Connect with us

Consumer Protection

Researchers Warn of Expanding Fake Retail Sites Targeting Peak Shopping Season

Published

on

As Black Friday and Cyber Monday approach, cybersecurity researchers are warning of a growing wave of holiday-themed scam websites designed to trick consumers into revealing payment information. These fraudulent online stores, engineered to mimic popular retail brands, are appearing at unprecedented scale, posing a serious risk to shoppers during the 2025 holiday season.

Industrialized Online Fraud

Researchers have identified over 2,000 new fraudulent domains in recent months, including typosquatted Amazon URLs and more than a thousand suspicious .shop sites impersonating major brands. Many of these domains were dormant for months before suddenly going live with full product catalogs, holiday graphics, and payment portals timed to coincide with peak online shopping traffic.

Scam sites use aggressive tactics to drive impulsive purchases, including flash banners, countdown timers, fake trust badges, and pop-ups warning that items are “almost sold out.” Analysts describe this as psychological manipulation designed to pressure shoppers into buying before evaluating risks.

Centralized Operations and Hidden Infrastructure

Evidence suggests these scams are centrally coordinated, rather than isolated incidents. Numerous malicious domains share identical servers, content delivery networks, and hosting providers, often behind services like Cloudflare that obscure the operators’ identities. Some domains even rely on the same assets—banners, product grids, and JavaScript files—reused across hundreds of sites.

Researchers describe the network as “industrialized fraud,” with automated storefront generation, repeated layouts, and cloned code allowing rapid deployment of new scam sites. Domain registration patterns reveal a surge in new .shop domains from obscure registrars, created just weeks before the shopping season.

How Scammers Monetize Data

Fraudsters route payment information entered by unsuspecting shoppers to shell merchant websites, often based overseas, which process transactions on behalf of the scammers. This allows them to bypass automated fraud detection systems, resulting in unauthorized withdrawals, identity theft, and financial losses. Because many sites operate through reverse-proxied infrastructure, law enforcement faces challenges in tracking and shutting down operators before they abandon the domains.

Exploiting Brand Trust

The .shop top-level domain has become a focal point for large-scale impersonation campaigns. Fake sites mimic established brands such as Apple, Samsung, Ray-Ban, and Dell, often using minor lexical variations like “box,” “sale,” or “lucky” to appear legitimate. Many of these sites reuse pre-designed scam kits, replicating layouts, slogans, and checkout frameworks across multiple domains.

Tips for Holiday Shoppers

Experts advise consumers to exercise caution this holiday season:

  • Verify URLs: Only shop through official brand websites.
  • Avoid unfamiliar domains: Be wary of new or suspicious-looking sites.
  • Resist high-pressure tactics: Treat “limited stock” warnings or flash deals with skepticism.

With online shopping and cyber-fraud evolving in tandem, vigilance and awareness remain the best defenses against these sophisticated holiday scams.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Consumer Awareness

Solo Homebuyer Takes On 11 Builders, Wins Historic RERA Case After 6 Years

Published

on

By

A single flat owner has secured a precedent-setting victory after a six-year legal battle, with the Maharashtra Real Estate Appellate Tribunal (MahaREAT) ordering developers of the stalled Nilkanth Kingdom project in Mumbai to complete full Real Estate Regulatory Authority (RERA) registration within 60 days.

The ruling, delivered in favour of a lone appellant, significantly strengthens the enforcement of RERA by clarifying that incomplete housing projects must be treated as active projects under the law, even if partial possession was granted before RERA came into force.

Tribunal Overturns Earlier Order

The latest order overturns MahaREAT’s own June 18, 2019 decision, which had earlier allowed registration only for unfinished amenities. The tribunal has now held that where Completion Certificates (CC) and Occupation Certificates (OC) are pending, the entire project remains incomplete and must be fully registered under RERA.

Legal experts say the clarification closes a long-used loophole that allowed developers of pre-RERA projects to avoid regulatory oversight by claiming partial completion.

Legal Significance Highlighted by Counsel

Counsel for the flat owner said the ruling reinforces the core intent of RERA — accountability and transparency. According to the tribunal’s interpretation, developers cannot escape their obligations simply because possession was handed over before RERA became operational.

“This judgment makes it clear that incomplete projects cannot be selectively registered. If essential approvals and amenities are pending, the project is active under RERA,” the lawyer said. Experts believe the decision could influence dozens of stalled or partially completed projects across Maharashtra.

Project Delays and Long-Standing Disputes

The case relates to Nilkanth Kingdom, a residential project in Vidyavihar (West) comprising seven buildings constructed on leased land. The project was launched in 2005, with possession initially promised by 2008. However, internal disputes among developers and prolonged legal challenges led to repeated delays.

While structures were largely completed by 2012–13, buyers received only fit-out possession. Key amenities such as a clubhouse and swimming pool remain unfinished to date, and statutory approvals including CC and OC were never obtained.

A Lone Battle Against Major Builders

The appeal before MahaREAT was filed solely by flat owner Stuti Galiya of N K Avanti Cooperative Housing Society. Nearly 499 other flat buyers and seven housing societies chose not to participate in the prolonged litigation.

Stuti pursued the case alone against 11 developers, many of whom are large corporate entities represented by leading law firms. The tribunal’s decision highlights how sustained legal effort by a single homebuyer can lead to systemic accountability.

Broader Impact on RERA Enforcement

The ruling significantly enhances the scope of RERA by reaffirming that the law applies to unfinished projects regardless of when possession was offered. Developers are now legally required to complete not just structural construction, but also promised amenities and statutory approvals.

Housing activists say the judgment strengthens buyer protection and sends a clear signal that partial completion will no longer shield developers from regulatory responsibility.

As stalled housing projects continue to affect thousands of buyers across the state, the verdict is being seen as a milestone in real estate jurisprudence — and a reminder that persistence can reshape accountability in India’s property sector.

Continue Reading

Consumer Protection

Gang Posing as IGL Officials Busted, Three Arrested; Fake App Used to Drain Bank Accounts

Published

on

By

Delhi Police’s Crime Branch has dismantled a cyber fraud gang that impersonated Indraprastha Gas Limited (IGL) officials to defraud unsuspecting consumers. Three men—Bikky Mandal alias Vicky (Asansol, West Bengal), Sumit Kumar Singh (Jamtara, Jharkhand), and Rajiv Kumar Mandal—have been arrested for siphoning money from victims’ bank accounts via malicious APK files disguised as official applications.

Modus Operandi of the Fraud
Investigators revealed that the gang contacted victims by phone, claiming to be IGL representatives and warning of pending bills, account updates, or possible disconnection. Victims were then instructed to download an APK file presented as IGL’s official app. Once installed, the fraudulent app requested extensive permissions, enabling the accused to access messages, read OTPs, mirror screens, and perform unauthorized banking transactions.

Fake Apps Mimicking Trusted Brands
Digital forensics on nine phones recovered from the suspects found seven devices containing multiple fraudulent apps. These apps imitated the look and feel of legitimate services, including IGL, State Bank of India, Tata Power, and RTO challan portals. Investigators noted that the apps were designed solely to gain user trust and covertly steal sensitive financial data, making detection difficult for ordinary users.

Links to Multiple Cybercrime Complaints
The gang has been linked to 35 separate cybercrime complaints filed on the National Cyber Crime Reporting Portal (NCRP). Police records show that the accused had prior involvement in cyber fraud and cheating cases in their respective regions. Rajiv Kumar Mandal reportedly coordinated operations and managed fraudulent transactions.

Understanding APK Files
An APK (Android Package Kit) is the file format used to install apps on Android devices, similar to .exe files on computers. Fraudsters often tamper with APKs to distribute malicious software, posing as updates, bill payments, or government-related applications. Once installed, these apps can give attackers full control over the device.

IGL Advisory to Consumers
IGL has issued a warning to customers to avoid responding to suspicious calls regarding bill payments or service disconnection. The company advises verifying any such communication through official channels and only using authorised payment platforms. Consumers are also urged not to download apps received through calls or messages.

Tips to Stay Safe

  • Install apps only from Google Play Store
  • Avoid clicking on unknown links or APK files
  • Keep the ‘Unknown Sources’ setting disabled
  • Limit app permissions to only necessary functions
  • Report suspected fraud immediately by calling 1930

Police have urged the public to stay vigilant and ignore unsolicited calls or messages requesting personal or financial information. Investigations into the cybercrime network are ongoing.

Continue Reading

Consumer Protection

Coupang Data Leak: Compensation Worth ₹9,700 Crore for 34 Million Users

Published

on

By

Seoul, December 29, 2025 – South Korea’s leading e-commerce platform, Coupang, has unveiled a historic compensation package worth $1.17 billion (around ₹9,700 crore) for nearly 34 million users affected by a major data breach. The settlement, offered in the form of shopping vouchers, marks one of Asia’s largest consumer relief efforts following a cybersecurity incident.

Voucher-Based Compensation

Eligible users, including former customers who had closed their accounts after the breach, will receive vouchers worth 50,000 South Korean won (approximately ₹3,100) redeemable across Coupang’s services. A dedicated portal will open on January 15 to verify accounts and distribute the vouchers.

Interim CEO Harold Rogers described the compensation as a critical step toward rebuilding user trust. “We apologize to our customers and take full responsibility for the anxiety and inconvenience caused by this incident,” Rogers stated.

Founder and CEO Respond

Coupang founder Bom Kim publicly apologized for delayed communication in the immediate aftermath of the breach. Kim admitted that waiting for complete internal verification before addressing the public was a mistake.

Earlier this month, CEO Park Dae-jun resigned amid escalating regulatory scrutiny, taking responsibility for the company’s failure to safeguard user data. Coupang said that investigations recovered the leaked customer data and digital devices belonging to the primary suspect. Only about 3,000 customer records were found on the suspect’s computer, with no evidence of data being sold or publicly shared.

Implications of the Compensation Package

The ₹9,700 crore settlement has sparked debate among analysts and cybersecurity experts:

  • Could cash compensation have provided more tangible relief than vouchers?
  • Is the move driven primarily by reputational and legal concerns?
  • Can similar breaches be prevented despite strengthened security measures?

Voucher-based compensation, experts note, allows companies to limit immediate cash outflow while encouraging users to remain on the platform—a common strategy in large-scale breach settlements.

Security Upgrades and User Precautions

Coupang has committed to enhancing its cybersecurity infrastructure with measures including:

  • Stricter internal access controls
  • Real-time monitoring of employee systems
  • Faster detection and response protocols
  • Improved coordination with law enforcement and regulators

Affected users are advised to take immediate precautions: change passwords, enable two-factor authentication (2FA), monitor for phishing attempts, and check financial statements regularly. Cybersecurity experts warn that exposed personal data may be misused long after the initial breach.

Conclusion

Coupang’s unprecedented compensation package underscores the serious reputational and financial consequences of data breaches for digital platforms. While the vouchers demonstrate corporate accountability at scale, restoring public trust remains a significant challenge. The incident highlights the growing importance of cybersecurity as e-commerce becomes increasingly integral to daily life.

Continue Reading

Trending

Copyright © 2022 420 Reports Marijuana News & Information Website | Reefer News | Cannabis News