Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number

Posted on June 24, 2025June 24, 2025 By CWS

Abstract
1. Scammers inject pretend cellphone numbers into official firm web sites (Netflix, Microsoft, Financial institution of America) utilizing malicious URL parameters.
2. Cybercriminals purchase Google adverts resulting in actual web sites with encoded URLs that exploit search vulnerabilities to show fraudulent contact info.
3. Victims see genuine firm URLs and layouts, making pretend numbers seem as official search outcomes.
4. Keep away from calling numbers present in URLs, and confirm contact information by official channels.

A classy rip-off operation focusing on main American corporations, together with Netflix, Microsoft, and Financial institution of America, the place attackers manipulate official web sites to show fraudulent cellphone numbers. 

The assault, technically categorized as a search parameter injection assault, exploits vulnerabilities in web site search functionalities to embed scammer-controlled contact info immediately onto official firm pages. 

This technique proves notably harmful as a result of victims see the genuine firm URL of their browser tackle bar whereas unknowingly viewing malicious content material, making the rip-off practically unattainable to detect with out specialised safety instruments.

Search Parameter Injection Assault

Malwarebytes studies that the scammers orchestrate their assaults by a multi-step course of starting with sponsored search outcomes on Google. 

Cybercriminals buy ads that seem to signify official manufacturers, directing customers to what seems to be official assist pages. 

Nevertheless, these hyperlinks include malicious URL parameters that exploit mirrored enter vulnerabilities within the goal web sites’ search performance.

When victims click on these poisoned hyperlinks, they land on real firm web sites—Netflix, Microsoft, Financial institution of America, PayPal, Apple, Fb, and HP—however with a vital distinction. 

The attackers craft URLs containing encoded characters like %20 (representing areas) and %2B (representing plus indicators) together with their fraudulent cellphone numbers. 

These parameters manipulate the location’s search outcomes to prominently show the scammer’s contact info as an alternative of official assist numbers.

Netflix Search Outcomes

The Netflix instance demonstrates how attackers embed pretend cellphone numbers immediately into the search outcomes show, making it seem as if the fraudulent quantity is an official search outcome from Netflix’s personal system. 

This URL manipulation approach bypasses conventional safety measures as a result of the sufferer stays on the genuine web site all through the complete course of.

The success of those assaults depends on web sites’ failure to correctly sanitize search question parameters. When customers enter search phrases, many company web sites merely mirror no matter knowledge seems within the URL with out ample validation. 

Apple Rip-off

This creates a mirrored enter vulnerability that scammers exploit to inject their malicious content material.

The encoded characters within the URLs serve a twin function: they assist bypass primary safety filters whereas guaranteeing the malicious cellphone numbers show accurately on the goal web sites.

As an illustration, the %20 encoding permits areas in cellphone numbers to render correctly, whereas %2B ensures plus indicators seem accurately in worldwide cellphone quantity codecs.

Customers ought to look ahead to crimson flags, together with cellphone numbers showing in URLs, suspicious search phrases like “Name Now” or “Emergency Assist” within the browser tackle bar, and extreme encoded characters alongside cellphone numbers.

Earlier than calling any assist quantity discovered by search outcomes, customers ought to confirm the contact info by official firm communications or social media channels to make sure authenticity and keep away from falling sufferer to those subtle scams.

Stay Credential Theft Assault Unmask & Prompt Protection – Free Webinar

Cyber Security News Tags:Facebook, Fake, Hijacked, Insert, Microsoft, Netflix, Number, Phone

Post navigation

Previous Post: Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
Next Post: 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Related Posts

CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild Cyber Security News
Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly Cyber Security News
Building a Cyber-Resilient Organization CISOs Roadmap Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking
  • New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox
  • Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets
  • Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email
  • 5,000+ Fake Online Pharmacies Websites Selling Counterfeit Medicines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking
  • New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox
  • Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets
  • Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email
  • 5,000+ Fake Online Pharmacies Websites Selling Counterfeit Medicines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News