{"id":22117,"date":"2020-11-20T20:44:29","date_gmt":"2020-11-20T15:14:29","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/pubg-metro-phishing\/22117\/"},"modified":"2020-11-20T20:45:08","modified_gmt":"2020-11-20T15:15:08","slug":"pubg-metro-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/pubg-metro-phishing\/22117\/","title":{"rendered":"Open season on PUBG Mobile accounts"},"content":{"rendered":"<p>Free cheese exists only in mousetraps, but businesses everywhere have been desensitizing people to the idea of freemium cheese for years.<\/p>\n<p>The freemium approach is especially prevalent in the gaming industry. Game developers and publishers commonly offer users minor but genuinely free goodies \u2014 the expectation being that the gamers will get sucked in and end up spending on in-game purchases. The addictiveness of freemium cheese is what cybercriminals are exploiting when they offer giveaways of rare items for the hit title <em>PUBG Mobile<\/em>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\">\n<h2>Giveaway for PUBG Mobile\u2019s new season<\/h2>\n<p>The mobile multiplayer shooter recently launched a new season with items, monsters, and mechanics imported from another popular shooter, <em>Metro: Exodus<\/em>. No sooner had it gone live than numerous websites appeared offering the chance to win new items.<\/p>\n<div id=\"attachment_37777\" style=\"width: 2210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2020\/11\/20204439\/pubg-metro-phishing-screen-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-37777\" class=\"size-full wp-image-22118\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2020\/11\/20204439\/pubg-metro-phishing-screen-1.jpg\" alt=\"Phishing pages with a Lucky Spin giveaway for the new season of PUBG Mobile with Metro: Exodus\" width=\"2200\" height=\"2400\"><\/a><p id=\"caption-attachment-37777\" class=\"wp-caption-text\">Phishing pages with a Lucky Spin giveaway for the new season of PUBG Mobile with Metro: Exodus<\/p><\/div>\n<p>They all look pretty much the same: distinctly gamer-themed with <em>PUBG Mobile<\/em> and <em>Metro: Exodus<\/em> branding, plus an invitation to spin the wheel to win one of the items depicted on it. Those who know <em>PUBG Mobile<\/em> are probably familiar with this wheel; at the start of each new season, the developers of <em>PlayerUnknown\u2019s Battlegrounds<\/em> offer the chance to get unique items by spinning such a wheel. It\u2019s called the Lucky Spin, and it\u2019s basically a win-win (or at least a no-loss) lottery because spinning the wheel doesn\u2019t cost any points, but it could yield a spanking new gun.<\/p>\n<div id=\"attachment_37778\" style=\"width: 2210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2020\/11\/20204450\/pubg-metro-phishing-screen-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-37778\" class=\"size-full wp-image-22120\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2020\/11\/20204450\/pubg-metro-phishing-screen-2.jpg\" alt=\"Phishing pages with Twitter or Facebook login \u2014 a familiar option for PUBG Mobile players\" width=\"2200\" height=\"2400\"><\/a><p id=\"caption-attachment-37778\" class=\"wp-caption-text\">Phishing pages with Twitter or Facebook login \u2014 a familiar option for PUBG Mobile players<\/p><\/div>\n<p>To receive the item, all you need to do is log in to your account. This stage offers two options familiar to <em>PUBG Mobile<\/em> players: log in with Twitter or log in with Facebook. Either option, however, results in an error message.<\/p>\n<p>If you try again, it\u2019ll seem to work, but the page will then ask for additional account information including character name, phone number, and <em>PUBG Mobile<\/em> account level. Enter those and the system will return a positive message: Your winnings will arrive within 24 hours.<\/p>\n<div id=\"attachment_37779\" style=\"width: 2210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2020\/11\/20204501\/pubg-metro-phishing-screen-3.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-37779\" class=\"size-full wp-image-22122\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2020\/11\/20204501\/pubg-metro-phishing-screen-3.jpg\" alt=\"Form for entering additional data, supposedly to verify the user's PUBG Mobile account, and confirmation that the item will be available within 24 hours\" width=\"2200\" height=\"2400\"><\/a><p id=\"caption-attachment-37779\" class=\"wp-caption-text\">Form for entering additional data, supposedly to verify the user\u2019s PUBG Mobile account, and confirmation that the item will be available within 24 hours<\/p><\/div>\n<h2>How PUBG Mobile\/Metro: Exodus phishing pages work<\/h2>\n<p>Unfortunately for the player, the item will never arrive. All of the pages \u2014 our researchers came across 260 of them in just a few days, and their number continues to grow \u2014 were created by scammers. They have nothing whatsoever to do with Tencent, the developer of <em>PlayerUnknown\u2019s Battlegrounds<\/em>, or the creators of <em>Metro: Exodus<\/em>. The sites\u2019 purpose is to steal gamers\u2019 data.<\/p>\n<p>First, they grab Facebook or Twitter login credentials. The calculation here is that between the user\u2019s desperation to get hold of the new item, and the pervasiveness of using a social network login for another app, their suspicions won\u2019t be aroused.<\/p>\n<p>But the scammers go one step further, asking for additional information, such as phone number and <em>PUBG Mobile<\/em> account level, apparently to help them evaluate the account\u2019s resale value.<\/p>\n<h2>How to avoid PUBG Mobile phishing<\/h2>\n<p>The attackers prepared thoroughly for the start of <em>PUBG Mobile<\/em>\u2018s new season; the pages with item giveaways are very convincing in terms of both design and requested actions. Still, on closer inspection, certain <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a> elements give away the giveaway, so to speak.<\/p>\n<ul>\n<li>Any item giveaway outside of <a href=\"http:\/\/www.pubgmobile.com\/event\/pubgmxmetro\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">PUBG Mobile\u2019s official website<\/a> or the game itself is almost certainly a scam.<\/li>\n<li>If the site URL is not <a href=\"http:\/\/pubgmobile.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">pubgmobile.com<\/a>, do not enter anything; just leave immediately.<\/li>\n<li>If a promotion is real, the game developer is unlikely to keep it a secret. Check their social media channels and the game\u2019s official website. It\u2019s important to make sure you\u2019re <a href=\"https:\/\/www.kaspersky.com\/blog\/twitter-cryptocurrency-scams\/24560\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">checking the real accounts or sites<\/a>. Also keep in mind that even real sites and accounts can be hacked (which has <a href=\"https:\/\/www.kaspersky.com\/blog\/twitch-privacy-security\/34519\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">happened<\/a> \u2014 and <a href=\"https:\/\/www.bbc.com\/news\/technology-53425822\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">not just once<\/a>).<\/li>\n<li>Spotting convincing scams takes a keen eye \u2014 and sometimes even that\u2019s not enough. Therefore, we recommend using a <a href=\"https:\/\/www.kaspersky.co.in\/mobile-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____ccbe3384bb4e1385\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> that blocks dangerous Web pages to protect you from online scams and phishing.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers have created hundreds of phishing pages with fake item giveaways, aiming to steal PUBG mobile account credentials.<\/p>\n","protected":false},"author":2481,"featured_media":22124,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2196],"tags":[623,3020,76,527],"class_list":{"0":"post-22117","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-gamers","9":"tag-giveaway","10":"tag-phishing","11":"tag-threats"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/pubg-metro-phishing\/22117\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/pubg-metro-phishing\/17595\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/pubg-metro-phishing\/8743\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/pubg-metro-phishing\/23709\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/pubg-metro-phishing\/21827\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pubg-metro-phishing\/20585\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pubg-metro-phishing\/24272\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pubg-metro-phishing\/23404\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pubg-metro-phishing\/29489\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pubg-metro-phishing\/9063\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pubg-metro-phishing\/37711\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/pubg-metro-phishing\/15999\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/pubg-metro-phishing\/16582\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/pubg-metro-phishing\/14197\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pubg-metro-phishing\/25758\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/pubg-metro-phishing\/29614\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/pubg-metro-phishing\/26408\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/pubg-metro-phishing\/23093\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pubg-metro-phishing\/28429\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pubg-metro-phishing\/28246\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/gamers\/","name":"gamers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/22117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=22117"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/22117\/revisions"}],"predecessor-version":[{"id":22123,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/22117\/revisions\/22123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/22124"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=22117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=22117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=22117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}