Connect with us

Hi, what are you looking for?

HEADLINES

Game of Thrones final season: Episode 3 was top target for cyber-threats

The eighth and final season of Game of Thrones saw a spike in related cybercriminal activity, according to Kaspersky Lab researchers.

The premiere of each episode was accompanied by a long tail of attacks targeting users who were trying to download the newly released episode. Instead of getting the latest episode, fans received malware disguised behind the name of the show.

Some episodes proved significantly more toxic than others, with the third episode triggering the highest number of detected attempts to attack users, reaching 3,000 attacks a day at its peak.

Experts expect the release of the concluding episode to attract further attacks from scammers as malware distributors start offering potential viewers access to the complete season.

Overall, after tracking associated malicious activity through the entire eighth season, Kaspersky lab researchers have found that the average daily number of attacks on users that involved malware disguised as an episode of Game of Thrones, was around 300-400. This number jumped to around 1,200 for the three to four days following the release of each new episode: a three to four-fold increase in malicious activity.

Advertisement. Scroll to continue reading.

Another attack vector associated with Game of Thrones is streaming-websites that invite users to watch newly released Game of Thrones episodes for free, but which are actually designed to extract sensitive data from users.  

Typically, the online-player icon shows a scene from the TV show and redirects the victim to a registration page, later asking for bank card details with the CVC/CVV-code, claiming it is only for validation purposes.

Researchers have pointed out the similarities between this scheme and recent scams surrounding the latest Avengers movie.

“We see shared TTPs (tactics, techniques and procedures) across the phishing websites where scammers try to steal users’ details by promising a pirated movie before its official premiere. We believe there is a certain group of threat actors that methodically hunts fans of popular movies and TV productions, adjusting schemes dynamically according to pop-cultural happenings,” said Tatyana Sidorina, security researcher at Kaspersky Lab.

To avoid falling victim to scammers:

Advertisement. Scroll to continue reading.

• Avoid questionable websites, especially the ones that distribute pirated content.

• Don’t enter any information — especially credit card details — on a website you have no reason to trust.

• Do not use the same password for different web pages. Use a password manager instead.

• Use reliable antivirus software with protection from online scams and phishing.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

PRSP is a staunch advocate of communication based on honesty and integrity. While our role is to uphold and strengthen the reputation of our...

HEADLINES

Poor password management is compounded by a reliance on common combinations of names, dictionary words and numerals. Not only are these passwords relatively easy...

White Papers

This demonstrates that despite a slight improvement from last year, cybersecurity preparedness remains low as hyperconnectivity and AI introduce new complexities for security practitioners.

HEADLINES

Amplifying this risk is the increasing use of artificial intelligence (AI), which introduces new levels of realism and precision that demand heightened vigilance, especially...

HEADLINES

#BeCyberSmart is the PLDT Group’s umbrella campaign for cybersecurity awareness aimed at promoting vigilance against scams, digital hygiene and responsible online behavior, especially among...

HEADLINES

According to a new report from Kaspersky GReAT (Global Research and Analysis Team), the attackers targeted at least six organizations across the software, IT,...

White Papers

Among the primary risks are inadequate security measures and insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT...

HEADLINES

The campaigns show attackers are capitalizing on people’s increasing familiarity with completing multiple authentication steps online – a trend HP calls ‘click tolerance’. 

Advertisement