Home World Chinese criminals behind one of the world’s “biggest online scams” have tricked 800,000 people in Europe and the US into providing card details and personal data using fake designer goods stores.

Chinese criminals behind one of the world’s “biggest online scams” have tricked 800,000 people in Europe and the US into providing card details and personal data using fake designer goods stores.

0 comments
Chinese scammers have used fake websites claiming to sell designer products at deep discounts to steal people's data.

Chinese fraudsters using fake websites purporting to sell designer goods at deep discounts are believed to have made off with the credit card details and personal data of around 800,000 people in Europe and the United States, an investigation has revealed.

The scheme, called by a British trading standards body one of the biggest scams of its kind ever carried out, involves more than 75,000 websites bearing the logos of various high-end brands – from Nike to UNIQLO and from Paul Smith to Cartier- that claim to sell merchandise at a reduced price.

The English versions of the sites are accompanied by duplicates in several European languages, including French, German, Spanish and Italian, designed to mislead unsuspecting buyers.

And although about two-thirds of them have already been deactivated, researchers believe that more than 22,500 are still active and continue to deceive bargain-hunting online shoppers.

SR Labs, a German cybersecurity consultancy that discovered the scam, said a group of programmers appeared to have created a system to quickly generate and deploy new sites, dramatically increasing their reach.

Chinese scammers have used fake websites claiming to sell designer products at deep discounts to steal people’s data.

The Chinese group, dubbed “BogusBazaar” by SR Labs, is believed to have scammed millions of pounds, euros and dollars from its victims since launching the first sites in 2015.

Around 476,000 people are believed to have shared their debit and credit card details, including their three-digit security number.

But in many cases, scammers weren’t looking for money. Customers were often told upon payment that their bank, or the website itself, had rejected the payment request.

Although the money may have remained in their accounts, their personal details (including full name, address, credit card number and three-digit security code) were all in the hands of the scammers.

Vonny Gamot, EMEA director at online protection company McAfee, said: “Late last year, McAfee researchers saw an increase in luxury brand scams like these, including spikes of 600% over normal seasonal levels.

“Personal information is now a kind of currency because it is linked to everything from your bank accounts, investments, insurance payments and even tax returns and personal identification like driver’s licenses.”

And Jake Moore, global cybersecurity advisor at software company ESET, said The Guardian: “The big picture is that you have to assume that the Chinese government can potentially have access to the data,” he said.

Matthias Marx, a consultant at SR Labs, explained how a small team of programmers appeared to have created a system that can partially automate the generation and publishing of new versions of scam sites, helping the team scale their operation at a rapid pace.

A larger team is then hired to oversee and manage these sites in a sort of “franchise” model.

The English versions of the sites are accompanied by duplicates in several European languages, including French, German, Spanish and Italian, designed to mislead unsuspecting buyers.

The English versions of the sites are accompanied by duplicates in several European languages, including French, German, Spanish and Italian, designed to mislead unsuspecting buyers.

He explained that a central team develops the software and supports the operation of the network, while franchisees “manage the daily operations of the fraudulent stores.”

SR Labs decided to share the results of its research with a German newspaper Timewho then worked with The Guardian and French outlet Le Monde to dig deeper.

Their research found a wide variety of brands and companies that Chinese developers used to create their scam.

Although many of the brands were high-fashion hits like Christian Dior, researchers also found sites that imitated British high street favorites like shoemaker Clarks, as well as scam pages targeting those with a penchant for the work of individual designers. .

The products they intended to sell were not limited to just fashion either.

Websites were found purporting to sell everything from children’s toys to household items and garden furniture to car parts.

The sites had no connection to the brands they claimed to sell and consumers who used them told the inquiry they never received the items they thought they had bought.

However, the sites managed to trick buyers into sharing their information.

Personal data such as that obtained during scams could be valuable to foreign intelligence agencies and for surveillance purposes.

This week it emerged that up to 272,000 UK service staff could have been affected by a data breach.

Defense Secretary Grant Shapps blamed the attack on a “malign actor” but did not confirm reports that China was behind the theft.

Recent cyber attacks affecting the United Kingdom

March 2024

The UK and US have accused China of a global campaign of “malicious” cyberattacks in an unprecedented joint operation to reveal Beijing’s spying.

Britain has publicly blamed China for attacking the Electoral Commission watchdog and being behind an online “reconnaissance” campaign targeting the email accounts of MPs and peers.

The attack on the Electoral Commission was identified in October 2022, but hackers had been able to access the commission’s systems for the first time in more than a year, since August 2021.

December 2023

A Foreign Office minister told the House of Commons that private conversations of high-profile politicians and civil servants were compromised by Russia’s main security service during “sustained” attempts to interfere in UK politics. .

A cyber influence campaign carried out by a group known as Star Blizzard, “almost certainly” subordinate to an FSB cyber unit, had “selectively leaked and amplified information” since 2015.

July 2022

The British Army confirmed a ‘breach’ of its Twitter and YouTube accounts. The channel featured videos about cryptocurrency and images of billionaire businessman Elon Musk.

The official Twitter account had retweeted a series of posts that appeared to be related to NFTs (non-fungible tokens).

July 2021

The UK has accused the Chinese government of being behind “systematic cyber sabotage” following a hacking attack that affected a quarter of a million servers around the world. The attacks, which took place in early 2021, targeted Microsoft Exchange servers.

April 2021

Britain has accused Russia’s foreign intelligence service of being behind a major cyber attack against the West.

The Foreign, Commonwealth and Development Office (FCDO) said the National Cyber ​​Security Center (NCSC) had assessed that it was “very likely” that the SVR was responsible for the so-called SolarWinds hack.

July 2020

Britain, the United States and Canada accused Russian spies of attacking scientists trying to develop a coronavirus vaccine.

The three allies said hackers linked to Russian intelligence were seeking to steal secrets from research bodies around the world, including the UK.

You may also like