Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams 

Posted on June 24, 2025June 24, 2025 By CWS

Tech assist scammers are leveraging an unsophisticated however environment friendly methodology to trick unsuspecting customers into calling them, by ‘hacking’ the web sites of main firms to show the scammers’ cellphone quantity.

The marketing campaign, analyzed by antimalware agency Malwarebytes, entails the usage of sponsored adverts on Google. The attackers pay for adverts that time individuals who search for 24/7 assist to the websites of firms reminiscent of Apple, Microsoft, HP, Fb, Netflix, Financial institution of America, and PayPal.

Nevertheless, in contrast to in different campaigns involving sponsored adverts, the cybercriminals usually are not attempting to lure customers to pretend web sites set as much as mimic those of the focused firms.

As an alternative, the sponsored hyperlinks level to the professional web site, particularly assist middle, assist or store pages that embrace search performance. 

The URLs of those pages have been crafted in a method that triggers what Malwarebytes calls search parameter injection, inflicting the web page to show the tech assist rip-off cellphone quantity within the search bar or search outcomes.

“The browser tackle bar will present that of the professional website and so there’s no purpose for suspicion. Nevertheless, the knowledge the customer sees might be deceptive, as a result of the search outcomes have been poisoned to show the scammer’s quantity prominently in what seems like an official search outcome,” defined Malwarebytes Senior Director of Analysis Jerome Segura.

“As soon as the quantity is named, the scammers will pose because the model with the intention of getting their sufferer at hand over private knowledge or card particulars, and even enable distant entry to their pc. Within the case of Financial institution of America or PayPal, the scammers need entry to their sufferer’s monetary account to allow them to empty it of cash,” Segura added.

In among the examples seen by Malwarebytes, it’s simpler to find out that the scammers’ cellphone quantity is displayed as a search outcome, making it much less seemingly for customers to fall for it. Commercial. Scroll to proceed studying.

Within the case of the web sites of firms reminiscent of Apple and Netflix, it’s much less clear that the tech assist rip-off quantity doesn’t belong on the web page.

Associated: Why Scamming Can’t Be Stopped—However It Can Be Managed

Associated: How Scammers Are Utilizing AI to Steal School Monetary Support

Associated: Tech Help Companies Comply with $26M FTC Settlement Over Faux Providers

Security Week News Tags:Apple, Hacked, Microsoft, Netflix, Scams, Sites, Support, Tech

Post navigation

Previous Post: WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File
Next Post: APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

Related Posts

Czech Government Condemns Chinese Hack on Critical Infrastructure Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA Security Week News
Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials Security Week News
Critical OpenPGP.js Vulnerability Allows Spoofing Security Week News
Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications Security Week News
Cisco Warns of Hardcoded Credentials in Enterprise Software Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News