Feeds

Malaysia Airlines mystery: Click here for the TRUTH

...but FIRST, fill out this survey scam innocuous form

The Power of One eBook: Top reasons to choose HP BladeSystem

Scammers are asking truth-seeking conspiracy theorists to ignore the inherent irony and give up some of their private data in order to find out the "truth" about the disappearance of Malaysia Airlines Flight MH370.

Scams circulating on Facebook and Twitter purport to offer video reports of the plane being found, some of which bizarrely claim that the Boeing 777 had been discovered on the other side of the world in the Bermuda Triangle.

The links in the dodgy messages take surfers to a fake YouTube page with an "age verification dialog". Security researchers have discovered that the age verification involves completing an online survey that supposedly offers a gateway to the non-existent footage.

In reality, it's a ruse to earn crooks a few cents in marketing affiliate revenues from dodgy online marketing firms that, at best, wastes a lot of people's time and (very likely) coaxes victims into handing over private information.

Facebook has been busily purging the social network of links to the scam but they are still reappearing, albeit in French and other languages rather than their original English language form.

Scammers and virus writers are seldom slow to exploit breaking news or a national disaster to promote their wares. This has happened time and time again.

"Anything asking you to share content or like something before watching a "shocking video" or asking you to complete surveys is likely going to end up being a scam," writes Chris Boyd, malware intelligence analyst at Malwarebytes, in a blog post. "There are more than enough genuine news sources out there to be able to confirm or debunk a supposedly breaking story with a few minutes [of] clicking."

Blogger Hoax Slayer uncovered the first known example of MH370 survey scams circulating on Facebook. Malwarebytes reports that the aviation disaster-themed survey scam is also spreading on Twitter.

Malaysia Airlines Flight MH370 went missing more than a week ago en route between Kuala Lumpur and Beijing. Malaysian authorities claimed over the weekend that the flight's MH370′s tracking systems were deliberately disabled while evidence from other systems suggests the plane changed course before flying for a further six hours or more. There have not as yet been any verified reports of a sighting of either the plane or the 239 people who were on board on Saturday 8 March when it vanished. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.