Site icon Check Point Blog

Phishing emails double in November in run-up to Black Friday and Cyber Monday

The concept of working with letters on the electronic network. A businessman makes a newsletter on the network on the phone.

This year has already been a record-breaker in terms of online shopping as a result of Covid-19 related restrictions and concerns, and more records are expected to be set in the run-up to Black Friday and Cyber Monday at the end of this month.  During the first 10 days of November, the traditional holiday shopping season, U.S. consumers spent $21.7 billion online — a 21% increase year-over-year.  And the sales momentum is expected to keep on building.  An early sign was the unprecedented spending spree on Chinese Singles Day on 11th November, the world’s largest online shopping event.  Alibaba reported a record $74 billion in sales, nearly double the previous year’s record.

However, it isn’t just stores and buyers who are getting ready for an online spree:  threat actors are also organizing their infrastructures to try and grab their share of our holiday spending, too.  Check Point Research has reported a spike in hacker activity over the past six weeks, with a surge in malicious phishing campaigns targeting online shoppers in the form of “special offers.”

Hackers go phishing to hook unwary online shoppers

A real-life phishing email sample:  imitating Pandora

To better educate and inform online shoppers this holiday season, Check Point researchers provided an example of an email phishing campaign they recently caught. The campaign attempts to imitate the jewelry company, Pandora.

The sender contains an Amazon domain, but there is no mention of Amazon in the mail or in the links belonging to it. Further investigation verified the email address was spoofed to appear as if it was sent from Amazon address. Two of the links in the mail are related to a site that tries to trick recipients into thinking the email is from the jewelry company “Pandora.”  The misspelling of ‘jewelry’ is a strong clue that the email is fake.

The links in the emails led to the website www[.]wellpand[.]com. After a few days, the links led to a similar website www[.]wpdsale[.]com. These websites were registered at the end of October and beginning of November, right before the phishing emails were actually sent, giving researchers a strong indication that it is a scam. Further investigation showed that both of the websites the emails led to were an imitation of the Pandora jewelry website.  Check Point has confirmed that some victims of this attack reside in the USA, UK and Bulgaria.

A Phishing email impersonating “Pandora” Outlet Store

How to Stay Safe and Shop in Confidence

In the same way shoppers hunt for bargains, hackers will be phishing for victims. So how can you stay safe and enjoy a safer online shopping experience?

Here are our tips:

The statistics and data used in this report present data detected by Check Point’s Threat Prevention technologies, stored and analyzed in ThreatCloud. ThreatCloud provides real-time threat intelligence derived from hundreds of millions of sensors worldwide, over networks, endpoints and mobiles. The intelligence is enriched with AI-based engines and exclusive research data from the Check Point Research – The intelligence & Research Arm of Check Point.

Exit mobile version