Attackers are stealing users’ Netflix credentials and making them available on black markets focused on providing access to the streaming service for cheaper prices, according to cybersecurity specialist Symantec.
Writing in the Company Blog, Lionel Payet, Threat Intelligence Officer, notes that the entertainment streaming service’s growing popularity and global expansion has attracted the attention of attackers. “We have observed malware and phishing campaigns targeting Netflix users’ information. The details are then added to a growing black market that claims to provide cheaper access to the service,” he advises.
According to Payet, one malware campaign involves malicious files posing as Netflix software on compromised computers’ desktops. The files are downloaders that, once executed, open the Netflix home page as a decoy and secretly download Infostealer.Banload. Banload steals banking information from the affected computer. The Trojan has primarily been used in Brazil.
“The Netflix-disguised files aren’t dropped through drive-by downloads. Instead, the files are most likely downloaded by users who may have been tricked by fake advertisements or offers of free or cheaper access to Netflix,” he suggests.
Aside from delivering malware, attackers may target Netflix users by attempting to steal their login credentials through phishing campaigns. “Netflix subscriptions allow between one and four users on the same account. This means that an attacker could piggyback on a user’s subscription without their knowledge,” he notes.
In these phishing campaigns, attackers redirect users to a fake Netflix website to trick users into providing their login credentials, personal information, and payment cards details. According to Payet, these tactics are not uncommon; cybercriminals are still using them on a daily basis.
Symantec observed one Netflix phishing campaign on January 21 which was crafted for Danish users. The phishing email tried to trick users into believing that their Netflix account needed to be updated, as there was an issue with their monthly payment. The emails were sent from netflix@fakt[REDACTED].com with the subject “Opdater Betalingsinformation”. Payet notes that the site that the email linked to is no longer active.
“Both malware and phishing campaigns help attackers gather the credentials needed to break into victims’ Netflix accounts. But the attackers may not just keep this access for themselves. There is an underground economy targeting users who wish to access Netflix for free or a reduced price. The products could even allow customers to open their own illegal store,” he warns.
According to Payet, the most common offers are for existing Netflix accounts. These accounts either provide a month of viewing or give full access to the premium service. In most advertisements for these services, the seller asks the buyer not to change any information on the accounts, such as the password, as it may render them unusable. This is because a password change would alert the user who had their account stolen of the compromise.
Another offering includes Netflix account generators. The accounts created through these tools may come from stolen Netflix subscriptions or payment card details. The generators’ creators regularly update their databases with new accounts and disable ones that don’t work anymore. Buyers can use this software for themselves or resell the generated accounts on the black market.
In terms of protection, Symantec advises users to only download the Netflix application from official sources. Additionally, users should not take advantage of services that appear to offer Netflix for free or a reduced price, as they may contain malicious files or steal data.