Holiday Season Sees Surge in Fake Shopping Domains Used by Threat Actors to Target Users
The operation, active since early 2025, uses 244 fraudulent domains to trick users into financial fraud and, in some cases, to deliver malware via counterfeit checkout systems.
The campaign relies on industrial-scale domain registration, automated infrastructure deployment, and DNS configuration to mimic the look and feel of well-known retailers such as Zalando, Lululemon, Dr. Martens, IKEA, and Birkenstock.
Analysts observed that the fake domains often replicate brand templates, product pages, and checkout URLs nearly identical to the originals, making them difficult for consumers to detect.
The investigation traced the fake domains across 43 registrars, with West263 International Limited and Dynadot Inc. identified as the top sources of abuse.
The majority of malicious activity was linked to Chinese infrastructure providers, with China accounting for 79 of the total domains. Several other registrars, NameSilo, Alibaba Cloud/HiChina, and Sav.com, were also used repeatedly by the threat actors.
PreCrime
The most abused nameserver, ns1.dyna-ns.net, was used across 33 domains, indicating a tightly connected hosting infrastructure and shared back-end servers.
Tools such as DNSlytics and ASN correlation further showed that even domains registered in Europe or the U.S. resolved to Chinese networks.
Domain registration patterns showed a sharp spike in October 2025, with 78 new domains set up ahead of major shopping promotions.
The campaign also leveraged social media ads on TikTok, Facebook, and Google Shopping to lure unsuspecting shoppers with fake sales and “flash deal” offers. Some campaigns exhibited unusual behavior.
For instance, the website peaceforsecurity[.]com disguised itself as a women’s clothing boutique, an example of what researchers call an agenda-oriented campaign, possibly to evade detection or align with trending humanitarian messages.
Others mixed unrelated brand names, such as lululemonsalehub[.]com, which used Lululemon branding to promote non-related products.
PreCrime
The team has also added identified Indicators of Compromise (IOCs) to its PreCrime
According to BforeAI, this coordinated infrastructure reflects a growing “fraud-as-a-service” ecosystem that can rapidly scale operations.
With threat actors now automating the creation of counterfeit stores, researchers warn that vigilance will be crucial throughout the holiday season and beyond.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Holiday Season Sees Surge in Fake Shopping Domains Used by Threat Actors to Target Users appeared first on Cyber Security News.
In September, Donald Trump claimed that "the United States is getting a tremendous fee" for…
ABILENE, Texas (KTAB/KRBC) - Two men in Abilene, a father and son, were arrested Friday…
According to Reuters, Meta is looking to offset spending on AI and data centers with…
Hulu has decided to scrap Buffy the Vampire Slayer: New Sunnydale, its planned continuation series…
Jostling a folded piece of paper, holding it marooned in the air, selectman Beth Blair…
Boscawen voters cruised through a speedy town meeting Friday night, one with so little controversy…
This website uses cookies.