HomeCyber BalkansMassive Phishing Campaign Exploits 6,000 Sites

Massive Phishing Campaign Exploits 6,000 Sites

Published on

spot_img

A massive phishing campaign has been discovered by Bolster’s threat research team, targeting over 100 well-known clothing, footwear, and apparel companies. The campaign, which began in June 2022 and peaked between November 2022 and February 2023, involved brand impersonation and impacted companies such as Nike, Puma, Asics, Vans, Adidas, Columbia, Superdry, Converse, Casio, Timberland, Salomon, Crocs, Sketchers, The North Face, UGG, Guess, Caterpillar, New Balance, Fila, Doc Martens, Reebok, Tommy Hilfiger, and many more.

During the investigation, Bolster’s researchers uncovered a vast network of brand imitation scam websites, consisting of over 3,000 domains and approximately 6,000 sites, including inactive ones. The campaign’s domains were found to be linked to the autonomous system AS48950, with IP addresses hosted by Packet Exchange Limited and Global Colocation Limited. Both service providers have a reputation for being vulnerable to scams. Most of the domains involved in the campaign had an average age ranging from two to 90 days and were registered through Alibaba.com Singapore.

The attackers behind the campaign utilized a pattern of combining the brand name with a random country name, followed by a generic top-level domain (TLD). For example, there were domains targeting Puma such as puma-shoes-singapore[.]com, pumaenmexico[.]com.mx, and bestpumaindia[.]in. Domain aging is an important factor in phishing operations, as the longer a domain remains active without causing harm, the less likely it is to be flagged as suspicious by security systems.

Confiant, a cybersecurity company, noted that domains should be allowed to age for at least two years to decrease suspicion. In the Bolster-found campaign, many of the malicious sites went undetected for a significant period, allowing them to be crawled by Google Search and potentially ranking highly for specific search phrases. The attackers employed various search engine optimization (SEO) techniques to manipulate search engine rankings and increase the visibility of their fraudulent sites.

Unfortunately, customers who fail to recognize these websites as illegitimate often fall victim to the scam. They unknowingly provide their personal information, including email, password, and payment card details, which can be used for various malicious purposes. Complicating matters further, some of these imitation websites are ranked highly in search engine results, leading victims to believe they are legitimate.

To protect themselves from such phishing campaigns, users are advised to verify the legitimacy of websites, especially when dealing with well-known brands. It’s crucial to be cautious of questionable domain names and to thoroughly investigate the integrity of a site if a deal or product pricing seems too good to be true.

As phishing attacks become increasingly sophisticated, email security solutions such as Trustifi’s AI-powered email security can help organizations prevent advanced email threats. By implementing robust security measures, individuals and businesses can better safeguard themselves against phishing and other cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...