Previous  bell    Next
bell Warning: JavaScript is turned off! Some features on this website will not work without it.

Malicious Facebook and Social Networking Website Video Post Tagging Scams

Cyber-criminals are currently posting fake video posts like the one below on social networking websites, especially Facebook, with the intention of tricking online users into signing up for premium phone services, downloading and installing Trojan horses and other malware, which they will use to hijack the victims’ computers. They may steal the victims’ important documents, user names, passwords, personal and financial information by remotely accessing the victims' computers from anywhere around the world, once the victims have installed the malicious program or software that they were tricked into downloading and installing.
Malicious Facebook and Social Networking Website Video Post Tagging Scams
Online Threat Alerts

Malicious Facebook and Social Networking Website Video Post Tagging Scams


Rating - Thumb up Rating - Thumb down 0   
Malicious Facebook and Social Networking Website Video Post Tagging Scams

Cyber-criminals are currently posting fake video posts like the one below on social networking websites, especially Facebook, with the intention of tricking online users into signing up for premium phone services, downloading and installing Trojan horses and other malware, which they will use to hijack the victims’ computers. They may steal the victims’ important documents, user names, passwords, personal and financial information by remotely accessing the victims' computers from anywhere around the world, once the victims have installed the malicious program or software that they were tricked into downloading and installing.

Please continue reading below.

With the victims' information, the cyber-criminals will be able to access their online bank and other online accounts, and steal their money. They may also use the accounts to do other fraudulent activities.

One of the Malicious Video Tagging Scams

Girl On Beach in Bathing Suit

Once the users tag and click on the video scam thinking they will be able to watch it, they will be taken to a malicious website that will detect the operating system that they are using and redirect them to a website that is able to take advantage of it. Remember, there is no video.

In the example below, the scam is attempting to trick an online user into installing a Trojan horse or malicious computer program, by claiming that the user cannot watch the video unless they install Adobe Flash Player.

Fake Adobe Flash Player Download and Update

Fake YouTube  Flash Player Update or Download

Unfortunately, the video can not be opened..
Please Update the Adobe Flash Player.. Please Run the installFlashPlayer.exe
After the installation is complete and try again!..

The user, wanting to watch the video, will click on the link, thinking he/she is installing Adobe Flash Player. But, the user will only download a malicious program disguised as Adobe Flash Player that will infect his/her computer with Trojan horse that will open a back door on the user's computer for cyber-criminals to gain access to it from anywhere around the world.

Remember, never click on a link to install Adobe Flash Player, always go directly to Adobe's website at http://get.adobe.com/flashplayer/ to update it instead.

If Adobe’s Flash Player website states that your computer already has the latest version of Flash Player installed, and a website is still asking you to click on a link to update, the website should not be trusted.

This article is related the following:

Remember to leave your comment and read the ones made by others below. And, please report malicious, phishing or scam email messages, social media posts and websites to us. You may click here to contact us, or forward the email messages to: info@onlinethreatalerts.com .

Alert and help your family and friends by sharing this article with them:
Submit Your Comment or Question

Submit your comment or question in the box below to share what you know or to get answers about this article.

CommentComments or Questions (0)