Black Friday: Scammers exploit luxury brands to lure their victims


involving the impersonation of luxury brands including Louis Vuitton, Rolex and Ray-Ban.

Hackers create enticing emails promising deep discounts on these luxury goods, with email addresses manipulated to imitate the authenticity of the brands.

Despite the appearance of legitimacy, a closer look reveals that the origins of the emails have no connection to the luxury companies themselves, the CPR noted.

Once clicked on the links contained in these emails, victims are directed to websites carefully designed to replicate the official sites of the targeted brands. These scam sites sell luxury products at incredibly discounted prices.

Check Point said the real danger of the malicious intentions behind these sites lies in the fact that they prompt the user to enter their account details. This sensitive information then becomes vulnerable to theft by attackers.

The delivery industry continues to be exploited by cybercriminals

Ahead of the busy online shopping season, CPR also highlighted how cybercriminals are manipulating the shipping and shipping sectors.

In October 2023, there was a staggering 13% increase in the number of malicious files associated with orders and delivery/shipping compared to October 2022.

Recently, CPR discovered an Agent Tesla malware campaign with archive files delivered as email attachments using subject lines related to orders and shipping, such as – po-######. gz/shipping documents.gz, tricking the victim into downloading the malicious file.

Beware of phishing websites

The CPR also highlighted examples of phishing websites, where the information recorded is similar and looks the same – offering well-known shoe brands at ridiculous prices.

Cybercriminals have invested considerable effort in creating deceptive websites that closely mimic genuine platforms, the CPR noted.

This policy aims to encourage end users to voluntarily provide their credentials. URL phishing is used as a pretext to execute credential harvesting attacks and, when executed effectively, can result in the theft of usernames, passwords, card details, etc. credit and other sensitive personal information.

In particular, successful instances often prompt users to log into their email or bank account.

Share This Article
Leave a comment