Feeds

Survey scammers target Doctor Who fans

Fake video clip shenanigans

Using blade systems to cut costs and sharpen efficiencies

Surfers following up supposed online excerpts from the eagerly-awaited mid-season finale of Doctor Who will only find themselves stuck in the middle of survey scams, security researchers warn.

Searching from the upcoming episode A good man goes to war on YouTube leads to numerous results but all lead to third party websites, under the pretext that the clip is too long to be loaded onto YouTube.

Surfers going to these sites are told they need to complete a survey in order to unlock the supposed (non-existent) content. At best it's a waste of time; at worst the surveys might trick marks into handing over personal information or signing up for expensive subscription-based mobile services of dubious utility, such as daily horoscopes and the like.

Altogether it's best to wait for the real episode, due to air on the BBC on Saturday.

Chris Boyd, a security researcher at GFI Software, notes that the latest ruse is far from the first time scammers have targeted Who fans.

"The same thing happened when the last series finale was due to air," Boyd writes. "There was also a bit of an issue with various Doctor Who games doing the rounds, too. As always: avoid."

Although links to malware-tainted sites are yet to appear in the latest batch of scams, this remains a possibility.

"Everything we've seen so far is the usual fake video / survey nonsense, but there could well be malware in the offing between now and Saturday," said Boyd. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.