sb-nz logo
Story image

Black Friday alert: Financial botnets targeting e-commerce apparel sites

26 Nov 2019

In the wake of the upcoming Black Friday sales period, cybercriminals are targeting customers of apparel e-commerce websites, including fashion, shoes, gifts, toys and jewellery.

Consumers looking for deals in these areas during the upcoming weeks are advised to be careful when making online purchases.

These are the key findings of a Black Friday Alert 2019: Net Shopping Bag of Threats, prepared by Kaspersky experts, to evaluate what risks consumers may face during the holiday sales season.

Black Friday is arguably the most anticipated retail sales period in the world when brands offer consumers the largest discounts and promotional offers.

At the same time, cyber-fraudsters also consider this period fruitful, to lure people in to fraudulent schemes and steal their money.

To understand the extent of fraudsters’ activity, Kaspersky researchers analysed Black Friday threats, including the activities of botnets that distribute banking Trojans – malware aimed at stealing users’ credentials and financial data.

Botnets are networks of computers infected with malware.

Depending on the will of the botnet owner, the malware may download additional malicious modules to use for other purposes.

Kaspersky tracks the activity of multiple botnets and is able to learn when a particular one is being changed and new abilities added.

Recently, Kaspersky researchers observed botnets made of computers infected with malware aimed at intercepting users’ credentials to gain access to leading e-commerce websites and subsequently (in some cases) bank card details, attached to user accounts in particular e-shops.

Kaspersky found 15 malware families that were targeting a total of 91 consumer e-commerce sites and mobile apps across the world.

Of those, consumer goods - such as clothing stores, jewellery and toys - appear to be the key focus of financial botnets operators this season, with 28 websites from this category part of the malware families mentioned above.

This was followed by the entertainment segment, including movies, music and games (20 sites targeted).

Users of e-commerce brands dealing with the travel industry, such as transportation tickets retailers, taxi services and hotels are also in the list of top sites targeted, with 15 popular websites.

Last year the situation was different: the total number of targeted brands was lower at just 67, while the top of the most ‘hunted’ brands was led by consumer apparel, entertainment and consumer electronics websites.

This year, only two websites from the latter category were identified as targeted by one of 15 malicious families.

“The growing interest of cybercriminals in getting users credentials of e-commerce brands is easy to understand. In some cases, there are credit card details or loyalty program card details linked with these accounts and getting access to an e-shop account of a user would also mean access to their money.

“And even if there is no direct financial gain, personal user accounts contain a lot of valuable information that could be used to further target users, such as purchase history or personal information related to a delivery address etc. Such information is highly valued in the underground market and will inevitably find a buyer.

“However, the good news for consumers is that through simple precautionary measures and remaining vigilant, they can stay safe,” says Kaspersky security researcher Oleg Kupreev.

To stay safe during the Black Friday period, Kaspersky recommends shoppers:

  • Avoid purchasing from websites that appear suspicious or flawed, no matter how great their Black Friday deals are
  • Don’t click on unfamiliar links you receive in emails or social media messages, even from people you know, unless you were expecting the message
  • Double-check the email address of the sender. If it is not the official brand’s website domain, do not click on the link
  • Chose payment processing services that use multifactor authorization of purchases, if available
  • Use a dedicated security solution on your device
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Microsoft brings endpoint & Azure security under Microsoft Defender
Microsoft Defender brings Microsoft 365 Defender and Azure Defender under the same umbrella.More
Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More