Friday, March 14, 2025
HomeMobile AttacksWhatsApp scam - Advertising Netflix Subscription free for a year

WhatsApp scam – Advertising Netflix Subscription free for a year

Published on

SIEM as a Service

Follow Us on Google News

[jpshare]These days it winds up plainly normal as we see a huge increase with Scam message in Whatsapp, here is another WhatsApp scam – Advertising Netflix Subscription free for a year.

For this new Whatsapp trick, fraudsters are utilizing this outstanding TV mark as the trap to spread the attack.

Initial Scam Message

If you have received the message even from a reliable contact don’t click or don’t share the link.

The message has all the earmarks of being from Netflix, however, have close look it demonstrates a shortened URL which takes clients to different sites not identified as Netflix.

Also, the image appears in different languages Spanish, English, and Portuguese.

WhatsApp scam - Advertising Netflix Subscription
Spanish
WhatsApp scam - Advertising Netflix Subscription
English
WhatsApp scam - Advertising Netflix Subscription
Portuguese

Multilingual Fake page

User’s on clicking the link will take to the page that not belongs to Netflix as like the malicious URL the multilingual.

Another inquisitive truth is that the page has the ability to recognize the language of the device and can change its language consequently.

This malicious page guarantees that if the request was sent to 10 individuals then Netflix service will be accessible free for a year.

The victim is redirected to pages that falsely claim that they are on the “last stride” to accomplish enactment when is truly happening that they are taking information from clients according to ESET blog post.

Mitigations

  • If you already shared with anyone, ESET advising users to contact them and let them know about the incident.
  • Did you provide your telephone number? Check wit your service provider that you are not added to any premium service.
  • If any application downloaded from the URL, uninstall them immediately.

Also Read

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Released Secure Mobile Communication Best Practices – 2025

The Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to...

Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay

Threat actors are exploiting a new cash-out tactic called "Ghost Tap" to siphon funds...

HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data

The HookBot malware family employs overlay attacks to trick users into revealing sensitive information...