Over 800 Phony "Temu" Domains Lure Shoppers into Credential Theft

Stay alert against Temu phishing scams: Cybersecurity experts warn of scammers using fake giveaways to steal credentials.
Over 800 new 'Temu' domains registered in the past 3 months.
Temu is the latest brand chosen by scammers for their phishing scams.
For your information, Temu is an international e-commerce store having 40% of its user base in the USA. It offers discounted goods shipped directly to consumers.
Temu was launched in 2022 and is available in 48 countries, including Europe, the Middle East, Southeast Asia, and Australia.
The sample phishing email identified by researchers claims to be from Temu Rewards.
If you look closely, it is sent by an unrelated email address- onmicrosoft.com.
The email contains a blank image and a link to a credential harvesting page.
According to Checkpoint's blog post, the email has Temu's name as the sender.
If the user realizes the sender address isn't related to Temu or the links don't lead to a Temu page, they'll stay away from this scam.
The email should raise suspicion as it is sent from a generic address on onmicrosoft com, and the image does not load. Brand Names and Phishing.
In November 2022, Hackread reported that Cyjax researchers discovered a sophisticated phishing campaign targeting over 400 brands across various sectors.
The scammers, likely having Chinese affiliations, used 42,000 domains to distribute malware and generate ad revenue with at least 24,000 survey/landing domains used to promote the scam.
Cybersecurity researchers at Bloster AI recently discovered a USPS Delivery phishing campaign utilizing advanced techniques to target victims in the US. Bolster's CheckPhish detected over 3,000 phishing domains mimicking Walmart.
A phishing scam targeting Meta Platforms, Inc. business owners to steal their email addresses and passwords, leading to the takeover of their Facebook page, profile, and financial information was discovered in January 2024.
The scam used Meta Platforms' authority to create urgency and legitimacy.
Temu itself has faced several cybersecurity-related issues, including allegations of collecting user and device data such as text messages and banking information.
Another report surfaced, implicating Temu in the unauthorized disclosure of customer data, particularly in connection with data purportedly appearing for sale on the dark web after customers make purchases through the app.
It's crucial to emphasize basic security measures with users and ensure that all threats can be stopped, both simple and sophisticated, especially scams like these, which exploit users' trust in big brands.
To protect against phishing attacks, security professionals must implement AI-based security, robust URL protection, and full-suite security to scan documents and files.


This Cyber News was published on www.hackread.com. Publication date: Fri, 09 Feb 2024 11:13:05 +0000


Cyber News related to Over 800 Phony "Temu" Domains Lure Shoppers into Credential Theft

Is Temu safe? What to know before you 'shop like a billionaire' - If you're on social media or use Google Shopping, the chances are you've been bombarded with adverts for Temu, a Chinese e-commerce marketplace that offers rock-bottom prices compared to equivalents in the West. Others have questioned what Temu's ...
5 months ago Welivesecurity.com
Over 800 Phony "Temu" Domains Lure Shoppers into Credential Theft - Stay alert against Temu phishing scams: Cybersecurity experts warn of scammers using fake giveaways to steal credentials. Over 800 new 'Temu' domains registered in the past 3 months. Temu is the latest brand chosen by scammers for their phishing ...
4 months ago Hackread.com
TEMU sued for being "dangerous malware" by Arkansas Attorney General - Chinese online shopping giant Temu is facing a lawsuit filed by State of Arkansas Attorney General Tim Griffin, alleging that the retailer's mobile app spies on users. According to Baclinko statistics, Temu was the most downloaded shopping app ...
6 days ago Malwarebytes.com
Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains - The two main advantages of detecting stockpiled domains are expanding coverage of malicious domains and providing patient-zero detections as attackers stock up on domains for future use. As of July 2023, our detection pipeline has found 1,114,499 ...
6 months ago Unit42.paloaltonetworks.com
What is Credential Harvesting? Examples & Prevention Methods - Credential harvesting is a serious threat to your organization's online security and privacy. Understanding how credential harvesting attacks work is crucial in safeguarding your personal and business data. Common Techniques Used in Credential ...
3 months ago Securityboulevard.com
31 Alarming Identity Theft Statistics for 2024 - Identity theft is a prevalent issue that affects millions of people annually. Although the numbers are startling, we've selected the 31 most concerning identity theft statistics to help you understand how to secure your identity. In 2022, the FTC ...
5 months ago Pandasecurity.com
CMMC v2.0 vs NIST 800-171: Understanding the Differences - The NIST SP 800-171 lays out the requirements for any non-federal agency that handles controlled unclassified information, or other sensitive federal information. DFARS does not address the CMMC at all but a new clause is currently being drafted for ...
6 months ago Securityboulevard.com
InfectedSlurs Botnet Spreads Mirai via Zero-Days - The payload targets routers and network video recorder devices with default admin credentials and installs Mirai variants when successful. Until November 9, 2023, the vulnerable devices being targeted were unknown. Since both the name and the version ...
7 months ago Akamai.com
The Latest Identity Theft Methods: Essential Protection Strategies Revealed - Identity theft has evolved far beyond the days of stolen mail and dumpster diving. Today's identity thieves employ sophisticated techniques, including account takeovers and government benefit fraud, making it essential for you to stay vigilant to ...
5 months ago Hackread.com
Fake Online Stores Scam Over 850,000 Shoppers - Security researchers have warned online shoppers to be on their guard after revealing news of an extensive network of fake e-commerce stores designed to steal victims' card details and cash. Operated primarily from China, the BogusBazaar network has ...
1 month ago Infosecurity-magazine.com
Unmasking Identity Theft: Detection and Mitigation Strategies - In an increasingly digital world, the threat of identity theft looms large, making it imperative for individuals to be proactive in detecting potential breaches and implementing effective mitigation measures. This article delves into key strategies ...
6 months ago Cybersecurity-insiders.com
Ta444 Turn Credential Harvesting Activity: A Comprehensive Guide - The Ta444 cyber threat group is one of the most active cybercriminals in the world, and one of their notable methods is credential harvesting. Credential harvesting is the process of stealing user’s information, such as usernames, passwords, credit ...
1 year ago Securityaffairs.com
Imperva Client-Side Protection Mitigates the Polyfill Supply Chain Attack - The recent discovery of a website supply chain attack using the cdn. Polyfill.io domain has left many websites vulnerable to malicious code injection. Once a trusted resource for adding JavaScript polyfills to websites, the domain has recently become ...
3 days ago Imperva.com
Cloudflare loses 22% of its domains in Freenom.tk shutdown - A staggering 12.6 million domains on TLDs controlled by Freenom have been shut down and no longer resolve, leading to a significant reduction in the number of websites hosted by Cloudflare. The disappearance of these websites was spotted during our ...
3 months ago Netcraft.com
Researchers Hunted Malicious Stockpiled Domains DNS Records - Malicious stockpiled domains are the collection of domain names that threat actors acquire in advance for several types of future malicious activities like:-. While all these domains are often kept unused initially to evade detection, and then later ...
6 months ago Cybersecuritynews.com
CVE-2020-25600 - An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs ...
2 years ago
Hunting for malicious domains with VT Intelligence ~ VirusTotal Blog - Please note that this blogpost is part of our #VTMondays series, check out our collection of past publications here. Many cyberattacks begin by victims visiting compromised websites that host malware or phishing scams, threat actors use domains for ...
6 months ago Blog.virustotal.com
AsyncRAT Loader Delivers Malware via JavaScript - For at least 11 months, this threat actor has been working on delivering the Remote Access Trojan through an initial JavaScript file, embedded in a phishing page. After more than 300 samples and over 100 domains later, the threat actor is persistent ...
4 months ago Cybersecurity-insiders.com
Morrisons' 'Robocop' Pods Spark Shopper Backlash: Are Customers Feeling Like Criminals? - In a bid to enhance security, Morrisons has introduced cutting-edge anti-shoplifting technology at select stores, sparking a divisive response among customers. The high-tech, four-legged pods equipped with a 360-degree array of CCTV cameras are being ...
5 months ago Cysecurity.news
Top Characteristics of a QR Code Phishing Email - As campaigns using QR codes grow in size and complexity it is important to track not just the QR codes themselves, but also the context of the emails delivering the QR codes. Others use images embedded in the email or QR codes rendered from external ...
6 months ago Securityboulevard.com
Typosquatting Wave Shows No Signs of Abating - One of the most enduring of these exploits is the practice of typosquatting - i.e., using look-alike websites and domain names to lend legitimacy to social engineering efforts. These look-alikes prey on users' inattention to verifying legitimate ...
3 months ago Darkreading.com
Detectify platform enhancements address growing attack surface complexity - Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring control over attack surface data and enable organizations to seamlessly configure alerts for policy ...
1 month ago Helpnetsecurity.com
Retail Tech Deep-Dive: Meraki MT Sensors - Our Meraki MT sensors are designed to support healthy, safe spaces. Enhancing shopper comfort: The more comfortable a shopper is in-store, the more motivated they are to engage deeply with its products and ultimately purchase. Comfort can mean ...
2 months ago Feedpress.me
Russian hackers use Ngrok feature and WinRAR exploit to attack embassies - After Sandworm and APT28, another state-sponsored Russian hacker group, APT29, is leveraging the CVE-2023-38831 vulnerability in WinRAR for cyberattacks. APT29 is tracked under different names and has been targeting embassy entities with a BMW car ...
7 months ago Bleepingcomputer.com
Avast researchers detect a surge in fake e-shops following holidays - We kick off the new year with expectations of sales, but beware: a dangerous wave of fake e-shops is spreading on the internet. As the festive season wraps up, a new challenge emerges for online shoppers: the rise of over 4,000 counterfeit e-shops. ...
6 months ago Blog.avast.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)