Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign

Posted on August 5, 2025August 5, 2025 By CWS

Aug 05, 2025Ravie LakshmananMalware / Cell Safety
Cybersecurity researchers have lifted the veil on a widespread malicious marketing campaign that is focusing on TikTok Store customers globally with an goal to steal credentials and distribute trojanized apps.
“Menace actors are exploiting the official in-app e-commerce platform via a twin assault technique that mixes phishing and malware to focus on customers,” CTM360 stated. “The core tactic entails a misleading reproduction of TikTok Store that methods customers into pondering theyʼre interacting with a official affiliate or the true platform.”
The rip-off marketing campaign has been codenamed ClickTok by the Bahrain-based cybersecurity firm, calling out the menace actor’s multi-pronged distribution technique that entails Meta advertisements and synthetic intelligence (AI)-generated TikTok movies that mimic influencers or official model ambassadors.
Central to the trouble is the usage of lookalike domains that resemble official TikTok URLs. Over 15,000 such impersonated web sites have been recognized thus far. The overwhelming majority of those domains are hosted on top-level domains corresponding to .prime, .store, and .icu.
These domains are designed to host phishing touchdown pages that both steal consumer credentials or distribute bogus apps that deploy a variant of a recognized cross-platform malware referred to as SparkKitty that is able to harvesting knowledge from each Android and iOS units.

What’s extra, a piece of those phishing pages lure customers into depositing cryptocurrency on fraudulent storefronts by promoting faux product listings and heavy reductions. CTM360 stated it recognized at least 5,000 URLs which are arrange with an intent to obtain the malware-laced app by promoting it as TikTok Store.
“The rip-off mimics official TikTok Store exercise via faux advertisements, profiles, and AI-generated content material, tricking customers into partaking to distribute malware,” the corporate famous. “Faux advertisements are extensively circulated on Fb and TikTok, that includes AI-generated movies that mimic actual promotions to draw customers with closely discounted gives.”

The fraudulent scheme operates with three motives in thoughts, though the tip aim is monetary acquire, whatever the illicit monetization technique employed:

Deceiving consumers and associates program sellers (creators who promote merchandise in change for a fee on gross sales generated via the affiliate hyperlinks) with bogus and discounted merchandise and asking them to make funds in cryptocurrency
Convincing affiliate individuals to “prime up” faux on-site wallets with cryptocurrency, underneath the promise of future fee payouts or withdrawal bonuses that by no means materialize
Utilizing faux TikTok Store login pages to steal consumer credentials or instruct them to obtain trojanized TikTok apps

The malicious app, as soon as put in, prompts the sufferer to enter their credentials utilizing their email-based account, just for it to repeatedly fail in a deliberate try on the a part of the menace actors to current them with an alternate login utilizing their Google account.
This method is probably going meant to bypass conventional authentication flows and weaponize the session token created utilizing the OAuth-based methodology for unauthorized entry with out requiring in-app e-mail validation. Ought to the logged-in sufferer try and entry the TikTok Store part, they’re directed to a faux login web page that asks for his or her credentials.
Additionally embedded throughout the app is SparkKitty, a malware that is able to gadget fingerprinting and utilizing optical character recognition (OCR) strategies to research screenshots in a consumer’s picture gallery for cryptocurrency pockets seed phrases, and exfiltrating them to an attacker-controlled server.

The disclosure comes as the corporate additionally detailed one other focusing on phishing marketing campaign dubbed CyberHeist Phish that is utilizing Google Advertisements and hundreds of phishing hyperlinks to dupe victims looking for company on-line banking websites to be redirected to seemingly benign pages that mimic the focused banking login portal and are crafted to steal their credentials.
“This phishing operation is especially subtle as a consequence of its evasive, selective nature and the menace actors’ real-time interplay with the goal to gather two-factor authentication on every stage of login, beneficiary creation and fund switch,” CTM360 stated.

In current months, phishing campaigns have additionally focused Meta Enterprise Suite customers as a part of a marketing campaign referred to as Meta Mirage that makes use of faux coverage violation e-mail alerts, advert account restriction notices, and misleading verification requests distributed through e-mail and direct messages to guide victims to credential and cookie harvesting pages are hosted on Vercel, GitHub Pages, Netlify, and Firebase.
“This marketing campaign focuses on compromising high-value enterprise belongings, together with advert accounts, verified model pages, and administrator-level entry throughout the platform,” the corporate added.
These developments coincide with an advisory from the U.S. Division of the Treasury’s Monetary Crimes Enforcement Community (FinCEN), urging monetary establishments to be vigilant in figuring out and reporting suspicious exercise involving convertible digital forex (CVC) kiosks in a bid to fight fraud and different illicit actions.
“Criminals are relentless of their efforts to steal cash from victims, they usually’ve discovered to use progressive applied sciences like CVC kiosks,” stated FinCEN Director Andrea Gacki. “America is dedicated to safeguarding the digital asset ecosystem for official companies and customers, and monetary establishments are a crucial associate in that effort.”

The Hacker News Tags:AIdriven, Campaign, Crypto, Deliver, Domains, Fake, Malware, Scam, Shop, Steal, TikTok

Post navigation

Previous Post: New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data
Next Post: SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation

Related Posts

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware The Hacker News
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted The Hacker News
3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics The Hacker News
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign The Hacker News
Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents The Hacker News
Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)
  • How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents
  • Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability
  • Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware
  • Fashion Giant Chanel Hacked in Wave of Salesforce Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)
  • How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents
  • Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability
  • Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware
  • Fashion Giant Chanel Hacked in Wave of Salesforce Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News