Saturday, April 5, 2025
HomeCyber CrimeCybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

Published on

SIEM as a Service

Follow Us on Google News

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious e-commerce websites, leveraging multiple SEO malware families to achieve their goal.

Three distinct threat actor groups were identified, each employing a unique malware family, with one group utilizing multiple families. One malware family’s C&C servers shared limited e-commerce site sets, differentiating it from others with independent lists. 

The proliferation of fraudulent e-commerce sites, particularly in Japan, poses a growing threat, as sites designed to deceive and exploit users have seen a significant surge in 2023, leading to increased financial losses and compromised personal information.

Threat actors deploy SEO malware on compromised websites to manipulate search engine rankings by injecting malicious code into legitimate sites, redirecting unsuspecting users to fraudulent e-commerce platforms for potential financial gain. 

When websites are compromised, these search engine optimization malwares are installed on those websites in order to intercept web server requests and return malicious content. 

By doing so, threat actors can send a crafted sitemap to search engines and index-generated lure pages, which contaminates the search results, making the URLs of compromised websites appear in searches for product names they do not actually handle.

 SEO Poisoning Attack
Entity connections to create a Maltego graph for link analysis

SEO malware exploits search engine rankings by manipulating search results and redirects users to malicious websites, often disguised as legitimate e-commerce sites, through techniques like the Japanese keyword hack.

The study analyzed 227,828 fake e-commerce sites linked to six SEO malware families, collected from 1,242 C&C servers, and to mitigate this blackhat SEO threat, the researchers enhanced their Web Reputation System (WRS) to block these malicious sites. 

Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)

Using Maltego, Trend Micro analyzed the relationships between different threat actors and malware families by identifying four link types to construct a Maltego graph, revealing a potential scenario where three distinct threat actor groups employ unique malware families, while one group leverages multiple malware families.

 SEO Poisoning Attack
Maltego graph within the dataset of the groups (red circles) and subgroups (blue circles).

It revealed that malware variants A, C, D, E, and F operated independently, each managing its own set of fake shopping sites on separate C&C servers, while malware B utilized shared lists of large-scale fake shopping sites across multiple C&C servers. 

E-commerce users should be vigilant against fraudulent shopping sites by scrutinizing URLs for uncommon domains and flagging suspiciously low prices compared to market norms.

Discount marketplaces and niche e-commerce platforms are selling a diverse range of products, including counterfeits of major brands, often bypassing traditional retail channels and leveraging less-known online platforms to reach consumers.

Specialty stores misrepresenting their product range and providing inaccurate company information, potentially engaging in deceptive business practices.

Analyze Unlimited Phishing & Malware with ANY.RUN For Free - 14 Days Free Trial.

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...