{"id":5823,"date":"2015-06-04T05:25:44","date_gmt":"2015-06-04T09:25:44","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5823"},"modified":"2019-11-22T10:13:59","modified_gmt":"2019-11-22T10:13:59","slug":"multi-stage-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/multi-stage-phishing\/5823\/","title":{"rendered":"Multi-stage phishing that starts with real links"},"content":{"rendered":"<p>Recently Kaspersky Lab experts have found a shifty method that allows fraudsters steal personal information without access to user\u2019s login and password. The criminals don\u2019t try to steal the victim\u2019s credential \u2014 they act much smarter instead.<\/p>\n<p>Victims receive email letters with request to follow the link to an official service and enter a new password; otherwise their account would be blocked. Surprisingly, the link actually leads to the developer\u2019s website \u2014 for example, to the Windows Live website.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2017\/03\/05192707\/image001.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5825\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2017\/03\/05192707\/image001.png\" alt=\"image001\" width=\"1011\" height=\"488\"><\/a><\/p>\n<p>After authorization the victim receives a request for a range of permissions from an unknown application. Among other this range can include automatic login, access to profile information, contact list and the list of e-mail addresses. By assigning these rights we open access to our personal information to cyber criminals.<\/p>\n<p>Then, unknown individuals secretly gather the information, presumably for fraudulent purposes. For example, they can use it to distribute spam or <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">links leading to phishing or malicious sites<\/a>.<\/p>\n<p><strong>How it works?<\/strong><\/p>\n<p>There is a useful but not perfectly secure protocol for authorization called OAuth, which allows users to open the limited access to their protected resources (contact lists, agenda and other personal information) without sharing their credentials. It is commonly used by applications for social networks if they need, e.g. access to users\u2019 contact lists.<\/p>\n<p>As apps for social networks also use OAuth, <a href=\"https:\/\/www.kaspersky.com\/blog\/avoid-phishing-facebook\/\" target=\"_blank\" rel=\"noopener nofollow\">your Facebook account is not in safety as well<\/a>. A malicious app can use access to user\u2019s account to send spam and malicious files, as well as phishing links.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">7 simple steps to avoiding Facebook <a href=\"https:\/\/twitter.com\/hashtag\/phishing?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#phishing<\/a> attempts \u2013 <a href=\"https:\/\/t.co\/Qj68bST6HQ\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/Qj68bST6HQ<\/a> <a href=\"http:\/\/t.co\/V6rinEa2jI\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/V6rinEa2jI<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/591696979945791489?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 24, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>It has been a year since the leaky nature of OAuth was revealed. In the beginning of 2014 <a href=\"http:\/\/tetraph.com\/covert_redirect\/oauth2_openid_covert_redirect.html\" target=\"_blank\" rel=\"noopener nofollow\">a student from Singapore had described possible techniques<\/a> for stealing user data after authentication. However, this is the first time we see a phishing campaign used to put these techniques into practice.<\/p>\n<p><strong>What you can do to stay protected:<\/strong><\/p>\n<ul>\n<li>do not follow links received by e-mail or in private messages on social networks;<\/li>\n<li>do not allow applications that you do not trust to access your data;<\/li>\n<li>before you agree, carefully read the descriptions of the account access rights requested by the application;<\/li>\n<li>read user reviews and feedbacks on the application on the Internet;<\/li>\n<li>you can also view and cancel the rights of currently installed applications in account\/profile settings of any social networking site or web service. We strongly recommend you to make this list as short as possible.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.<\/p>\n","protected":false},"author":40,"featured_media":5824,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[80,553,187,363,76,43,192,97,98,529,131],"class_list":{"0":"post-5823","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-fraud","10":"tag-news-2","11":"tag-passwords","12":"tag-personal-data","13":"tag-phishing","14":"tag-privacy","15":"tag-protection","16":"tag-security-2","17":"tag-social-networks","18":"tag-threats","19":"tag-tips"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/multi-stage-phishing\/5823\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/multi-stage-phishing\/4888\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/multi-stage-phishing\/3411\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/multi-stage-phishing\/5383\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/multi-stage-phishing\/6196\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/multi-stage-phishing\/6139\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/multi-stage-phishing\/7970\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/multi-stage-phishing\/8893\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/multi-stage-phishing\/4572\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/multi-stage-phishing\/5363\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/multi-stage-phishing\/7792\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/multi-stage-phishing\/7970\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/multi-stage-phishing\/8893\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/multi-stage-phishing\/8893\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5823"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5823\/revisions"}],"predecessor-version":[{"id":17909,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5823\/revisions\/17909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5824"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}