If Facebook has opened a copyright case against you, you better take a closer look!
Because what is masquerading as “You Have Been Reported for Copyright Content” is a common trap that has been neatly embedded on Facebook! Below we describe a method that robs Facebook users of their accounts and also intercepts a lot of personal data.
This scam starts with a Facebook-style support message. The notice informs you that you have violated copyright, but that you can file an objection. To lodge an objection, you have to follow a link. Interestingly, this link actually leads to Facebook, which makes the whole thing extremely dangerous:
But first a note: the readable text link that is displayed there is not the destination that is being addressed. There is another link in the source text of this email, which - and this is the really interesting thing - leads to a so-called Facebook app, i.e. an application within Facebook.
This is NOT an application FROM Facebook, but rather an application that has nested itself on Facebook as a bad egg and is called “Appeal”. Apparently Facebook has NOT been able to remove this fraudulent app for months.
A phishing form!
There you can see a form whose content is seamlessly linked to the email and could also visually be assigned to Facebook. Since you are actually inside Facebook, the representation is even more dangerous. We must clearly emphasize at this point:
Neither the email nor this form are officially from Facebook!
Technically speaking, an external browser window is embedded in Facebook in the form of an application. This is therefore an abuse of the app functions on Facebook . We have been observing this method for a long time and our hope that Facebook will remove this app is now dwindling.
Enter nothing!
This is simply a phishing form that is cleverly embedded in Facebook. The term 'phishing' is borrowed from the English word 'fishing' - and describes an activity that cybercriminals carry out. They fish out user data. The device does not necessarily have to be infected with a virus .
Phishing works in different ways. Fake websites, emails that appear to come from a well-known person or institution, such as a bank, and SMS can be used for a phishing attack. Fraudsters try to make the original website, the cover letter from a friend or institute or the SMS in question look as similar to the original as possible.
These fake pages and documents are then distributed and criminals hope that users will log in to these fake pages with their original data so that they can access this information. In this case, fraudsters pose as Facebook and use the platform's corporate design.
If, despite all your caution, you still fall victim to a phishing attack , it is first important to keep an overview. In this case, change your Facebook access data immediately and log all of your devices out of Facebook when asked!
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )


