find success," he continues. "They will use this tactic again with other vendors."

This is a wake-up call for potential victims to protect their accounts. Best practices include regularly updating account credentials, employing two-factor authentication, limiting downloads to official sources, and being wary of illegitimate emails.

Businesses should educate their employees on how ransomware threats work, and how using legitimate brands in social engineering attacks can trick victims into making dangerous decisions. Employees should be aware that trying to obtain a free Netflix account is "bogus," says Clay, and should not be acted upon.

Social engineering is core to this type of scam, and users can protect themselves by avoiding downloads from sketchy websites or clicking suspicious ads. If a deal seems too good to be true, it typically is.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5604
PUBLISHED: 2020-07-09
Android App 'Mercari' (Japan version) prior to version 3.52.0 allows arbitrary method execution of a Java object by a remoto attacker via a Man-In-The-Middle attack by using Java Reflection API of JavaScript code on WebView.
CVE-2020-5974
PUBLISHED: 2020-07-08
NVIDIA JetPack SDK, version 4.2 and 4.3, contains a vulnerability in its installation scripts in which permissions are incorrectly set on certain directories, which can lead to escalation of privileges.
CVE-2020-15072
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An error-based SQL Injection vulnerability exists via the Import Administrators section.
CVE-2020-15073
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An XSS vulnerability occurs within the Import Administrators section via upload of an edited text document. This also affects the Subscriber Lists section.
CVE-2020-2034
PUBLISHED: 2020-07-08
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect...