Threat Report: Black Fraud Day - Cybercriminals Capitalizing on Increased Online Shopping Activity
TLP:CLEAR | November 22nd, 2024
Source: Fraud network uses 4,700 fake shopping sites to steal credit cards | BleepingComputer
Overview:
With Black Friday quickly approaching and early sales already taking place, cybercriminals are launching sophisticated campaigns to capitalize on the imminent surge in online shopping. This activity echoes similar scams from this time last year that cost victims an average of $1228 CAD. Researchers at EclecticIQ recently uncovered a phishing campaign by SilkSpecter, a financially motivated Chinese threat actor, targeting shoppers in the US and Europe. SilkSpecter was observed using convincing, yet malicious websites, leveraging the following techniques and tools to give the impression of legitimacy:
- Typosquatting to impersonate legitimate retailers like The North Face, IKEA, and Wayfair. Often incorporating Black Friday-themed keywords into the URLs (e.g., makitablackfriday[.]shop).
- Use of .shop, .top, .store, and .vip top-level domains (TLDs). A technique that is being increasingly used by cybercriminals, as researchers at Satori have also observed.
- Displaying of deceptive icons falsely labelling them as a “Trusted Site”.
- Incorporation of the legitimate payment platform Stripe to process genuine transactions and redirect money to SilkSpecter accounts.
- Use of Google Translate's built-in functionality to dynamically adjust language settings based on the visitor's location, creating a localized and authentic user experience.
Any stolen phone numbers are then used for targeting victims with SMiShing and vishing attacks to steal authentication tokens. If successful, the threat actor could then potentially bypass extra security controls on target accounts such as multi-factor authentication (MFA).
What to Communicate to Executives:
Further Reading:
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers | EclecticIQ