www.malwarebytes.com Open in urlscan Pro
2600:9000:2156:7000:16:26c7:ff80:93a1  Public Scan

Submitted URL: https://links.e.malwarebytes.com/z/0a7hix230?uid=6366d84f-58f3-49f5-b7d9-23542473a9ff&mid=56d8e501-1c05-4c36-b0af-f1b7421998ee&bs...
Effective URL: https://www.malwarebytes.com/phishing?utm_source=blueshift&utm_medium=email&utm_campaign=b2c_pro_win_tax_time_security_tips_1...
Submission: On April 23 via api from BE — Scanned from DE

Form analysis 2 forms found in the DOM

<form><span class="fieldset">
    <p><input type="checkbox" value="check" id="chkMain" checked="checked" class="legacy-group-status optanon-status-checkbox"><label for="chkMain">Active</label></p>
  </span></form>

/newsletter/

<form class="newsletter-form form-inline" action="/newsletter/">
  <div class="email-input">
    <label for="cta-footer-newsletter-input-email-en" aria-label="cta-footer-newsletter-input-email-en" aria-labelledby="cta-footer-newsletter-input-email-en">
      <input type="text" class="email-input-field" id="cta-footer-newsletter-input-email-en" name="email" placeholder="Email Address">
    </label>
    <input name="source" type="hidden" value="">
    <input type="submit" class="submit-bttn" id="cta-footer-newsletter-subscribe-email-en" value="">
  </div>
</form>

Text Content

Who doesn't like cookies?

We use cookies to help us enhance your online experience. If that sounds good,
click “Accept All Cookies” or review our Privacy and Cookie Policy.


Close
Accept All Cookies


 * Your Privacy

 * Strictly Necessary Cookies

 * Performance Cookies

 * Functional Cookies

 * Targeting Cookies

 * More Information

Privacy Preference Center

Active

Always Active



Save Settings

Allow All

The official Malwarebytes logo The official Malwarebytes logo in a blue font
       
Personal
Personal
 * Security & Antivirus
 * Malwarebytes for Windows
 * Malwarebytes for Mac
 * Malwarebytes for Chromebook
 * Malwarebytes for Android
 * Malwarebytes for iOS
 * Malwarebytes AdwCleaner

 * Online Privacy
 * Malwarebytes Privacy VPN
 * Malwarebytes Browser Guard
 *  
 * All-in-one Protection

 * Malwarebytes Premium + Privacy VPN  

 * Get Started

 * The ultimate guide to privacy protection 
   
   VISIT PRIVACY HUB 

 *  

 * Stop infections before they happen

 * GET A FREE TRIAL 

 *  

 * Find the right solution for you

 * SEE PERSONAL PRICING 

Business
Business
 * Solutions
 * BY COMPANY SIZE
 * Small Businesses
 *  1-99 Employees 
 * Mid-size Businesses
 *  100-999 Employees
 * Large Enterprise
 *  1000+ Empoyees
 * BY INDUSTRY
 * Education
 * Finance
 * Healthcare
 * Government

 * Products
 * CLOUD-BASED SECURITY MANAGEMENT AND SERVICES
 * Endpoint Protection
 * Endpoint Protection for Servers
 * Endpoint Detection & Response
 * Endpoint Detection & Response for Servers
 * Incident Response
 * Malware Removal Service 
 * Nebula Platform Architecture
 * CLOUD-BASED SECURITY MODULES
 * Vulnerability & Patch Management 
 * Remediation for CrowdStrike®
 * NEXT-GEN ANTIVIRUS FOR SMALL BUSINESS
 * For Teams

 * Get Started
 *  * Find the right solution for your business
    * See business pricing
   
   --------------------------------------------------------------------------------
   
    * Don't know where to start?
    * Help me choose a product
   
   --------------------------------------------------------------------------------
   
    * See what Malwarebytes can do for you
    * Get a free trial
   
   --------------------------------------------------------------------------------
   
    * Our sales team is ready to help. Call us now
    * +49 (800) 723-4800

Pricing
Partners
Partners
 * Explore Partnerships

 * Partner Solutions
 * Resellers
 * Managed Service Providers
 * Computer Repair
 * Technology Partners

 * Partner Success Story
 * Marek Drummond
   Managing Director at Optimus Systems
   
   "Thanks to the Malwarebytes MSP program, we have this high-quality product in
   our stack. It’s a great addition, and I have confidence that customers’
   systems are protected."

 * See full story

Resources
Resources
 * Learn About Cybersecurity
 * Antivirus
 * Malware
 * Ransomware
 * Malwarebytes Labs – Blog
 * Glossary
 * Threat Center

 * Business Resources
 * Reviews
 * Analyst Reports
 * Case Studies
 * Press & News

 * Events
 * 
   
   
   
   Featured Event: RSA 2021

 * See Event

Support
Support
 * Technical Support
 * Personal Support
 * Business Support
 * Premium Services
 * Forums
 * Vulnerability Disclosure

 * Training for Personal Products
 * Training for Business Products

 * Featured Content
 * 
   
   
   
   Activate Malwarebytes Privacy on Windows device.

 * See Content

FREE DOWNLOAD
CONTACT US
COMPANY
COMPANY
 * About Malwarebytes
 * Careers
 * News & Press

SIGN IN
SIGN IN
 * My Account
 * Cloud Console
 * Partner Portal


WHAT IS PHISHING?

Phishing is an attempt to trick you into sharing sensitive information by posing
as someone trustworthy. Read on to learn to spot phishing.

DOWNLOAD MALWAREBYTES FOR FREEFREE DOWNLOAD

Also for Mac, iOS, Android and For Business

Cybersecurity Basics

JUMP TO

What is phishing?

 * Phishing definition
 * How phishing attacks work
 * Who is targeted by phishing?
 * Types of phishing attacks
 * How to identify a phishing attack
 * Examples of phishing attempts
 * Phishing examples in the news
 * How do I protect myself from phishing?
 * Why is phishing effective?
 * How does phishing affect my business?
 * History of phishing

 * Cybersecurity Basics
 * Antivirus
 * Malware
 * Ransomware
 * Adware
 * Spyware
 * Hacker
 * Phishing
 * Data breach
 * Android antivirus
 * Trojan
 * Mac antivirus
 * Emotet
 * Keylogger
 * Spam
 * SQL injection
 * DDoS
 * Spoofing
 * Cryptojacking
 * Scam call
 * Exploits
 * Malvertising
 * Backdoor
 * Identity theft
 * Computer virus
 * GandCrab
 * VPN
 * Social engineering
 * Password manager
 * What is EDR?
 * What is endpoint protection?
 * Pharming
 * Ryuk ransomware
 * Trickbot

CYBERSECURITY PRODUCTS

For Home
View all Malwarebytes products

For Home


Malwarebytes for Windows Malwarebytes for Mac Malwarebytes for Android
Malwarebytes for iOS Malwarebytes for Chromebook



For Business


Malwarebytes Endpoint Detection and Response Malwarebytes Endpoint Protection
Malwarebytes Incident Response View all




PHISHING DEFINITION

Phishing is an attack in which the threat actor poses as a trusted person or
organization to trick potential victims into sharing sensitive information or
sending them money. As with real fishing, there's more than one way to reel in a
victim: Email phishing, smishing, and vishing are three common types. Some
attackers take a targeted approach, as is the case with spear phishing or whale
phishing (more on the types of phishing below). 




HOW PHISHING ATTACKS WORK

Phishing attacks begin with the threat actor sending a communication, acting as
someone trusted or familiar. The sender asks the recipient to take an action,
often implying an urgent need to do so. Victims who fall for the scam may give
away sensitive information that could cost them. Here are more details on how
phishing attacks work: 

 * The sender: In a phishing attack, the sender imitates (or “spoofs”) someone
   trustworthy that the recipient would likely know. Depending on the type of
   phishing attack, it could be an individual, like a family member of the
   recipient, the CEO of the company they work for, or even someone famous who
   is supposedly giving something away. Often phishing messages mimic emails
   from large companies like PayPal, Amazon, or Microsoft, and also banks or
   government offices. 
 * The message: Under the guise of someone trusted, the attacker will ask the
   recipient to click a link, download an attachment, or to send money. When the
   victim opens the message, they find a scary message meant to overcome their
   better judgement by filling them with fear. The message may demand that the
   victim go to a website and take immediate action or risk some sort of
   consequence. 
 * The destination: If users take the bait and click the link, they're sent to
   an imitation of a legitimate website. From here, they're asked to log in with
   their username and password credentials. If they are gullible enough to
   comply, the sign-on information goes to the attacker, who uses it to steal
   identities, pilfer bank accounts, and sell personal information on the black
   market.


WHO IS TARGETED BY PHISHING? 

Anyone can be targeted with a phishing attack, but some types of phishing are
done to very specific people. Some threat actors will send out a general email
to many people, hoping a few will take the bait based on a common trait. An
example would be saying something is wrong with your Facebook or Amazon account,
and you need to click this link right away to log in and fix it. The link would
likely lead to a spoofed webpage where you might give away your login
credentials. 

Threat actors use more targeted phishing attacks if they are after something
specific, like access to a certain company's network or data, or information
from a politician or political candidate. This is called spear phishing. In this
case, they may research information to make their attack sound familiar and
credible, so the target is more likely to click a link or provide information.
An example would be researching the name and communication style of a target
company's CEO, then emailing or texting specific employees at that company
pretending to be the CEO asking for something. 

While threat actors often pretend to be CEOs in their phishing attacks,
sometimes the target is the CEO themself. "Whale phishing" describes phishing
attacks toward high-profile people like company executives, celebrities, or
well-known wealthy individuals.  Whether an attack is general or highly
targeted, sent to one person or many people, anyone can become a phishing
target, so it's important to 


TYPES OF PHISHING ATTACKS

Despite their many varieties, the common denominator of all phishing attacks is
their use of a fraudulent pretense to acquire valuables. Some major categories
include:

Email phishing

Email phishing is one of the most common types of phishing. It has been
widespread since the early days of e-mail. The attacker sends an email
purporting to be someone trustworthy and familiar (online retailer, bank, social
media company, etc.), and asks you to click a link to take an important action,
or perhaps download an attachment. 

Some specific examples of email phishing include:

 * Business email compromise (BEC): A business email compromise (BEC) attack
   targets someone in the finance department of an organization, often the CFO,
   and attempts to deceive them into sending large sums of money. Attackers
   often use social engineering tactics to convince the recipient that sending
   the money is urgent and necessary. 
 * Clone phishing: In this attack, criminals make a copy—or clone—of previously
   delivered but legitimate emails that contain either a link or an attachment.
   Then, the phisher replaces the links or attached files with malicious
   substitutions disguised as the real thing. Unsuspecting users either click
   the link or open the attachment, which often allows their systems to be
   commandeered. Then the phisher can counterfeit the victim's identity in order
   to masquerade as a trusted sender to other victims in the same organization.
 * 419/Nigerian scams: A verbose phishing email from someone claiming to be a
   Nigerian prince is one of the Internet's earliest and longest-running scams.
   This "prince" either offers you money, but says you need to send him a small
   amount first in order to claim it, or he says he is in trouble, and needs
   funds to resolve it. The number "419" is associated with this scam. It refers
   to the section of the Nigerian Criminal Code dealing with fraud, the charges,
   and penalties for offenders.


VISHING (VOICE CALL PHISHING)

With phone-based phishing attempts, sometimes called voice phishing or
“vishing,” the phisher calls claiming to represent your local bank, the police,
or even the IRS. Next, they scare you with some sort of problem and insist you
clear it up immediately by sharing your account information or paying a fine.
They usually ask that you pay with a wire transfer or with prepaid cards, so
they are impossible to track. 


SMISHING (SMS OR TEXT MESSAGE PHISHING)

SMS phishing, or “smishing,” is vishing's evil twin, carrying out the same kind
of scam (sometimes with an embedded malicious link to click) by means of SMS
texting.


CATPHISHING

Catfishing or catphishing? Either way, it's phishing with a romantic twist.
Check out our article Bad romance: catphishing explained. From the article: 

Catfishing (spelled with an “f”) is a kind of online deception wherein a person
creates a presence in social networks as a sock puppet or a fictional online
persona for the purpose of luring someone into a relationship—usually a romantic
one—in order to get money, gifts, or attention. Catphishing (spelled with a
“ph”) is similar, but with the intent of gaining rapport and (consequently)
access to information and/or resources that the unknowing target has rights to.


SPEAR PHISHING

Phishing vs. spear phishing: While most phishing campaigns send mass emails to
as many people as possible, spear phishing is targeted. Spear phishing attacks a
specific person or organization, often with content that is tailor made for the
victim or victims. It requires pre-attack reconnaissance to uncover names, job
titles, email addresses, and the like. The hackers scour the Internet to match
up this information with other researched knowledge about the target's
colleagues, along with the names and professional relationships of key employees
in their organizations. With this, the phisher crafts a believable email.

For instance, a fraudster might spear phish an employee whose responsibilities
include the ability to authorize payments. The email purports to be from an
executive in the organization, commanding the employee to send a substantial
payment either to the exec or to a company vendor (when in fact, the malicious
payment link sends it to the attacker).

“A verbose phishing email from someone claiming to be a Nigerian prince is one
of the Internet's earliest and longest-running scams.”


WHALE PHISHING

Whale phishing is what it probably sounds like: Phishing that targets
high-profile victims. This can include celebrities, politicians, and C-level
businesspeople. Typically, the attacker is trying to trick these well-known
targets into giving our their personal information and/or business credentials.
Whaling attacks usually involve social engineering efforts to trick the victim
into believing the deception. 


HOW TO IDENTIFY A PHISHING ATTACK

Recognizing a phishing attempt isn't always easy, but a few tips, a little
discipline, and some common sense will go a long way. Look for something that's
off or unusual. Ask yourself if the message passes the “smell test.” Trust your
intuition, but don't let yourself get swept up by fear. Phishing attacks often
use fear to cloud your judgement.

Here are a few more signs of a phishing attempt:

 * The email makes an offer that sounds too good to be true. It might say you've
   won the lottery, an expensive prize, or some other over-the-top item. 
 * You recognize the sender, but it's someone you don't talk to. Even if the
   sender's name is known to you, be suspicious if it's someone you don't
   normally communicate with, especially if the email's content has nothing to
   do with your normal job responsibilities. Same goes if you're cc'd in an
   email to folks you don't even know, or perhaps a group of colleagues from
   unrelated business units.
 * The message sounds scary. Beware if the email has charged or alarmist
   language to create a sense of urgency, exhorting you to click and “act now”
   before your account is terminated. Remember, responsible organizations do not
   ask for personal details over the Internet.
 * The message contains unexpected or unusual attachments. These attachments may
   contain malware, ransomware, or another online threat.
 * The message contains links that look a little off. Even if your spider sense
   is not tingling about any of the above, don't take any embedded hyperlinks at
   face value. Instead, hover your cursor over the link to see the actual URL.
   Be especially on the lookout for subtle misspellings in an otherwise
   familiar-looking website, because it indicates fakery. It's always better to
   directly type in the URL yourself rather than clicking on the embedded link.


EXAMPLES OF PHISHING ATTEMPTS

Here's an example of a phishing attempt that spoofs a notice from PayPal, asking
the recipient to click on the “Confirm Now” button. Mousing over the button
reveals the true URL destination in the red rectangle.



Here's another phishing attack image, this time claiming to be from Amazon. Note
the threat to close the account if there's no response within 48 hours.



Clicking on the link leads you to this form, inviting you to give away what the
phisher needs to plunder your valuables:




PHISHING EXAMPLES IN THE NEWS

 * Watch out for this bump in LinkedIn phishing
 * Microsoft warns of phishy OAuth apps
 * Phishers on the prowl with fake parking meter QR codes
 * Intercepting 2FA: Over 1200 man-in-the-middle phishing toolkits detected
 * Phishers target TikTok influencers with verification promises and copyright
   threats
 * This Steam phish baits you with free Discord Nitro
 * Microsoft warns about phishing campaign using open redirects
 * How to spot a DocuSign phish and what to do about it


HOW DO I PROTECT MYSELF AGAINST PHISHING?

As stated previously, phishing is an equal opportunity threat, capable of
showing up on desktops, laptops, tablets, and smartphones. Most Internet
browsers have ways to check if a link is safe, but the first line of defense
against phishing is your judgement. Train yourself to recognize the signs of
phishing and try to practice safe computing whenever you check your email, read
Facebook posts, or play your favorite online game.

Once again from our own Adam Kujawa, here are a few of the most important
practices to keep you safe:

 * Don't open e-mails from senders you are not familiar with.
 * Don't ever click on a link inside of an e-mail unless you know exactly where
   it is going.
 * To layer that protection, if you get an e-mail from a source you are unsure
   of, navigate to the provided link manually by entering the legitimate website
   address into your browser.
 * Lookout for the digital certificate of a website.
 * If you are asked to provide sensitive information, check that the URL of the
   page starts with “HTTPS” instead of just “HTTP.” The “S” stands for
   “secure.”It's not a guarantee that a site is legitimate, but most legitimate
   sites use HTTPS because it's more secure. HTTP sites, even legitimate ones,
   are vulnerable to hackers.
 * If you suspect an e-mail isn't legitimate, take a name or some text from the
   message and put it into a search engine to see if any known phishing attacks
   exist using the same methods.
 * Mouseover the link to see if it's a legitimate link.

As always, we recommend using antivirus/anti-malware security software like
Malwarebytes Premium. Most cybersecurity tools have the ability to detect when a
link or an attachment isn't what it seems, so even if you fall for a clever
phishing attempt, you won't end up sharing your info with the wrong people. You
can even try Malwarebytes free before you buy. 

So stay vigilant, take precautions, and look out for anything phishy.


WHY IS PHISHING EFFECTIVE? 

Unlike other kinds of online threats, phishing does not require particularly
sophisticated technical expertise. In fact, according to Adam Kujawa, Director
of Malwarebytes Labs, “Phishing is the simplest kind of cyberattack, and at the
same time, the most dangerous and effective. That is because it attacks the most
vulnerable and powerful computer on the planet: the human mind.” 

“Phishing is the simplest kind of cyberattack, and at the same time, the most
dangerous and effective.”

Phishers are not trying to exploit a technical vulnerability in your device's
operation system—they're using social engineering. From Windows and iPhones, to
Macs and Androids, no operating system is completely safe from phishing, no
matter how strong its security is. In fact, attackers often resort to phishing
because they can't find any technical vulnerabilities. Why waste time cracking
through layers of security when you can trick someone into handing you the key?
More often than not, the weakest link in a security system isn't a glitch buried
in computer code, it's a human being who doesn't double check where an email
came from.


HOW DOES PHISHING AFFECT MY BUSINESS?

The fact of the matter is this—cybercriminals are targeting your business. As
reported in the Malwarebytes Labs Cybercrime Tactics and Techniques Report
(CTNT), attacks on businesses went up 55 percent in the second half of 2018 with
Trojans and ransomware proving to be the most popular types of attacks.
Specifically, Trojan attacks on businesses rose 84 percent while ransomware
attacks went up 88 percent. Phishing often plays an important role in Trojan and
ransomware attacks, because cybercriminals rely on phishing emails to get
victims to download the malware and initiate the attack.

The Emotet banking Trojan, for instance, that wreaked havoc throughout 2018
includes a spam module that scans contact lists on an infected computer and
sends your friends, family, and coworkers phishing emails that link to a malware
laden attachment or download. In an interesting twist, Emotet, once a banking
Trojan in its own right, is now being used to deliver other malware, including
ransomware.

What happens once malware like Emotet gets a foothold on your network via a
phishing attack? Just ask the beleaguered city officials of Allentown. The 2018
attack on the Pennsylvania city required direct help from Microsoft’s incident
response team to clean up and reportedly cost the city upwards of one million
dollars to fix.

See all our reporting on phishing at Malwarebytes Labs. 


HISTORY OF PHISHING

The origin of the name “phishing” is easy enough to trace. The process of
performing a phishing scam is much like actual, aquatic fishing. You assemble
some bait designed to deceive your victim, then you cast it out and hope for a
bite. As for the digraph “ph” replacing the “f,” it could be the result of a
portmanteau of “fishing” and “phony,” but some sources point back to another
possible origin.

In the 1970s, a subculture formed around the practice of using low-tech hacks to
exploit the telephone system. These early hackers were called “phreaks”—a
combination of “phone” and “freaks.” At a time when there weren't many networked
computers to hack, phreaking was a common way to make free long-distance calls
or reach unlisted numbers.

Even before the actual phishing term took hold, a phishing technique was
described in detail in a paper and presentation delivered to the 1987
International HP Users Group, Interex.

The use of the name itself is first attributed to a notorious spammer and hacker
in the mid-1990s, Khan C Smith. Also, according to Internet records, the first
time that phishing was publicly used and recorded was on January 2, 1996. The
mention occurred in a Usenet newsgroup called AOHell. At the time, America
Online (AOL) was the number one provider of Internet access, with millions of
log-ons daily.

Naturally, AOL's popularity made it a target for fraudsters. Hackers and
software pirates used it to communicate with one another, as well as to conduct
phishing attacks on legitimate users. When AOL took steps to shut down AOHell,
the attackers turned to other techniques. They sent messages to AOL users
claiming to be AOL employees and asked people to verify their accounts and hand
over billing information. Eventually, the problem grew so bad that AOL added
warnings on all email and instant messenger clients stating "no one working at
AOL will ask for your password or billing information."

“Social networking sites became a prime phishing target.”

Going into the 2000s, phishing turned its attention to exploiting online payment
systems. It became common for phishers to target bank and online payment service
customers, some of whom—according to subsequent research—might have even been
accurately identified and matched to the actual bank they used. Likewise, social
networking sites became a prime phishing target, attractive to fraudsters since
personal details on such sites are useful for identity theft.

Criminals registered dozens of domains that spoofed eBay and PayPal well enough
that they passed for the real thing if you weren't paying close enough
attention. PayPal customers then received phishing emails (containing links to
the fake website), asking them to update their credit card numbers and other
personally identifiable information. The first known phishing attack against a
bank was reported by The Banker (a publication owned by The Financial Times
Ltd.) in September 2003.

By the mid-2000s, turnkey phishing software was readily available on the black
market. At the same time, groups of hackers began to organize in order to
orchestrate sophisticated phishing campaigns. Estimated losses due to successful
phishing during this time vary, with a 2007 report from Gartner stating that as
many as 3.6 million adults lost $3.2 billion between August 2006 and August
2007.

“In 2013, 110 million customer and credit card records were stolen from Target
customers.”

In 2011, phishing found state sponsors when a suspected Chinese phishing
campaign targeted Gmail accounts of highly ranked officials of the United States
and South Korean governments and militaries, as well as Chinese political
activists.

In perhaps the most famous event, in 2013, 110 million customer and credit card
records were stolen from Target customers, through a phished subcontractor
account.

Even more infamous was the phishing campaign launched by Fancy Bear (a cyber
espionage group associated with the Russian military intelligence agency GRU)
against email addresses associated with the Democratic National Committee in the
first quarter of 2016. In particular, Hillary Clinton's campaign manager for the
2016 presidential election, John Podesta, had his Gmail hacked and subsequently
leaked after falling for the oldest trick in the book—a phishing attack claiming
that his email password had been compromised (so click here to change it).

In 2017, a massive phishing scam tricked Google and Facebook accounting
departments into wiring money, a total of over $100 million, to overseas bank
accounts under the control of a hacker.

Cyberprotection for every one.

CYBERSECURITY INFO YOU CAN'T DO WITHOUT

Want to stay informed on the latest news in cybersecurity? Sign up for our
newsletter and learn how to protect your computer from threats.



Cyberprotection for every one.

FOR PERSONAL

Windows

Mac

iOS

Android

Privacy VPN

SEE ALL

COMPANY

About Us

Contact Us

Careers

News and Press

Blog

Scholarship

Forums

FOR BUSINESS

Small Businesses

Mid-size Businesses

Large Enterprise

Endpoint Protection

Endpoint Detection & Response

MY ACCOUNT

Sign In

SOLUTIONS

Free Rootkit Scanner

Free Trojan Scanner

Free Virus Scanner

Free Spyware Scanner

Anti Ransomware Protection

SEE ALL

ADDRESS

3979 Freedom Circle
12th Floor
Santa Clara, CA 95054

ADDRESS

One Albert Quay
2nd Floor
Cork T12 X8N6
Ireland

LEARN

Malware

Hacking

Phishing

Ransomware

Computer Virus

Antivirus

COMPANY

About Us

Contact Us

Careers

News and Press

Blog

Scholarship

Forums

MY ACCOUNT

Sign In

ADDRESS

3979 Freedom Circle, 12th Floor
Santa Clara, CA 95054

ADDRESS

One Albert Quay, 2nd Floor
Cork T12 X8N6
Ireland


   English
EULA
Privacy
Accessibility
Terms of Service


© 2022 All Rights Reserved

Select your language

 * English
 * Deutsch
 * Español
 * Français
 * Italiano
 * Português (Portugal)
 * Português (Brasil)
 * Nederlands
 * Polski
 * Pусский
 * 日本語
 * Svenska