Sunday, May 18, 2025
Homecyber securitySubscription-Based Scams Targeting Users to Steal Credit Card Information

Subscription-Based Scams Targeting Users to Steal Credit Card Information

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers at Bitdefender have identified a significant uptick in subscription-based scams, characterized by an unprecedented level of sophistication and scale.

These fraudulent operations, involving over 200 meticulously crafted websites, are designed to deceive users into divulging sensitive credit card information through recurring payment schemes.

Unlike traditional phishing attempts with obvious red flags, these scams leverage high-quality web design and targeted advertising to appear legitimate, exploiting user trust at critical moments like the payment stage.

- Advertisement - Google News

The websites, often linked to a single address in Cyprus, hint at the involvement of an offshore entity orchestrating this massive campaign across diverse product categories, including clothing, electronics, and beauty products.

A key component of this scam network is the evolution of the “mystery box” fraud, a deceptive tactic promising surprise items for a nominal fee, now enhanced with hidden subscription models disclosed in fine print.

These scams have proliferated on social media platforms like Facebook, where cybercriminals deploy sponsored ads, impersonate content creators, and create near-identical pages to legitimate brands to lure victims.

Credit Card Information
sponsored ads

Evolving Mystery Box Scams and Social Media Exploitation

Beyond mystery boxes, the fraud extends to low-quality or imitation goods, fake investments, and supplements, all tied to subscription traps that appear as enticing discount programs offering store credits and VIP tiers.

Credit Card Information
VIP tier

Bitdefender’s investigation reveals that these schemes utilize complex payment structures and convoluted terms to confuse users, transforming a seemingly one-time purchase into recurring charges of up to 44 EUR every 14 days.

To evade detection, scammers employ techniques such as multiple ad versions (with only one being malicious), Google Drive-hosted images for easy replacement, cropped visuals to bypass pattern recognition, and homoglyph tactics to obscure malicious intent.

The connection between these scams and a Cyprus-registered address, noted in the Paradise Papers leak via the International Consortium of Investigative Journalists’ Offshore Leaks Database, raises suspicions of a coordinated operation.

Many of these fraudulent sites remain active, continuously targeting users globally, with specific campaigns observed in Romania, Canada, and the United States.

The use of AI-generated content and shared design templates across these websites further indicates a centralized effort to maximize victim reach while minimizing operational overhead.

As subscription-based fraud becomes the new norm for cybercriminals, the infusion of significant funds into advertising and brand impersonation signals a troubling trend.

Users are urged to exercise heightened vigilance, scrutinize payment terms for hidden subscriptions, and verify the authenticity of online stores before sharing financial data.

Indicators of Compromise (IOC)

Domain/IP AddressDescription
bestsoundclub[.]comSuspected scam website
egadgets[.]clubSuspected scam website
betrendy[.]siteSuspected scam website
allbuysport[.]comSuspected scam website
185[.]142[.]236[.]187Associated IP address

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...