SME Times is powered by   
Search News
Just in:   • India’s MEI sector posts 6.6 pc net employment gain as hiring intent rises  • Google enables Indians to save Aadhaar verifiable credentials in Google Wallet  • S. Korea to offer $203.6 million support for projects to foster AI, green transformation  • We committed $100 billion to build a platform that supports India’s AI growth: Jeet Adani  • NITI Aayog launches roadmap for next phase of India’s Digital Public Infrastructure journey 
Last updated: 10 Nov, 2023  

Cyber.Crime.9.Thmb.jpg Scammers using 'Diwali', 'Pooja' domains to con users this festive season: Report

Cyber.Crime.9.jpg
   Top Stories
» NITI Aayog launches roadmap for next phase of India’s Digital Public Infrastructure journey
» Indian stock markets trade lower amid US-Iran tensions, surging crude
» Sensex, Nifty trade higher in early session on global optimism
» India forex reserves rise to $703.3 billion amid West Asia tensions
» Sensex falls 983 points, Nifty slips below 24,000 as oil spike hits sentiment
IANS | 10 Nov, 2023
Cybersecurity researchers have discovered a sharp surge in malicious campaigns that use "Diwali" and "Pooja" domains to scam users this festive season via e-commerce websites, a new report warned on Thursday.

The researchers from the cybersecurity company CloudSEK have witnessed phishing campaigns targeting recharge and e-commerce sectors attempting to damage the brands of reputed entities. 

They uncovered about 828 unique domains from the Facebook Ads Library that were being used for phishing campaigns. 

"This year, there has been a steep spike in the hosting of fake domains for online shopping scams. These scams can further escalate into financial frauds, where hackers can impersonate customer representatives from various organizations, exploiting the gullibility of innocent victims," said Rishika Desai, lead cyber intelligence, CloudSEK.

According to the report, these unique domains were formed by typosquatting techniques to bring legitimacy to less technologically advanced audiences. For instance, shop.com was impersonated as shoop.xyz with the same features and content as the original website. 

A domain having keywords "Diwali" and "Pooja" were found to be hosted on a Hong Kong-based ASN by Megalayer Technologies.

This domain was redirected to different Chinese betting pages. 

The website was created approximately a month ago and redirects to multiple gambling sites such as Bet 365, MGM, etc, the report said. 

"Cybercriminals often exploit the increased internet traffic during Diwali to target unsuspecting users with malicious websites that mimic legitimate gambling platforms," Desai said. 

Moreover, the report mentioned that various malicious users on Facebook and other relevant social media channels were found to be misleading genuine users by asking them to register on unreliable cryptocurrency websites. 

One such example is Bot Bro, which lures consumers to untrustworthy crypto platforms by providing free life insurance up to one crore and five TLC coins. 

An e-commerce website selling jewellery registered on October 3, was found to be requesting users to download an application embedded with an Android Trojan. 

This website had the "Diwali" keyword in its domain name.

 
Print the Page
Add to Favorite
 
Share this on :
 

Please comment on this story:
 
Subject :
Message:
(Maximum 1500 characters)  Characters left 1500
Your name:
 

 
  Customs Exchange Rates
Currency Import Export
US Dollar
₹94.25
₹92.55
UK Pound
₹125.95
₹121.95
Euro
₹108.95
₹105.3
Japanese Yen ₹59.4 ₹57.6
As on 02 Apr, 2026
  Daily Poll
What is the biggest war impact on MSMEs?
 Export Disruption
 Raw Material Spike
 Freight Cost Surge
 Payment Delays
 Currency Volatility
 All
  Commented Stories
 
 
About Us  |   Advertise with Us  
  Useful Links  |   Terms and Conditions  |   Disclaimer  |   Contact Us  
Follow Us : Facebook Twitter