Netflix Users Receive Terminations – Here’s How To Respond

“Be careful” is easily said. But it is more than a question of whether in the heat of battle and with a full inbox one always finds the time to carefully examine every single email. No wonder, then, that the phishing scam is still working extremely well today, claiming countless victims every day. In principle, however, there are only two alternative approaches: on the one hand, most online service providers now offer so-called two-factor authentication (more on this below) and on the other hand, the danger is significantly lower if you know in advance which emails to send to you. pay attention. And that is exactly what you will discover here.

Phishing emails since October 3rd

The consumer advice center NRW continuously inventories the latest phishing emails as part of its phishing radar. Of course, the list is not exhaustive; there are other emails circulating as well. However, it shows which emails users should definitely keep an eye on right now.

This week these are the following companies and organizations:

Details of the current phishing situation


“Unfortunately, we were unable to resolve your payment issue and your subscription has been cancelled.” With these words begins an email that is currently increasingly being sent on the World Wide Web. The email is quite convincing both visually and linguistically and also seems to have a direct customer approach. Nevertheless, this is simply a phishing scam with the aim of tapping the payment details of the recipient. Because, as the email continues, the Netflix subscription can of course be reactivated via a saved link. In such cases, it’s a good idea to contact Netflix customer service or simply open the Netflix app to check your subscription. The phishing email should then be sent to the spam folder.

By the way, the cybercriminals could have fished your name out of an associated Darknet forum. The information may originally come from a data breach or a previous phishing scam. This guide explains how to protect your data and passwords.


The “carrot and stick” method seems to work well in the 21st century as well. While the whip was used as part of the Netflix scam, a recent Amazon email with carrots or a voucher worth €1,000 lures a Samsung Galaxy S21 Ultra 5G and a Galaxy Watch. According to a phishing email, Amazon is currently giving away these prizes among its users. To participate in the raffle, you “only” need to confirm your entry – again by means of a saved link. However, in reality, the scammers are most likely targeting your Amazon credentials. Participation can therefore mean a financial fiasco for you.

The phishing email looks very professional and therefore poses a particularly high risk. Only the sender email and the lack of direct customer contact indicate a scam. Nevertheless, it is also advisable to send the e-mail unanswered to the spam folder on the one hand and to set up a so-called two-factor authentication (2FA) on the other.

savings bank

In another phishing email, Sparkasse customers are currently being asked to complete the conversion to the new SparkasseSecure security process. This requires an update of the user data. Fortunately, unlike the two previous emails, this one is very carelessly designed and contains numerous grammatical errors. This makes the risk for Sparkasse customers manageable.


The phishing e-mail, which is currently being sent on behalf of de Volksbank, resembles the Sparkasse e-mail in both content and grammar. However, the link was not saved here as a button, but in text form. Because the URL is visible, it appears more reliable. However, it is better not to do this and to call up the de Volksbank website yourself. Because the URL is just an anchor text that leads to a phishing page. An example: we simply linked the reliable Volksbank URL to our phishing guide. This is completely harmless, unlike the link stored in the alleged Volksbank email. Therefore, do not click on saved links in emails that are not 100 percent reliable.

Read more now

Privacy by taping the webcam? This is a more elegant way to solve the problem

Phishing 2022 – Past Cases

The list of phishing attempts in Germany is getting longer. It is clear that it mainly affects large companies. You have many customers and therefore many potential victims of phishing. This list shows which companies have already been used by phishing scammers to steal your data or money in 2022:

  • 1&1
  • Advanzia Bank
  • Amazon
  • Apple
  • BaFin (Federal Financial Supervisory Authority)
  • Barclays
  • Bitcoin extortion
  • federal government
  • Commerzbank
  • German Bank
  • German Credit Bank (DKB)
  • DHL
  • ionos
  • ING
  • Instagram
  • Landesbank Berlin (LBB)
  • paypal
  • post office
  • SMS (voicemail)
  • savings bank
  • telecom
  • Volksbanken and Raiffeisenbanken
  • WEB.DE
  • whatsapp
  • customs office

What exactly is phishing?

When you think of cybercriminals, Hollywood images automatically come to mind of strangers in hoodies staring at the Pentagon in a five-screen basement. However, the truth is often quite different. Because you don’t need five screens or a lot of knowledge of security software to get money from internet users. Even a hoodie is not absolutely necessary for this. Many users voluntarily give up their access data when asked.

For example, all it takes is an Amazon-look email informing the recipient of unusual account activity or a change in terms and conditions. The victim is then asked to perform authorization by clicking on a link and logging into their account. Only the link does not lead to the Amazon website, but to a copy. The credentials entered here go directly to the cyber criminals. There is now a real industry behind phishing.

Other Scams and Protection Mechanisms:

This is how you protect yourself

Once the scammers have captured your user information, they can use it for identity theft, for example. If the credentials belong to a service linked to the bank account, your wallet could suffer as well. Therefore, pay close attention to e-mails in general and messages from the above providers in particular. Does the email contain spelling errors? What about direct customer contact? Is the sender or the sender’s email address in the email header actually PayPal? Does the linked website belong to the online payment service or is the URL rather cryptic? All these questions can expose a phishing email.

Another good self-protection measure is two-factor authentication (2FA), which is double login security, where a second login barrier is placed next to the credentials – for example in the form of a code that refers to a previously stored one phone number will be provided. Cyber ​​criminals usually don’t get this easily. Although this protective line is not insurmountable either. Learn more about this topic in our phishing guide.

dark web

Read more now

Darknet & Deep Web: The Dark Secrets of the World Wide Web

About our links

We mark partner links with these symbols. If you click on such a link or button or make a purchase, we receive a small compensation from the respective website operator. This does not affect the price of a purchase. But you help us to continue to offer digitally for free. Thank you very much!

Leave a Reply

Your email address will not be published. Required fields are marked *