Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Scammers Hijack Netflix, Apple, BofA Sites with Fake Support Numbers

by Jane Doe
June 21, 2025
in Cyber
A A
0
Share on FacebookShare on Twitter

A sophisticated new scam is targeting users of popular services like Netflix, Apple, and Bank of America, manipulating search results to display fake support numbers directly on the companies’ legitimate websites.

This deceptive tactic, dubbed “search parameter injection” or “reflected input vulnerability,” tricks unsuspecting individuals into calling scammers who then attempt to steal personal and financial information.

Cybersecurity firm Malwarebytes recently highlighted this alarming trend, explaining how fraudsters are leveraging paid Google ads. When a user searches for customer support, for example, “24/7 Netflix support,” a sponsored ad appears among the top results.

Clicking this ad does lead to the actual company website, but with a crucial difference: a fake support number is pre-populated in the site’s search bar or prominently displayed on the help page.

Read Also

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

Black Hat SEO Poisoning Search Engine Results For AI

The danger lies in the legitimacy of the URL. Because the browser’s address bar shows the authentic domain (e.g., netflix.com, apple.com), users are lulled into a false sense of security, believing they are on a genuine support page. However, the seemingly official phone number on display is controlled by the scammers.

Once a victim calls the fraudulent number, the scammers, posing as legitimate customer service representatives, employ various social engineering tactics. Their goal is to coax individuals into divulging sensitive data like login credentials, bank account details, or even to grant remote access to their computers. For financial institutions like Bank of America, the objective is often to drain the victim’s accounts.

Experts advise extreme caution. Red flags to watch out for include phone numbers embedded directly in the URL, suspicious search terms like “Call Now” or “Emergency Support” in the address bar, and an abundance of encoded characters (like %20 or %2B) in the link. Additionally, if a website displays search results before you’ve even typed a query, or uses urgent language to pressure you, it’s a strong indicator of a scam.

To protect yourself, always navigate directly to the official website of the company you wish to contact, rather than relying on search results or ads. Verify contact information through trusted sources, such as official company communications or their main website’s contact page.

Remember, legitimate support desks will rarely ask for your full login credentials or direct access to your computer for routine issues. Staying vigilant and informed is key to safeguarding your digital and financial security against these evolving threats.

Jane Doe

You May Also Likes!

Iranian-backed hackers go to work after U.S. strikes
Cyber

Cyber is now the third-largest economy in the world – June 2025 Report

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

DHS warns of heightened cyber threat as US enters Iran conflict

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Leak of data belonging to 7.4 million Paraguayans traced back to infostealers

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Billions of login credentials have been leaked online, Cybernews researchers say

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Global cyber alert: Iranian hackers strike U.S. banks, defence and oil firms

by Jane Doe
June 25, 2025
Load More

Recommended

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

June 5, 2025
AI Security Risks Are Not Theoretical: They’re Happening Now

AI Security Risks Are Not Theoretical: They’re Happening Now

May 27, 2025
New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

May 31, 2025
Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Iranian-backed hackers go to work after U.S. strikes

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Black Hat SEO Poisoning Search Engine Results For AI

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Cyber is now the third-largest economy in the world – June 2025 Report

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

DHS warns of heightened cyber threat as US enters Iran conflict

June 25, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.