All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "606730",
"signature": "Article:606730",
"url": "https://staging.dailymaverick.co.za/article/2020-04-16-digital-scammers-latch-on-to-covid-19-to-harvest-personal-data-in-south-africa/",
"shorturl": "https://staging.dailymaverick.co.za/article/606730",
"slug": "digital-scammers-latch-on-to-covid-19-to-harvest-personal-data-in-south-africa",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Digital scammers latch on to Covid-19 to harvest personal data in South Africa",
"firstPublished": "2020-04-16 11:00:48",
"lastUpdate": "2020-04-16 14:31:25",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "239338",
"name": "COVID-19",
"signature": "Category:239338",
"slug": "covid-19",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/covid-19/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 7159,
"contents": "<span style=\"font-weight: 400;\">Planet49, a Hong Kong-based digital marketing company with close associations with Asia Pacific Marketing Limited, targeted South African users with a digital marketing campaign intended to harvest their personal information. The campaign falsely presented a Covid-19 “relief promotion” by local grocery chains. In reality, it enticed WhatsApp users to not only share the promotion with several of their WhatsApp contacts, but also consent to Planet49 selling their personal information to third parties. </span>\r\n\r\n<span style=\"font-weight: 400;\">The grocery chains referenced in the campaign have denied any involvement with Planet49. </span>\r\n\r\n<span style=\"font-weight: 400;\">A DFRLab investigation analysed the source code of these websites, which revealed the links to a Planet49 website registered in 2014. The website had fabricated a Facebook-style comments section using an API for randomly generating profile pictures. Reverse image searches revealed that these profiles pictures were used prolifically across social media, blogging platforms, and review platforms on other websites. </span>\r\n\r\n<span style=\"font-weight: 400;\">There is evidence that some of these campaigns were used in Australia as well.</span>\r\n\r\n<span style=\"font-weight: 400;\">Planet49 registered the </span><a href=\"http://www.sa-rewards.co.za/\"><span style=\"font-weight: 400;\">www.sa-rewards.co.za</span></a><span style=\"font-weight: 400;\"> domain in May 2014. Less than a year later, the </span><a href=\"https://webcache.googleusercontent.com/search?q=cache:jeuWN0wZBe0J:https://news.nari.co.za/tags/scam-alert/sa-rewards-scam.html+&cd=1&hl=en&ct=clnk&gl=za\"><span style=\"font-weight: 400;\">first warnings</span></a><span style=\"font-weight: 400;\"> against the website and its fake voucher lotteries began </span><a href=\"https://web.archive.org/web/20180106093206/http:/news.searchsa.co.za:80/tags/scam-alert/rewards-scam.html\"><span style=\"font-weight: 400;\">circulating online</span></a><span style=\"font-weight: 400;\">. In 2019, </span><a href=\"http://curia.europa.eu/juris/document/document.jsf?text=&docid=218462&pageIndex=0&doclang=EN&mode=req&dir=&occ=first&part=1&cid=4608909\"><span style=\"font-weight: 400;\">Planet49 was reprimanded</span></a><span style=\"font-weight: 400;\"> by the European Court of Justice for transgressing GDPR requirements in its online lotteries. Meanwhile, crucial sections of South Africa’s Protection of Personal Information (POPI) Act, meant to be the country’s parallel to GDPR, are still in limbo since some sections of the act were promulgated six years ago.</span><b> </b>\r\n\r\n<b>The website</b><span style=\"font-weight: 400;\"> </span>\r\n\r\n<span style=\"font-weight: 400;\">The campaign spread mainly via a short WhatsApp message that contained a link to a seemingly legitimate website for one of South Africa’s grocery chains. </span>\r\n\r\n<span style=\"font-weight: 400;\">This message was deceptively styled to mimic the official Woolworths website and gave the impression that Woolworths was giving away R5,000 ($280) worth of groceries as part of a coronavirus support programme.</span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-606589\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-1.jpg\" alt=\"\" width=\"527\" height=\"211\" /> A screengrab of the WhatsApp message linking to the dubious website, indicating the deceptive logo and URL. (Source: @jean_leroux/DFRLab)</p>\r\n\r\n<span style=\"font-weight: 400;\">Once a user clicked on this link, a two-stage process commenced. </span>\r\n\r\n<span style=\"font-weight: 400;\">Firstly, a landing page (woolworths.co.za-groceries.store) enticed the user into sending the same WhatsApp message containing a link to the website to several of their contacts. This landing page changed twice during the course of the DFRLab investigation, but the content remained identical. It did this by taking the user through a short survey before prompting them to send the link to at least 10 of their contacts. A counter would keep track of the number of times a user shared this with their friends or groups. </span>\r\n\r\n<span style=\"font-weight: 400;\">These steps could be discerned from the JavaScript functions embedded into the buttons.</span>\r\n\r\n<p><img loading=\"lazy\" class=\"wp-image-606577 size-full\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-2.jpg\" alt=\"\" width=\"1555\" height=\"828\" /> A screengrab from the source code of the page revealing the functions called when clicking the buttons. Clicking the ‘WhatsApp’ button (red) pre-drafted a WhatsApp message to be forwarded to several contacts, whereas the ‘Continue’ button (purple) would check if the post was shared enough before allowing a user to click through to www.sa-rewards.co.za. A third function (blue) was unused and seems to be from a version of the site that used SMS messages. (Source: @jean_leroux/DFRLab)</p>\r\n\r\n<span style=\"font-weight: 400;\">Once the threshold was met, it would allow the user to click through to a second website, www.sa-rewards.co.za. This website was registered to Planet49, and required the user to enter their personal details, and consent to Planet49 processing and selling this information to third parties for marketing purposes, before they could secure an entry into the draw. </span>\r\n\r\n<span style=\"font-weight: 400;\">This process ensured that users propagated the website to several of their WhatsApp contacts before they even entered the drawing by providing their personal information. </span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-606590\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-6-inset-3.jpg\" alt=\"\" width=\"441\" height=\"531\" /> A schematic representation of the flow of the campaign. (Source: @jean_leroux/DFRLab via Draw.io)</p>\r\n\r\n<span style=\"font-weight: 400;\">This coronavirus “promotion” was deceptive. The domain names were crafted in such a manner that they mimicked Woolworths’ official domain, and official logos were used to give the impression that the campaign was sanctioned by Woolworths. The mention of the coronavirus kept the campaign – which seems to have been running since 2016 – fresh. </span>\r\n\r\n<span style=\"font-weight: 400;\">A dive into the source code of the www.sa-rewards.co.za website revealed that in addition to Woolworths, the campaign also targeted two other grocery chains, Pick n Pay and Spar. The site would be tailored to either Woolworth, Spar, or Pick n Pay shoppers depending on the link you received. </span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-606578\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-4.jpg\" alt=\"\" width=\"717\" height=\"356\" /> A screengrab from the source code of the www.sa-rewards.co.za website indicating that the site changed its display text to one of three grocery chains depending on the link you used to access it. (Source:@jean_leroux/DFRLab via SA-rewards.co.za)</p>\r\n\r\n<span style=\"font-weight: 400;\">Another deception was the way in which a portion of the website was designed to imitate a Facebook comments section. This featured several happy “participants” expressing their satisfaction at receiving their vouchers, despite the drawing date only being slated for June this year. </span>\r\n\r\n<span style=\"font-weight: 400;\">The source code, however, revealed that this was fake. The Facebook comments section was hard-coded into the website, and was made to imitate real users’ comments and likes. The source code also showed that the “user profiles” were being generated automatically using an API built specifically to generate random user accounts. </span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-606579\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-5.jpg\" alt=\"\" width=\"1557\" height=\"896\" /> Screengrabs from the www.woolworths.co.za-grocery.store website (left) imitating a Facebook comments section, and the accompanying source code (right). Note that these comments were hard-coded, and the profile pictures sourced programmatically from a website that generates fake profiles. (Source: @jean_leroux/DFRLab)</p>\r\n\r\n<span style=\"font-weight: 400;\">Reverse image searches of these photographs revealed that scores of websites used the same profile pictures on their websites. These included customer reviews for a </span><a href=\"http://gametraders.de/\"><span style=\"font-weight: 400;\">gaming-sales website</span></a><span style=\"font-weight: 400;\"> in Germany, a </span><a href=\"https://www.wpsync.com/reviews/\"><span style=\"font-weight: 400;\">WordPress management tool</span></a><span style=\"font-weight: 400;\">, and even hidden unused in the source code of the website for a </span><a href=\"https://www.southridgedental.ca/\"><span style=\"font-weight: 400;\">UK-based dentist</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\"> </span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-606580\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-6.jpg\" alt=\"\" width=\"1653\" height=\"1013\" /> A reverse image search conducted on some of the profile pictures used by the fabricated Facebook comments section revealed that the same pictures saw extensive use. Multiple Twitter, Medium, WordPress and dating site accounts were found using these profile pictures. (Source: @jean_leroux/DFRLab)</p>\r\n\r\n<span style=\"font-weight: 400;\"> Iterations of this “free voucher” scam have targeted South African users since 2014. In a country rife with unemployment and inequality, the promise of a substantial voucher in exchange for personal information seems enticing. Now, with a nationwide lockdown in effect in South Africa in an attempt to curb the spread of the virus, the scammers’ angle of attack has shifted to keep the old scam current. </span><b>DM</b>\r\n\r\n<span style=\"font-weight: 400;\"> </span><a href=\"https://twitter.com/jean_leroux\"><i><span style=\"font-weight: 400;\">Jean le Roux</span></i></a> <i><span style=\"font-weight: 400;\">is a research associate, southern Africa, with the Digital Forensic Research Lab and is based in South Africa.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">The DFRLab team in Cape Town works in partnership with </span></i><a href=\"http://twitter.com/Code4Africa\"><i><span style=\"font-weight: 400;\">Code for Africa</span></i></a><i><span style=\"font-weight: 400;\">.</span></i>\r\n\r\n<a href=\"https://twitter.com/DFRLab\"><i><span style=\"font-weight: 400;\">Follow along</span></i></a> <i><span style=\"font-weight: 400;\">for more in-depth analysis from our #DigitalSherlocks.</span></i>\r\n\r\nThis article was first published <a href=\"https://medium.com/dfrlab/scammers-use-whatsapp-chain-message-about-covid-19-and-fake-profiles-to-harvest-personal-data-in-7a5aecceed58\">here</a>",
"teaser": "Digital scammers latch on to Covid-19 to harvest personal data in South Africa",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "49673",
"name": "Jean le Roux for DFRLab",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/jean-le-roux-for-dfrlab/",
"editorialName": "jean-le-roux-for-dfrlab",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "7687",
"name": "WhatsApp",
"url": "https://staging.dailymaverick.co.za/keyword/whatsapp/",
"slug": "whatsapp",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "WhatsApp",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "232858",
"name": "Covid-19",
"url": "https://staging.dailymaverick.co.za/keyword/covid19/",
"slug": "covid19",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Covid-19",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "93990",
"name": "A reverse image search conducted on some of the profile pictures used by the fabricated Facebook comments section revealed that the same pictures saw extensive use. Multiple Twitter, Medium, WordPress and dating site accounts were found using these profile pictures. (Source: @jean_leroux/DFRLab)",
"description": "<span style=\"font-weight: 400;\">Planet49, a Hong Kong-based digital marketing company with close associations with Asia Pacific Marketing Limited, targeted South African users with a digital marketing campaign intended to harvest their personal information. The campaign falsely presented a Covid-19 “relief promotion” by local grocery chains. In reality, it enticed WhatsApp users to not only share the promotion with several of their WhatsApp contacts, but also consent to Planet49 selling their personal information to third parties. </span>\r\n\r\n<span style=\"font-weight: 400;\">The grocery chains referenced in the campaign have denied any involvement with Planet49. </span>\r\n\r\n<span style=\"font-weight: 400;\">A DFRLab investigation analysed the source code of these websites, which revealed the links to a Planet49 website registered in 2014. The website had fabricated a Facebook-style comments section using an API for randomly generating profile pictures. Reverse image searches revealed that these profiles pictures were used prolifically across social media, blogging platforms, and review platforms on other websites. </span>\r\n\r\n<span style=\"font-weight: 400;\">There is evidence that some of these campaigns were used in Australia as well.</span>\r\n\r\n<span style=\"font-weight: 400;\">Planet49 registered the </span><a href=\"http://www.sa-rewards.co.za/\"><span style=\"font-weight: 400;\">www.sa-rewards.co.za</span></a><span style=\"font-weight: 400;\"> domain in May 2014. Less than a year later, the </span><a href=\"https://webcache.googleusercontent.com/search?q=cache:jeuWN0wZBe0J:https://news.nari.co.za/tags/scam-alert/sa-rewards-scam.html+&cd=1&hl=en&ct=clnk&gl=za\"><span style=\"font-weight: 400;\">first warnings</span></a><span style=\"font-weight: 400;\"> against the website and its fake voucher lotteries began </span><a href=\"https://web.archive.org/web/20180106093206/http:/news.searchsa.co.za:80/tags/scam-alert/rewards-scam.html\"><span style=\"font-weight: 400;\">circulating online</span></a><span style=\"font-weight: 400;\">. In 2019, </span><a href=\"http://curia.europa.eu/juris/document/document.jsf?text=&docid=218462&pageIndex=0&doclang=EN&mode=req&dir=&occ=first&part=1&cid=4608909\"><span style=\"font-weight: 400;\">Planet49 was reprimanded</span></a><span style=\"font-weight: 400;\"> by the European Court of Justice for transgressing GDPR requirements in its online lotteries. Meanwhile, crucial sections of South Africa’s Protection of Personal Information (POPI) Act, meant to be the country’s parallel to GDPR, are still in limbo since some sections of the act were promulgated six years ago.</span><b> </b>\r\n\r\n<b>The website</b><span style=\"font-weight: 400;\"> </span>\r\n\r\n<span style=\"font-weight: 400;\">The campaign spread mainly via a short WhatsApp message that contained a link to a seemingly legitimate website for one of South Africa’s grocery chains. </span>\r\n\r\n<span style=\"font-weight: 400;\">This message was deceptively styled to mimic the official Woolworths website and gave the impression that Woolworths was giving away R5,000 ($280) worth of groceries as part of a coronavirus support programme.</span>\r\n\r\n[caption id=\"attachment_606589\" align=\"aligncenter\" width=\"527\"]<img class=\"size-full wp-image-606589\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-1.jpg\" alt=\"\" width=\"527\" height=\"211\" /> A screengrab of the WhatsApp message linking to the dubious website, indicating the deceptive logo and URL. (Source: @jean_leroux/DFRLab)[/caption]\r\n\r\n<span style=\"font-weight: 400;\">Once a user clicked on this link, a two-stage process commenced. </span>\r\n\r\n<span style=\"font-weight: 400;\">Firstly, a landing page (woolworths.co.za-groceries.store) enticed the user into sending the same WhatsApp message containing a link to the website to several of their contacts. This landing page changed twice during the course of the DFRLab investigation, but the content remained identical. It did this by taking the user through a short survey before prompting them to send the link to at least 10 of their contacts. A counter would keep track of the number of times a user shared this with their friends or groups. </span>\r\n\r\n<span style=\"font-weight: 400;\">These steps could be discerned from the JavaScript functions embedded into the buttons.</span>\r\n\r\n[caption id=\"attachment_606577\" align=\"aligncenter\" width=\"1555\"]<img class=\"wp-image-606577 size-full\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-2.jpg\" alt=\"\" width=\"1555\" height=\"828\" /> A screengrab from the source code of the page revealing the functions called when clicking the buttons. Clicking the ‘WhatsApp’ button (red) pre-drafted a WhatsApp message to be forwarded to several contacts, whereas the ‘Continue’ button (purple) would check if the post was shared enough before allowing a user to click through to www.sa-rewards.co.za. A third function (blue) was unused and seems to be from a version of the site that used SMS messages. (Source: @jean_leroux/DFRLab)[/caption]\r\n\r\n<span style=\"font-weight: 400;\">Once the threshold was met, it would allow the user to click through to a second website, www.sa-rewards.co.za. This website was registered to Planet49, and required the user to enter their personal details, and consent to Planet49 processing and selling this information to third parties for marketing purposes, before they could secure an entry into the draw. </span>\r\n\r\n<span style=\"font-weight: 400;\">This process ensured that users propagated the website to several of their WhatsApp contacts before they even entered the drawing by providing their personal information. </span>\r\n\r\n[caption id=\"attachment_606590\" align=\"aligncenter\" width=\"441\"]<img class=\"size-full wp-image-606590\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-6-inset-3.jpg\" alt=\"\" width=\"441\" height=\"531\" /> A schematic representation of the flow of the campaign. (Source: @jean_leroux/DFRLab via Draw.io)[/caption]\r\n\r\n<span style=\"font-weight: 400;\">This coronavirus “promotion” was deceptive. The domain names were crafted in such a manner that they mimicked Woolworths’ official domain, and official logos were used to give the impression that the campaign was sanctioned by Woolworths. The mention of the coronavirus kept the campaign – which seems to have been running since 2016 – fresh. </span>\r\n\r\n<span style=\"font-weight: 400;\">A dive into the source code of the www.sa-rewards.co.za website revealed that in addition to Woolworths, the campaign also targeted two other grocery chains, Pick n Pay and Spar. The site would be tailored to either Woolworth, Spar, or Pick n Pay shoppers depending on the link you received. </span>\r\n\r\n[caption id=\"attachment_606578\" align=\"aligncenter\" width=\"717\"]<img class=\"size-full wp-image-606578\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-4.jpg\" alt=\"\" width=\"717\" height=\"356\" /> A screengrab from the source code of the www.sa-rewards.co.za website indicating that the site changed its display text to one of three grocery chains depending on the link you used to access it. (Source:@jean_leroux/DFRLab via SA-rewards.co.za)[/caption]\r\n\r\n<span style=\"font-weight: 400;\">Another deception was the way in which a portion of the website was designed to imitate a Facebook comments section. This featured several happy “participants” expressing their satisfaction at receiving their vouchers, despite the drawing date only being slated for June this year. </span>\r\n\r\n<span style=\"font-weight: 400;\">The source code, however, revealed that this was fake. The Facebook comments section was hard-coded into the website, and was made to imitate real users’ comments and likes. The source code also showed that the “user profiles” were being generated automatically using an API built specifically to generate random user accounts. </span>\r\n\r\n[caption id=\"attachment_606579\" align=\"aligncenter\" width=\"1557\"]<img class=\"size-full wp-image-606579\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-5.jpg\" alt=\"\" width=\"1557\" height=\"896\" /> Screengrabs from the www.woolworths.co.za-grocery.store website (left) imitating a Facebook comments section, and the accompanying source code (right). Note that these comments were hard-coded, and the profile pictures sourced programmatically from a website that generates fake profiles. (Source: @jean_leroux/DFRLab)[/caption]\r\n\r\n<span style=\"font-weight: 400;\">Reverse image searches of these photographs revealed that scores of websites used the same profile pictures on their websites. These included customer reviews for a </span><a href=\"http://gametraders.de/\"><span style=\"font-weight: 400;\">gaming-sales website</span></a><span style=\"font-weight: 400;\"> in Germany, a </span><a href=\"https://www.wpsync.com/reviews/\"><span style=\"font-weight: 400;\">WordPress management tool</span></a><span style=\"font-weight: 400;\">, and even hidden unused in the source code of the website for a </span><a href=\"https://www.southridgedental.ca/\"><span style=\"font-weight: 400;\">UK-based dentist</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\"> </span>\r\n\r\n[caption id=\"attachment_606580\" align=\"aligncenter\" width=\"1653\"]<img class=\"size-full wp-image-606580\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/DFRlab-Jean-HK-scam-inset-6.jpg\" alt=\"\" width=\"1653\" height=\"1013\" /> A reverse image search conducted on some of the profile pictures used by the fabricated Facebook comments section revealed that the same pictures saw extensive use. Multiple Twitter, Medium, WordPress and dating site accounts were found using these profile pictures. (Source: @jean_leroux/DFRLab)[/caption]\r\n\r\n<span style=\"font-weight: 400;\"> Iterations of this “free voucher” scam have targeted South African users since 2014. In a country rife with unemployment and inequality, the promise of a substantial voucher in exchange for personal information seems enticing. Now, with a nationwide lockdown in effect in South Africa in an attempt to curb the spread of the virus, the scammers’ angle of attack has shifted to keep the old scam current. </span><b>DM</b>\r\n\r\n<span style=\"font-weight: 400;\"> </span><a href=\"https://twitter.com/jean_leroux\"><i><span style=\"font-weight: 400;\">Jean le Roux</span></i></a> <i><span style=\"font-weight: 400;\">is a research associate, southern Africa, with the Digital Forensic Research Lab and is based in South Africa.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">The DFRLab team in Cape Town works in partnership with </span></i><a href=\"http://twitter.com/Code4Africa\"><i><span style=\"font-weight: 400;\">Code for Africa</span></i></a><i><span style=\"font-weight: 400;\">.</span></i>\r\n\r\n<a href=\"https://twitter.com/DFRLab\"><i><span style=\"font-weight: 400;\">Follow along</span></i></a> <i><span style=\"font-weight: 400;\">for more in-depth analysis from our #DigitalSherlocks.</span></i>\r\n\r\nThis article was first published <a href=\"https://medium.com/dfrlab/scammers-use-whatsapp-chain-message-about-covid-19-and-fake-profiles-to-harvest-personal-data-in-7a5aecceed58\">here</a>",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/ZAIjUahz2fu6gn96Gs9C8h0ip3g=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/rqkb9RdqiW9GO8p_oynHEgOvymI=/450x0/smart/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/4tY95iw5rJ_qd_0nGutWHTCs9lM=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/4BFhBxIEjwnu3wLNp2-PycuMAZU=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/lY4lnTIv0FaAmce1wNpiSbP8BFM=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/ZAIjUahz2fu6gn96Gs9C8h0ip3g=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/rqkb9RdqiW9GO8p_oynHEgOvymI=/450x0/smart/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/4tY95iw5rJ_qd_0nGutWHTCs9lM=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/4BFhBxIEjwnu3wLNp2-PycuMAZU=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/lY4lnTIv0FaAmce1wNpiSbP8BFM=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/DFRlab-Jean-HK-scam-main.jpg",
"type": "image"
}
],
"summary": "A Hong Kong-based marketing firm breathed new life into a tired ‘free voucher’ scam by making it coronavirus-related.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Digital scammers latch on to Covid-19 to harvest personal data in South Africa",
"search_description": "<span style=\"font-weight: 400;\">Planet49, a Hong Kong-based digital marketing company with close associations with Asia Pacific Marketing Limited, targeted South African users with a digital marketing",
"social_title": "Digital scammers latch on to Covid-19 to harvest personal data in South Africa",
"social_description": "<span style=\"font-weight: 400;\">Planet49, a Hong Kong-based digital marketing company with close associations with Asia Pacific Marketing Limited, targeted South African users with a digital marketing",
"social_image": ""
},
"cached": true,
"access_allowed": true
}