Hackers Set Up 100+ Fake Stores to Steal Millions from Shoppers

Phish ‘n’ Ships, a sophisticated cyber fraud scheme, exploited multiple website vulnerabilities to host fake product listings, which, strategically optimized for search engines, lured unsuspecting consumers to fake web stores. 

Once there, victims were redirected to a separate checkout process integrated with compromised payment processors, enabling threat actors to siphon funds from victims while delivering no products. 

The scheme involved over 1,000 infected websites and 121 fake web stores, while coordinated efforts with affected payment processors have successfully disrupted the operation, removing fraudulent listings from search results and disabling threat actor accounts. 

Various products presented on Google image search

Phish ‘n’ Ships is a cyberattack targeting consumers seeking niche products, where malicious actors infiltrate websites with fake product listings to lure victims. 

When users attempt to purchase these items, attackers steal their payment card details by  leveraging social engineering to compromise user security. 

A 2014 crowdfunding campaign successfully launched a silicone “Power Mitt Oven Glove,” reminiscent of the Nintendo Power Glove. Despite being out of stock for years, demand persists for this unique product. 

Recent online searches reveal a product listing with free shipping, but the authenticity of the listing is questionable due to watermarks on the images that don’t align with the seller or the product link. 

One product listing pointing to an uncommon result

Cybercriminals are leveraging deceptive tactics to lure unsuspecting consumers into fake online stores. By manipulating search results and creating seemingly legitimate websites, they trick victims into purchasing non-existent products. 

These fraudulent sites often feature manipulated reviews and lack basic data validation, raising red flags. Once victims provide personal and financial information, cybercriminals can exploit it for various malicious purposes, including identity theft and financial fraud.

Payment processor-powered checkout on fake web store

The attack involves infecting legitimate websites with malicious scripts to host fake product listings, which are SEO-poisoned to rank highly in search results. 

When users click on these listings, they are redirected to fake web stores controlled by the attackers, which use payment processors to capture user payment card information, allowing the attackers to profit from fraudulent transactions.

The threat actors employed a sophisticated toolkit, including SEO manipulation bots, image scraping tools, and diverse payment processing methods, to create and promote fraudulent online stores. 

Payment card information captured by Phish ‘n’ Ships threat actors

According to HUMAN, they leveraged search trends to identify popular products, optimized listings for search engines, and employed direct payment mechanisms to bypass payment processors. 

Collaborative efforts between researchers, payment providers, and law enforcement have disrupted the operation by removing fraudulent listings, blocking accounts, and sharing threat intelligence.

The Phish ‘n’ Ships operation is a sophisticated, multi-layered cyberattack that leverages social engineering, website spoofing, and search engine manipulation to deceive unsuspecting victims into purchasing counterfeit goods. 

The attackers intend to make a profit from fraudulent online transactions by taking advantage of human psychology as well as gaps in technical security. 

While community efforts have made significant strides in disrupting this scheme, its adaptability and persistence highlight the ongoing need for vigilance and proactive cybersecurity measures to fully neutralize this threat. 

Also Read:

Kaaviya
Kaaviyahttps://cyberpress.org/
Kaaviya is a Security Editor and fellow reporter with Cyber Press. She is covering various cyber security incidents happening in the Cyber Space.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here