• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49
  • The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69

    The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69
  • The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39

    The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39
  • The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59

    The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59
  • Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687

    Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Copyright infringement, add a link

Mar 16, 2023 by iHash Leave a Comment


E-mail scams come in all shapes and sizes, with new ones keep appearing every day. No wonder, since this has always been the easiest and cheapest way to con people online — even for attackers who lack technical skills. In fact, all they need is a smidgen of both cunning and imagination. Today, we look at a crafty and rather original scheme that targets employees working with content — and their fears of copyright infringement.

That’s copyrighted! Add a link to avoid penalties

One not-so-fine day, an employee receives an e-mail from what seems to be a law firm. In it, the recipient is accused of using an image belonging to the firm’s client in violation of copyright. There are also links to both the image and the page where the awful misdeed is being perpetrated. Both these links are quite real, so this part of the story is readily believable.

Most likely, the picture is a bog-standard stock image, and it’s hard to tell straight off whether it was purchased from the rightful owner or just downloaded on the fly. And the page where it’s posted probably hasn’t seen an update for a while. In short, if the e-mail recipient really wants to find out whether the picture was stolen — and who bears responsibility in such case, this will likely entail lots of back-and-forth correspondence with colleagues and a few not very pleasant meetings.

Scam involving SEO and copyright infringement

E-mail threatening penalties for copyright infringement unless the recipient adds a link on their site

However, after cowing the victim, the “law firm” is quick to propose a solution: its “client” won’t take action if, within five working days, the copyright owner is credited on the offending page with a link to the site given in the e-mail.

This is followed by a second round of browbeating: the e-mail senders state categorically that simply deleting the problematic image from the site is not an option. In this case, there will be blood; rather — a lawsuit. Moreover, they frame the threat in intimidating legalese. In particular, they mention the Digital Millennium Copyright Act, which does indeed cover such violations, but for some reason they refer to section 512(c) — defining the limitations on liability for online service providers — which of course has the interests of those providers in mind, not the other way round.

The attackers re-stress that deleting the image is not an option, kindly reminding the victim that a copy of the infringing page can be found in the Internet Archive and used as evidence in court.

The e-mail itself looks pretty official. The scammers took the time to add the real address of some building where the law firm supposedly representing the claimant supposedly has its office.

401 Congress Avenue, Austin, TX, USA

Skyscraper in downtown Austin, Texas, where the law firm is purportedly based

The domain names in the sender addresses also add credence through the use of fear-inducing words like “law” and “legal”. What’s more, the attackers don’t stay in one place, and constantly register new domains with similarly scary names.

How bad can it get?

By all appearances, the attackers’ goal is to get the victim to supply a “guilty” page with a backlink to the site they specify in the e-mail. Most likely, it’s part of some shady search engine optimization (SEO) business: the more owners of legit sites can be forced to host such links, the faster the sites of some clients they’re promoting will rise high in search results.

What’s so terrible about that, you might ask? Here’s what:

  • In the most innocent case, at the other end of the link there’s a fly-by-night site, which will disappear fairly soon. When that happens, the link on your site will point to a 404 page, which isn’t great for your SEO.
  • A worse scenario: the site you help to pull up turns out to be so problematic that it gets pessimized by search engines — together with all sites that are linked to it, including yours. Again, your SEO will get it in the neck (plenty more so than in the first case, above).
  • Finally, the most dangerous: the promoted site turns out to be phishing or malicious. In this case, you’ll send your site visitors or customers into the arms of cybercriminals. Be in no doubt that when search engines get round to blocking the malicious resource, your site will get a healthy dose of karma.

As such, there are no good options — only least bad, and no benefits to be had for your site at all. It means that the best solution is to ignore the e-mail and its ridiculous claims. To teach your employees how to react to e-mail scams — even the relatively innocent ones mentioned above, as well as far more dangerous kinds like BEC attacks, we recommend holding regular [Kaspersky ASAP placeholder]cybersecurity awareness trainings[/Kaspersky ASAP placeholder].





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: Add, copyright, infringement, Link

Special Offers

  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49
  • The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69

    The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69
  • The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39

    The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39
  • The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59

    The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59
  • Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687

    Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

How to restore information in an edited screenshot

How to restore information in an edited screenshot

Mar 28, 2023 By iHash

Acceldata and its Data Observability Platform – Solving Big Data Management Challenges

Mar 28, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware

Mar 29, 2023Ravie LakshmananCryptocurrency / Malware Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper malware designed to siphon cryptocurrencies since September 2022. “Clipboard injectors […] can be silent for years, show no network activity or any other signs of presence until the disastrous […]

Apple introduces Apple Pay Later

March 28, 2023 PRESS RELEASE Apple introduces Apple Pay Later to allow consumers to pay for purchases over time Apple Pay users can split purchases into four payments with zero interest and no fees CUPERTINO, CALIFORNIA Apple today introduced Apple Pay Later in the U.S. Designed with users’ financial health in mind, Apple Pay Later1 allows users […]

Stealthy DBatLoader Malware Loader Spreading Remcos RAT and Formbook in Europe

Mar 28, 2023Ravie LakshmananMalware Attack / Hacking A new phishing campaign has set its sights on European entities to distribute Remcos RAT and Formbook via a malware loader dubbed DBatLoader. “The malware payload is distributed through WordPress websites that have authorized SSL certificates, which is a common tactic used by threat actors to evade detection […]

The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39

Expires March 27, 2123 23:59 PST Buy now and get 94% off KEY FEATURES Are you tired of feeling stuck in a dead-end job or career? Are you ready to take control of your future and start enjoying the benefits of a fun, fulfilling, and lucrative Scrum career? This bestselling Scrum course will reveal how […]

Scale to Survive: How to Attract Investors in a Post-SVB World

The bigger they come, the harder they fall… unless the Federal Reserve steps in to bail them out. That was the good news for depositors in the now-defunct Silicon Valley Bank, which imploded in a brutal 48-hour run last week. But bond and stockholders lost their hats. The message to innovators is clear: If you […]

The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59

Expires March 27, 2123 23:59 PST Buy now and get 97% off Introduction to the Latest Artificial Intelligence Tools KEY FEATURES Whether you like it or not….artificial intelligence is here.​ It’s already changing the way we function in our personal lives (even if you might not realize it yet). And It’s already having a massive […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT