Cyber Crime Wave: Chinese Scammers Target Europe with Fake Designer Brands

In the last couple of weeks, there has been an increase in the number of people who have been duped into sharing their card details and other personal information with a network of fake online designer shops that are operated from China, which appear to have duped over 800,000 people in Europe and the United States.
This report by the Guardian, Die Zeit, and Le Monde gives an inside look at one of the biggest scams of its kind, one that has created 76,000 fake websites in the UK, considered one of the largest scams.
A large number of fake web shops have been created on an industrial scale by programmers who offer discounted goods from brands like Dior, Nike, Lacoste, Hugo Boss, Versace, Prada, and many others on an industrial scale.
It is believed that over 75,000 websites with logos of various high-end brands, such as Nike, UNIQLO, Paul Smith, and Cartier, are carrying out the ruse, which has been called one of the biggest scams ever to take place.
These English versions of the sites are accompanied by duplicates in several other European languages such as French, German, Spanish and Italian, intended to scam unsuspecting consumers from around the globe.
According to SR Labs, a German cybersecurity consultancy that uncovered the scam, a group of programmers had developed a system that enabled them to create and deploy new websites rapidly, which dramatically increased their reach.
As a result, programmers are operating on an industrial scale to create thousands of fake online shops selling Dior, Nike, Lacoste, Hugo Boss, Versace, Prada and other luxury brands at discounts.
In most cases consumers who spoke about their experiences said that they did not receive any items from the sites, as they had no affiliation to the brands they were claiming to sell.
It is important to note that in many cases these scammers are not looking to get money from customers.
Even though the funds remained in their accounts, their details - including their full names, addresses, credit card numbers and three-digit security codes - were all in the hands of the scammers, even though their details remained in their accounts.
It's important to realize that, as a matter of course, it is safe to assume that the Chinese government might be able to access the data, he stated.
According to her, many of these individuals belong to serious and organised crime groups, or they are affiliated with them, and so they may harvest data that they will be able to use against people later, which makes consumers more vulnerable to phishing attacks.
A German cybersecurity consultancy called Security Research Labs disclosed the existence of the fake shop's network to Die Zeit, which obtained several gigabytes of data from several sources and shared that data with them.
He explained that he believes a small team of programmers has been able to develop a system that can automate a portion of the process for creating and deploying new versions of scam sites, which will help the company grow rapidly.
A growing number of people are becoming victims of online scams.
Remarkably, online shopping fraud emerged as the second most frequently reported scam.
Matt Hepburn, the designated spokesperson on fraud matters for TSB, underscored that purchase fraud stands as a primary catalyst for online financial crime in the UK. He advocated for heightened vigilance on the part of technology companies, emphasizing the imperative for them to bolster safeguards that shield consumers.
Specifically, he urged search engines and tech platforms to proactively curtail user exposure to fraudulent sites and expeditiously remove reported scam content.
Echoing similar sentiments, Hester Abrams, serving as the international engagement manager at Stop Scams UK, stressed the necessity for concerted efforts by both businesses and governmental entities to elevate scam prevention to the forefront of their agendas.
Abrams emphasized the potential efficacy of a more cohesive international approach to combating criminal exploitation of digital systems, highlighting the substantial impact that such collective action could yield against scammers.


This Cyber News was published on www.cysecurity.news. Publication date: Sun, 12 May 2024 14:28:06 +0000


Cyber News related to Cyber Crime Wave: Chinese Scammers Target Europe with Fake Designer Brands

Cyber Crime Wave: Chinese Scammers Target Europe with Fake Designer Brands - In the last couple of weeks, there has been an increase in the number of people who have been duped into sharing their card details and other personal information with a network of fake online designer shops that are operated from China, which appear ...
5 months ago Cysecurity.news
Chinese hacking documents offer glimpse into state surveillance - Chinese police are investigating an unauthorized and highly unusual online dump of documents from a private security contractor linked to the nation's top policing agency and other parts of its government - a trove that catalogs apparent hacking ...
8 months ago Apnews.com
Uncovering Chinas Surveillance of the United States Spies Hackers and Informants - Last week, a Chinese surveillance balloon in the United States caused a diplomatic uproar and raised concerns about how Beijing collects intelligence on its biggest rival. FBI Director Christopher Wray said in 2020 that Chinese spying is the most ...
1 year ago Securityweek.com
Fraudsters Successfully Inserted Cryptocurrency Programs into Apple and Google's App Stores - Scammers were able to get two malicious apps onto the app stores of both Google and Apple, allowing them to trick users into investing in fake cryptocurrency. According to a report from Sophos, the apps, Ace Pro and MBM BitScan, were found on both ...
1 year ago Therecord.media
Cybersecurity Crisis Looms: FBI Chief Unveils Chinese Hackers' Plan to Target US Infrastructure - As the head of the FBI pointed out Wednesday, Beijing was positioning itself to disrupt the daily lives of Americans if there was ever a war between the United States and China if it were to plant malware to damage civilian infrastructure. U.S. ...
9 months ago Cysecurity.news
Best of 2023: Why is everyone getting hacked on Facebook? - Importantly, phishing relies on the victim trusting the scammer and taking an action - like clicking a link or sending bank account information - in order for the scammer to get what they want. It's not your imagination - social media scams really ...
10 months ago Securityboulevard.com
Most scammed items for this Christmas season - As the festive season is just a couple of days ahead, the joy of giving and receiving is accompanied by an unfortunate increase in scams targeting unsuspecting holiday shoppers. Scammers are adept at exploiting the spirit of generosity and the rush ...
10 months ago Cybersecurity-insiders.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
9 months ago Securityzap.com
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
8 months ago Cyberdefensemagazine.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
9 months ago Scmagazine.com
Wargames director Jackie Schneider on why cyber is one of 'the most interesting scholarly puzzles' - In other games, we had people from Silicon Valley who were leading AI companies or cyber companies. What we found is those who had expertise in cyber operations were more likely to be more nuanced about how they used the cyber capability. On a larger ...
5 months ago Therecord.media
Opening Statement by CISA Director Jen Easterly - Chairman Gallagher, Ranking Member Krishnamoorthi, Members of the Committee, thank you for the opportunity to testify on CISA's efforts to protect the Nation from the preeminent cyber threat posed by the People's Republic of China. As America's ...
9 months ago Cisa.gov
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
6 months ago Cyberdefensemagazine.com
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
11 months ago Techrepublic.com
Cyber Insights 2023: The Geopolitical Effect - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. The Russia/Ukraine war that started in early 2022 has been mirrored by a ...
1 year ago Securityweek.com
Does Pentesting Actually Save You Money On Cyber Insurance Premiums? - Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm as well by ...
10 months ago Securityboulevard.com
9 online scams to watch out for this holiday season - By being aware of these common online scams and taking precautions, you can protect yourself and your family from becoming victims this holiday season. The holiday season is upon us, and that means it's time to start shopping for gifts. It's not just ...
11 months ago Blog.avast.com
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
10 months ago Techrepublic.com
Avast researchers detect a surge in fake e-shops following holidays - We kick off the new year with expectations of sales, but beware: a dangerous wave of fake e-shops is spreading on the internet. As the festive season wraps up, a new challenge emerges for online shoppers: the rise of over 4,000 counterfeit e-shops. ...
10 months ago Blog.avast.com
DHS and FBI: Chinese Drones Pose Major Threat to U.S. Security - The cybersecurity arm of the Department of Homeland Security and the Federal Bureau of Investigation have jointly issued a public service announcement cautioning about the potential risks posed by Chinese-manufactured drones to critical ...
9 months ago Cysecurity.news
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
1 year ago Securityweek.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 month ago Cyberdefensemagazine.com
7 Months Inside an Online Scam Labor Camp - He had been kidnapped and forced to work for an abusive online scam operation. A man was abducted by a Chinese gang and forced to work in a scam operation. More than anything else, Neo Lu, a 28-year-old Chinese office worker, believed the gig would ...
10 months ago Nytimes.com
The Evolution of Cyber Threats: Past, Present, and Future - Cyber threats have evolved significantly over time, posing increasing risks to individuals, organizations, and governments in our interconnected world. Let's explore the past, present, and future of cyber threats to better understand how to protect ...
9 months ago Securityzap.com
Mississippi Creates New Cyber Unit and Names First Director - The state of Mississippi has recently announced the creation of a new dedicated cyber security unit, as well as the naming of its first director. The Mississippi Cyber Security Unit, headed by Director Kelly Hurst and backed by the Mississippi Office ...
1 year ago Securityweek.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)