Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The United Nations begins negotiations on a global plastic pollution agreement

How to save their SOC from alert confusion so that top CISOs never miss real incidents

As Hynet Cluster expands, UK carbon capture jobs will skyrocket

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Deliver 15,000 fake Tiktok Shop Domains malware and steal cryptography via AI-driven fraud campaigns
Identity

Deliver 15,000 fake Tiktok Shop Domains malware and steal cryptography via AI-driven fraud campaigns

userBy userAugust 5, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 5, 2025Ravi LakshmananMalware/Mobile Security

AI-driven scam

Cybersecurity researchers have unveiled it with a wide range of malicious campaigns targeting Tiktok shop users worldwide with the aim of stealing qualifications and distributing troilized apps.

“Threat actors are leveraging the official in-app e-commerce platform through dual attack strategies targeting phishing and malware,” CTM360 said. “The core tactics include deceptive replicas of Tiktokshop that make users think they are interacting with legitimate affiliates and real platforms.”

The fraud campaign, called Clicktok by a Bahrain-based cybersecurity company, calls for a multifaceted distribution strategy of threat actors who mimic influencers or official brand ambassadors generated by meta ads and artificial intelligence (AI).

The core of the effort is the use of domains that look similar to legitimate Tiktok URLs. To date, over 15,000 websites with such spoofing have been identified. Most of these domains are hosted in top-level domains such as .top, .shop, and .icu.

These domains are designed to steal user credentials to deploy a variant of known cross-platform malware called SparkKitty, which can harvest data from both Android and iOS devices, or to host phishing landing pages that distribute fake apps.

Cybersecurity

Additionally, some of these phishing pages will lead to depositing cryptocurrency in fraudulent stores by promoting fake product lists and huge discounts. By advertising it as a Tiktok shop, CTM360 said it has identified over 5,000 URLs set up with the intention of downloading malware-covered apps.

“We believe that scams mimic legitimate tictock shop activities through fake ads, profiles and AI-generated content, and users are involved in the distribution of malware,” the company said. “Fake ads are widely distributed on Facebook and Tiktok, mimicking videos that mimic Real Promotions and attract users with significantly reduced offers.”

AI-driven scam

A fraudulent scheme works with three motivations in mind, but the ultimate goal is economic benefits regardless of the illegal monetization strategy employed.

You will not disguise buyers and affiliate program sellers (creators who promote products that promote products in exchange for sales committees generated through affiliate links) with discounted products, and use future committees on affiliate participants to leave using fake agreements. Instructs you to download the Trojanized Tiktok app

Once installed, malicious apps will prompt the victim to enter their credentials using an email-based account. This is a repeated failure of a threat actor who uses a Google account to present an alternative login.

This approach aims to bypass traditional authentication flows and weaponize session tokens created using OAUTH-based methods for unauthorized access without the need for in-app email verification. If a logged-in victim attempts to access the Tiktok shop section, they will be directed to a fake login page requesting qualifications.

Also embedded in the app is Sparkkitty, a malware (OCR) technique that uses device fingerprinting and optical character recognition (OCR) techniques to analyze screenshots in user photo gallery, analyze screenshots of cryptocurrency wallet seed phrases, and surrounded by attacker control servers.

The disclosure comes when we detail another targeted phishing campaign called Cyberheist Phish, which uses Google Ads and thousands of phishing links, and another targeted phishing campaign that seeks Dupe victims looking for a corporate online banking site to mimic the targeted bank login portal and redirect them to coordinate pages created to steal credit.

“This phishing operation is particularly sophisticated in order to collect two-factor authentication at each stage of login, beneficiary creation, and fund transfer due to its evasive and selective nature and real-time interaction with threat actor targets,” CTM360 said.

Identity Security Risk Assessment

Over the past few months, phishing campaigns have targeted metabusiness suite users as part of a campaign called Metamirage, which uses deceptive verification requests that lead victims to their eligibility and cookie harvest pages using fake policy violation email alerts, AD account restriction notifications, deceptive verification requests distributed via email and direct messages.

“The campaign focuses on eroding high-value business assets, including advertising accounts, verified brand pages and admin-level access within the platform,” the company added.

These developments coincide with the recommendations of the US Treasury Department’s Financial Crime Enforcement Network (FINCEN), which encourages financial institutions to identify and report suspicious activities that convertible cryptocurrency (CVC) kiosks fight fraud and other illegal activities.

“Criminals have been less in their efforts to steal money from victims and have learned to use innovative technologies like CVC kiosks,” said Andrea Gakki, director of Finsen. “The United States is committed to protecting the digital asset ecosystem for legal businesses and consumers, and financial institutions are key partners in their efforts.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBreakthroughs in graphene oxide for PFAS-free food packaging
Next Article As Hynet Cluster expands, UK carbon capture jobs will skyrocket
user
  • Website

Related Posts

How to save their SOC from alert confusion so that top CISOs never miss real incidents

August 5, 2025

SonicWall investigates potential SSL VPN zero day after more than 20 target attacks are reported

August 5, 2025

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

August 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The United Nations begins negotiations on a global plastic pollution agreement

How to save their SOC from alert confusion so that top CISOs never miss real incidents

As Hynet Cluster expands, UK carbon capture jobs will skyrocket

Deliver 15,000 fake Tiktok Shop Domains malware and steal cryptography via AI-driven fraud campaigns

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.