Beware of Chinese Fake e-Commerce Websites Mimic Apple, Wrangler Jeans and Abuses Payment Services Like MasterCard and PayPal

The deluge of bargain-priced ads that flooded social networks during Latin America’s “Hot Sale 2025” has now been traced to a sprawling Chinese-built malware operation that weaponizes thousands of convincingly branded storefronts to harvest payment credentials. First noticed by Mexican journalist Ignacio Gómez Villaseñor while monitoring suspicious domains hosted on a single IP, the campaign rapidly expanded beyond Spanish-speaking audiences, cloning Apple’s accessories catalogue in English one day and Wrangler Jeans the next. Silent Push analysts identified the infrastructure after discovering an obfuscated “/cn/模板.css” path embedded in every template, a giveaway that the kit’s developer left debugging comments in Mandarin. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. For now, vigilant URL inspection—look for subtle misspellings and mismatched TLS certificates—remains the most reliable defence until issuers can integrate Silent Push’s feed of Indicators of Future Attack into real-time fraud scoring. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Victims are funnelled through glossy checkout pages that accept Visa, MasterCard, PayPal and even Google Pay, masking the theft with authentic logos and a working countdown timer that simulates order processing. Within weeks, payment processors were reporting spikes in disputed transactions tied to virtual card numbers, an indication that Google Pay’s tokenisation alone cannot shield users if goods are never shipped. Silent Push researchers note that once a domain is reported, DNS records switch to a fresh IP and the widget rewrites itself with a new CDN stub, preserving the merchant façade while nullifying blacklists. Pivoting on that fingerprint exposed more than 9 000 domains registered since March—typos like “harborfrieght.shop” and “tommyilfigershop.com”—all resolving to a rotating pool of Alibaba-hosted servers. The fake website shows the same Wrangler layout reused under “harborfrieght.shop”, illustrating how the kit simply substitutes brand logos and colour palettes during deployment. Because no malware binary is installed, endpoint detection must instead correlate rapid domain churn with payment-form exfiltration, a task better suited to network-level anomaly engines than to traditional AV. The group keeps overhead low by scraping genuine product imagery directly from the real retailers each time a shopper opens the page, ensuring that takedowns of one brand have no effect on the others. Meanwhile, consumer-grade antivirus tools remained silent because no executable payload is ever dropped; all malicious logic lives in JavaScript delivered from the same CDN that hosts legitimate Shopify plug-ins. The conditional ensures the malware only executes on domains ending in “.shop”, preventing analysts who copy HTML to a lab VM. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. To stay online, the operators register forty to fifty look-alike domains per day and rotate them behind reverse proxies that rewrite HTTP headers on the fly. By base-64-encoding a timestamp, the path changes every page load, defeating signature-based web-filters that rely on fixed IOC lists.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 03 Jul 2025 11:25:15 +0000


Cyber News related to Beware of Chinese Fake e-Commerce Websites Mimic Apple, Wrangler Jeans and Abuses Payment Services Like MasterCard and PayPal

Beware of Chinese Fake e-Commerce Websites Mimic Apple, Wrangler Jeans and Abuses Payment Services Like MasterCard and PayPal - The deluge of bargain-priced ads that flooded social networks during Latin America’s “Hot Sale 2025” has now been traced to a sprawling Chinese-built malware operation that weaponizes thousands of convincingly branded storefronts to harvest ...
5 months ago Cybersecuritynews.com
Beware: PayPal "New Address" feature abused to send phishing emails - The email includes the new address that was allegedly added to your PayPal account, including a message claiming to be a purchase confirmation for a MacBook M4, and to call the enclosed PayPal number if you did not authorize the purchase. The goal of ...
9 months ago Bleepingcomputer.com
CVE-2023-7080 - The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. wrangler dev would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to ...
1 year ago
Chinese hacking documents offer glimpse into state surveillance - Chinese police are investigating an unauthorized and highly unusual online dump of documents from a private security contractor linked to the nation's top policing agency and other parts of its government - a trove that catalogs apparent hacking ...
1 year ago Apnews.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
5 months ago Cybersecuritynews.com
Revolutionizing Commerce With AI - Picture a future where commerce is not just an exchange of goods and services but an intricate relationship of data, insights, and artificial intelligence. The AI revolution in commerce is redefining how we approach buying, selling, and market ...
1 year ago Feeds.dzone.com
E-commerce Security: Protecting Customer Data - In today's digital landscape, ensuring the security of customer data in e-commerce is a crucial concern for businesses. Protecting e-commerce data security is a complex task that requires a comprehensive understanding of the challenges faced by ...
1 year ago Securityzap.com
25 Best Cloud Service Providers (Public and Private) in 2025 - Oracle Cloud offers a variety of services, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), to help organizations build, deploy, and run applications in the cloud. Oracle Cloud is a cloud ...
6 months ago Cybersecuritynews.com
PayPal Data Breach – Check If You’re Affected - PayPal recently reported a data breach to its users. The breach exposed customers’ personal information, including email addresses, phone numbers, and physical addresses. This data breach has sent shockwaves through the online payments industry, as ...
2 years ago Hackread.com
Exploring Blockchain's Revolutionary Impact on E-Commerce - The trend of choosing online shopping over traditional in-store visits is on the rise, with e-commerce transactions dominating the digital landscape. Blockchain technology emerges as a solution to bolster the security of online transactions. ...
1 year ago Cysecurity.news Inception
Researchers Claim Apple Was Aware of AirDrop User Identification and Tracking Risks Since 2019 - Security researchers had reportedly alerted Apple about vulnerabilities in its AirDrop wireless sharing feature back in 2019. According to these researchers, Chinese authorities recently exploited these vulnerabilities to track users of the AirDrop ...
1 year ago Cysecurity.news
CVE-2022-31249 - A Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in wrangler of SUSE Rancher allows remote attackers to inject commands in the underlying host via crafted commands passed to Wrangler. ...
2 years ago
New Mimic Ransomware Abuses Windows Search Tool to Attack Victims - A new ransomware threat has been discovered that abuses the Windows Search Tool to locate and encrypt sensitive data. Dubbed Mimic, the ransomware was identified by malware researchers at Force Point Security Defense. Mimic encrypts a victim’s ...
2 years ago Bleepingcomputer.com
Uncovering Chinas Surveillance of the United States Spies Hackers and Informants - Last week, a Chinese surveillance balloon in the United States caused a diplomatic uproar and raised concerns about how Beijing collects intelligence on its biggest rival. FBI Director Christopher Wray said in 2020 that Chinese spying is the most ...
2 years ago Securityweek.com Silence
Cybersecurity Crisis Looms: FBI Chief Unveils Chinese Hackers' Plan to Target US Infrastructure - As the head of the FBI pointed out Wednesday, Beijing was positioning itself to disrupt the daily lives of Americans if there was ever a war between the United States and China if it were to plant malware to damage civilian infrastructure. U.S. ...
1 year ago Cysecurity.news Volt Typhoon
China-linked hackers spoof big-name brand websites to steal shoppers' payment info | The Record from Recorded Future News - The campaign, which has been active for months, uses thousands of phishing websites that mimic the design and product listings of well-known retailers — including Apple, PayPal, Nordstrom, Hermes, and Michael Kors — to trick users into entering ...
5 months ago Therecord.media
Pig Butchering: Fake Trading Apps Target Crypto on Apple, Google Play Stores - Pig Butchering scam targets crypto users with fake trading apps on Apple and Google Play Stores. These apps, found on Apple’s App Store and Google Play, and on phishing sites, are part of a Pig Butchering scam targeting cryptocurrency investors ...
1 year ago Hackread.com
Avast researchers detect a surge in fake e-shops following holidays - We kick off the new year with expectations of sales, but beware: a dangerous wave of fake e-shops is spreading on the internet. As the festive season wraps up, a new challenge emerges for online shoppers: the rise of over 4,000 counterfeit e-shops. ...
1 year ago Blog.avast.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
9 online scams to watch out for this holiday season - By being aware of these common online scams and taking precautions, you can protect yourself and your family from becoming victims this holiday season. The holiday season is upon us, and that means it's time to start shopping for gifts. It's not just ...
1 year ago Blog.avast.com
7 Months Inside an Online Scam Labor Camp - He had been kidnapped and forced to work for an abusive online scam operation. A man was abducted by a Chinese gang and forced to work in a scam operation. More than anything else, Neo Lu, a 28-year-old Chinese office worker, believed the gig would ...
1 year ago Nytimes.com
Fake browser updates spread updated WarmCookie malware - The latest campaign was discovered by researchers at Gen Threat Labs, who observed the WarmCookie backdoor being distributed as fake Google Chrome, Mozilla Firefox, Microsoft Edge, and Java updates. FakeUpdate is a cyberattack strategy used by a ...
1 year ago Bleepingcomputer.com
Hajj Pilgrimage Hit by Extensive Phishing and Data Theft Scams - Cybersecurity threats rise during this peak season as millions embark on the annual Hajj pilgrimage. This article offers crucial tips for pilgrims to safeguard themselves online while ensuring a safe and fulfilling Hajj experience. Every year, ...
1 year ago Hackread.com
CVE-2023-3348 - The Wrangler command line tool  (<wrangler@3.1.0 or <wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker ...
2 years ago
Beware of Fake CAPTCHA Prompts That May Silently Install LummaStealer on Your Device - The attack specifically targets users of booking websites by presenting fake booking confirmation pages that require CAPTCHA verification to view document details. The Infection Chain Flow shows how the attack progresses from the initial visit to a ...
8 months ago Cybersecuritynews.com