Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments

Posted on December 1, 2025December 1, 2025 By CWS

With the vacation procuring season kicking into excessive gear, a large cybersecurity risk has emerged, placing internet buyers at vital danger.

A coordinated marketing campaign has been found, involving the registration of over 2,000 pretend holiday-themed on-line shops.

These malicious websites are designed to lure unsuspecting shoppers with the promise of steep reductions, solely to steal their fee data and private knowledge.

The size of this operation is huge, with two distinct clusters of fraudulent storefronts recognized, each using subtle techniques to look legit and deceive buyers.

The primary cluster primarily consists of typosquatted domains mimicking Amazon, whereas the second spans a big selection of “.store” domains impersonating well-known manufacturers resembling Apple, Samsung, and Ray-Ban.

These pretend shops should not remoted incidents however a part of a large-scale, automated marketing campaign. The risk actors behind this operation have timed their assault to coincide with peak procuring durations like Black Friday and Cyber Monday, when shoppers are actively looking for bargains and could also be much less cautious about unfamiliar web sites.

Faux storefront (Supply – CloudSEK)

CloudSEK safety researchers famous the coordinated nature of those scams, figuring out using equivalent phishing kits, recurring web site templates, and shared infrastructure throughout the community of faux shops.

This stage of coordination suggests a well-organized and resourced operation. The influence on shoppers is extreme, starting from direct monetary losses to the long-term dangers of identification theft.

Moreover, these scams erode belief in legit on-line retailers and the e-commerce ecosystem as a complete.

An infection and Deception Ways

The modus operandi of those pretend shops is each easy and efficient. They leverage a mix of social engineering and technical evasion to trick customers and keep away from detection.

The websites are designed to seem like skilled e-commerce platforms, full with holiday-themed banners, countdown timers making a false sense of urgency, and pretend “belief badges” to construct credibility.

Fabricated “latest buy” pop-ups are additionally used to create social proof and stress guests into making a purchase order.

Faux Touchdown Web page (Supply – CloudSEK)

When a person makes an attempt to purchase a product, they’re redirected to a shell checkout web page designed to reap their billing and fee particulars.

These shell web sites usually use unflagged domains to course of transactions, permitting the attackers to bypass fraud detection methods.

Faux & Impersonating Domains:-

Area ClusterImpersonated BrandFake Area ExamplesCluster A (Amazon-themed)Amazonamaboxhub.com, amawarehousesale.com, amaznshop.comCluster B (.store domains)Xiaomixiaomidea.shopJo MaloneJomalonesafe.shopFujifilmFujifilmsafe.shopSamsungSamsungsafe.shopA common model[brand]protected.store or [brand]quick.store

The investigation additionally revealed {that a} shared Content material Supply Community (CDN), cdn.cloud360.prime, was used to serve belongings to over 750 of the pretend shops, additional highlighting the centralized nature of the marketing campaign.

A recurring JavaScript file, recognized by its distinctive SHA-256 hash, was additionally discovered throughout quite a few malicious .store domains, controlling the fraudulent checkout course of.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Fake, Hackers, HolidayThemed, Online, Payments, Registered, Steal, Stores, User

Post navigation

Previous Post: BreachLock Named a Leader in 2025 GigaOm Radar Report for Penetration Testing as a Service (PTaaS) for Third Consecutive Year
Next Post: Operation Hanoi Thief Attacking IT Professionals with Pseudo-Polyglot Payload to Hide Malware

Related Posts

Pro-Russian Hackers Attacking Key Industries in Major Countries Around The World Cyber Security News
UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports Cyber Security News
K2 Think AI Model Jailbroken Within Hours After The Release Cyber Security News
Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps Cyber Security News
New Vulnerability Affects All Intel Processors From The Last 6 Years Cyber Security News
Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark