Skip to main content

Selling something online? Watch out for this clever new scam

A credit/debit card stealing scheme that was initially discovered in 2020 has now been detected in Singapore.

As reported by Bleeping Computer, threat analysts at cybersecurity company Group-IB link it to “Classicscam,” a global operation that has targeted individuals in Europe, Russia, and the U.S.

An individual holding a phone and card.
Karl Tapales/Getty Images

Phishing sites that imitate Singaporean classifieds sites are created and spread via Telegram, which is becoming an increasingly popular platform for hackers, drug dealers, and cybercriminals in general. A total of 18 phishing-related domains connected to the scheme were uncovered.

Recommended Videos

Furthermore, with the use of one-time passcodes (OTPs) associated with someone’s bank, scammers aim to divert the funds away from the victim and into their own accounts.

The threat actors initially contact the seller of an item on these classified sites to mention they want to buy it, after which an URL of the phishing site is sent.

Should the seller fall for the bogus URL and follow through, the site they load will resemble the classifieds portal, stating that the payment for buying the item has been processed successfully.

The seller is reportedly required to provide their full card details to receive the amount owed to them for selling their item, including their name, card number, expiration date, and the CVV code.

An infographic detailing an online scam.
Image source: Group-IB/Bleeping Computer Image used with permission by copyright holder

From here, the seller is given a doctored OTP (one-time password) page, which is when the scammer can then use that through a reverse proxy on the actual bank portal.

Classicscam operates as an automated “scam as a service,” which is undoubtedly popular among the hacking community. It primarily attempts to focus on users of classified sites, but its efforts also extend to banks, cryptocurrency exchanges, delivery companies, and moving companies to name a few.

In order to promote its services and for operational purposes, Classicscam is spread through Telegram channels — there’s said to be around 90 active rooms at the moment. Since it launched during 2019, it’s reported that it has been behind $29 million in damages.

Group-IB highlights how the network is home to 38,000 registered users, all of whom receive around 75% of any stolen proceeds. Platform administrators, meanwhile, take the remaining 25% cut.

Although Group-IB has tracked down and blocked 5,000 malicious endpoints over the last three years, that hasn’t negatively affected Classicscam’s activity.

Ilia Rozhnov, Group-IB’s head of digital risk protection team, commented on the sophisticated nature of the scheme.

“Classiscam is far more complex to tackle than the conventional types of scams. Unlike the conventional scams, Classiscam is fully automated and could be widely distributed. Scammers could create an inexhaustible list of links on the fly. To complicate the detection and takedown, the home page of the rogue domains always redirects to the official website of a local classified platform.”

Zak Islam
Former Digital Trends Contributor
Zak Islam was a freelance writer at Digital Trends covering the latest news in the technology world, particularly the…
Hackers now exploit new vulnerabilities in just 15 minutes
A depiction of a hacker breaking into a system via the use of code.

Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors.

Threat actors are actively scanning for vulnerable endpoints within a period of just 15 minutes once a new Common Vulnerabilities and Exposures (CVE) document is published, according to Palo Alto's 2022 Unit 42 Incident Response Report.

Read more
Online criminals stole nearly $7 billion from people in 2021
A tired man with a laptop in an office.

Online criminals successfully defrauded billions of dollars from people during 2021, as internet-related crimes became more commonplace than ever before.

Per TechRadar, the FBI’s Internet Crime Complaint Center (IC3) annual report details how victims saw $6.9 billion being stolen as a result of a variety of successful online scams. The full report is also available.

Read more
HiveNightmare is a nasty new Windows bug. Here’s how to protect yourself
Windows 11 on a tablet.

A new bug called ‘HiveNightmare’ reportedly lets anyone with local or remote access to your PC take it over. This is a fairly new and serious flaw in the latest versions of Windows 10, as well as in Windows 11, which is still being tested in the Windows Insiders program.

Using malware, the hacker can gain complete access to your PC without needing an administrative password. The bug originates from an alleged change in the recent versions of Windows 10 and 11 that grants unauthorized users the privilege to access the Security Account Manager (SAM). The SAM is a database that contains both usernames and passwords for local accounts on the operating system.

Read more