This article has been created in order to explain to you what is the Spotify Phishing Scam and how you can remove them as well as all potentially unwanted programs delivered through them.
The Spotify Phishing Scam is a popular malware tactic that attempts to manipulate computer users into infecting themselves with viruses or disclosing their passwords. At the moment we do not have information about the perpetrators behind it. Our article gives an in-depth explanation of how it propagates and how victims can attempt to remove active infections.
|Name||Spotify Phishing Scam|
|Type||Phishing email scam|
|Short Description||The Spotify Phishing Scam is a recent example of the scam tactic that extorts the targets into interacting with a scam site.|
|Symptoms||Victims will receive email messages that contain the phishing instructions.|
|Distribution Method||Various, including the most popular methods.|
|Detection Tool|| See If Your System Has Been Affected by Spotify Phishing Scam |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Spotify Phishing Scam.|
February 2020 Update — Mobile Spotify Scams
In February 2020 security experts came across multiple occasions where a new type of Spotify scams. The unknown hacking group who is behind this tactic has designed almost identical looking pages which the Spotify app shows to its users. They are hosted on various domains and sites which may appear as legitimate and safe sounding. The main tactic is to fake an error payment page showing the familiar “We’re sad to see you go” notification. The message will read that an user subscription payment has not executed properly and as such their premium subscription will be paused. To fix the issue the page will direct the users into clicking on a “Get Premium” button. In most cases this will redirect them to a hacker-controlled payment page. If the victims enter in their payment card details they will be presented to the hackers.
News About The December 2019 Spotify Phishing Attacks
In December 2019 several attacks bearing Spotify as the impersonated service have continued to be spread. This time the target users are manipulated into accessing malicious contents via fake payment related notifications. The primary distribution strategy is the sending of email messages in large quantities and designed to look like real notifications. The subject line which has been used in this attack is “Your payment didn’t go through” and it will manipulate the victims into thinking that they have issues regarding a payment made to the streaming service. The users are manipulated into opening a redirect URL that will present a page that will present an account login page. These sites are usually hosted on domain names that sound very similar to the real Spotify service and may include signed security certificates.
When the users enter in their information another screen will be presented asking for their payment card information. All user input will be transmitted in real time to the hackers and if they click on the final page an error page will be displayed.
Spotify Phishing Scam – Distribution Ways
A global Spotify phishing scam has been detected in November 2018 aiming to infect as many users as possible. The primary method of infection is the use of phishing email messages that are distributed in bulk. The criminals behind it have customized them to appear as being sent by Spotify themselves. The aim of the attackers is to convince the victims into thinking that the email notification originates from the company. The body contents are designed using the text layout, images and text that are attributed to Spotify. The target users will be coerced to click on a link that asks them to “verify” their accounts. Upon clicking on them they will be redirected to a scam landing page. If any account credentials are entered there they will be automatically transferred to the hacker operators.
A related strategy is the creation of fake Spotify pages that share similar-sounding domain names or containing elements that contain the service’s name. They may also spoof security credentials, company locations or even add links to legitimate Spotify pages.
We remind our readers that scams like this can also be attributed to the inclusion of such redirect code in infected payload carriers. There are two primary types:
- Infected Documents — The criminals behind the phishing attack can insert macros and scripts into documents of all popular types: spreadsheets, presentations, databases and text files. When they are opened by the users a prompt will appear asking them to enable the interactive content. If this is done the macros will be instructed into showing the phishing scam landing page. It can be spawned directly in the contents of the document or opened in a browser window.
- Malware Application Setup Files — Malicious applications can redirect the victims to the landing pages following the successful completion of the setup procedure. They are made by taking the legitimate installers from their official vendor download pages or portals. The hackers typically target applications that are popular with end users: system utilities, optimizers, creativity solutions or productivity software.
All infected payload carriers may be distributed via file-sharing networks like BitTorrent as they are popular places where both legitimate and pirate content is found.
Mass deployment of the Spotify phishing scam may also be organized by the use of browser hijackers — malicious web browser plugins which are made compatible with the most popular applications. They are frequently uploaded to their respective repositories using fake user reviews and/or developer credentials. The target users are promised feature additions or enhancements. Whenever they are installed the browser settings will be changed to reflect the redirect.
Spotify Phishing Scam – In-Depth Overview
Upon receiving Spotify phishing scam landing page the users will be coerced into entering their account credentials. If this is done they will be automatically transferred over to the hacker operators. And while most of the detected scams do use contents taken from the legitimate Spotify web site and notifications there are always elements that cannot be copied such as the security certificates and exact URL address.
The basic premises of such threats are to hijack the account data belonging to the victims. The current campaigns relies on a social engineering tactic that manipulates the users into “confirming” their account. A fake message is displayed that notifies the victims that their accounts have been placed under restrictions due to suspicious activity. In order to confirm their accounts the users will need to click on the shown “Confirm Account” button. This is the button that redirects the users to the phishing landing page.
There are several possible outcomes of the stolen credentials:
- Account Theft — The criminals will hijack the target accounts and access all user information available therein.
- Credentials Sale — The hackers may place the stolen in large databases that are then sold to various buyers: marketing agencies or other malicious users.
- Blackmail — The use of the Spotify credentials for blackmail purposes can be done at a later date.
Its important to note that the successful theft of account information from Spotify may lead to information harvesting of other services. Spotify is frequently linked to social networks like Facebook and this can be used as a means to acquire information from those sources as well. Furthermore personal information that are available can be used during a password reset procedure. This can allow the users to acquire other user accounts as well.
Spotify Phishing Scam — iPhone Users Attack
A separate phishing attack targeting iPhone users and related to the Spotify scam was reported in a security bulletin. It uses an email-based approach to send bulk messages in a SPAM-like manner. The messages are crafted to appear as being sent by Spotify and are designed as a purchase notification. The message will read that the user has purchased a subscription package for a whole year. To cancel or review the purchase the users are redirected to a phishing scam landing page.
We have received reports that the phishing messages are also spread on social networks and online communities. It is possible that this is done via hacked accounts or hijacked accounts.
Spotify Phishing Scam — Scam Spotify Account Sale
A smaller attack campaign utilizing Spotify related phishing scams was identified on Twitter. The criminal collective behind it is using both fake and hijacked accounts to spread the messages. In them the accounts advertise premium packages for Spotify and Netflix services. If the users contact them for the offer the accounts will require details for the purchase. As soon as the information is provided the hacker operators will it for various crimes — identity theft and financial abuse for example.
“Your Subscription is under review” Spotify Email Scam
A separate email campaign is being used to coerce the users into interacting with a fake Spotify landing page. The messages are designed to appear as being sent by the company. The hacker operators have hijacked the text design and use a generic non-personalized message informing the targets that their subscription is “under review”. A link that leads to the fake login page will be presented to the victims. If they enter in their account information they will be forwarded to the operators immediately.
Remove Spotify Phishing Scam from Windows and Your Browser
If you want to remove the Spotify Phishing Scam from your computer, we strongly suggest that you follow the removal instructions posted underneath this article. They have been created with the main idea In mind to help you delete this virus either manually or automatically. Be advised that according to experts the best way to try and remove the software that is causing the Spotify Phishing Scamming pop-ups is to use an advanced anti-malware software. Such program is created with the idea in mind to fully scan your computer and try to eliminate any traces of unwanted programs while protecting your computer against future infections as well.