TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A large collection of fraudulent web stores

153 pointsby finnigjaover 2 years ago

12 comments

mamboramboover 2 years ago
The consumer&#x27;s dependence on &quot;legit-sounding domain name&quot;, a green SSL key, and recognizable corporate logos and website layout as the &quot;proof&quot; of authenticity is passe.<p>In this era of online ubiquity there should be another layer of opt-in validation, ring of trust, p2p feedback and rating, that can all be plugged into the consumer web experience.
评论 #33447736 未加载
评论 #33447800 未加载
评论 #33447692 未加载
评论 #33449302 未加载
评论 #33447485 未加载
lovingCranberryover 2 years ago
Curious question: Why are all these sites behind Cloudflare and why is Cloudflare not acting?<p>These sites are literally made to steal my grandma&#x27;s money when she&#x27;s buying presents for Christmas and what not.
mfondaover 2 years ago
Thanks for investigating this and ultimately getting the fraudulent store taken down. I saw the same social media post regarding the fraudulent store and was surprised that a small local store was targeted with this kind of attack. A good mix of small stores and major corporations in the list. I wonder if they target the small stores because SEO is easier?<p>It&#x27;s inspiring to see you follow up like this and help out a wonderful mountain shop. A great reminder and inspiration to be more involved in my community.
aww_dangover 2 years ago
Were they billing the cards or just reselling the data? The second option seems more probable.
steve_taylorover 2 years ago
Isn&#x27;t this something that Extended Validation certificates were designed to address?
评论 #33449104 未加载
评论 #33449264 未加载
asdadsdadover 2 years ago
Does anyone care? I&#x27;ve seen this reported many times, and it never gets the same attention as phish
langsoul-comover 2 years ago
I wonder if the best bet would be to hash the main site and its images. Then retroactively scan sites with similar HTML hash and flag them?<p>Fairly sure you could do a HTML search with Google, 7 stores having extremely similar HTML and images seems rather unlikely.<p>Effectively, it&#x27;s virus total but for copycat sites.
评论 #33452439 未加载
bashcoderover 2 years ago
A burgle.
10g1kover 2 years ago
Alibaba.
napsterbrover 2 years ago
Off-topic, but something seems dangerously off with urlscan.io (a service I had never heard of before).<p>If I go to urlscan.io and look at the recently scanned sites (which are live-updated), every now and then I can find links with potentially sensitive information.<p>I found OneDrive and SharePoint links. I was unable to actually access the documents in them (it asked me to login), but I could see their content (or metadata) with UrlScan&#x27;s &quot;live screenshot&quot; feature.<p>At one point, it scanned a &quot;reset password&quot; link with the authentication token in the query string (!). I was able to access that link and I would likely be able to reset the password for that specific user. I won&#x27;t share the underlying website so others don&#x27;t go ahead looking for it, but it was for a non-US government service.<p>The impression I have is that some email provider (or perhaps some antivirus software?) is automatically scanning user emails and the links are being shared publicly, alongside a &quot;live screenshot&quot;.<p>I might be missing something, but this is weird.
评论 #33446788 未加载
评论 #33446878 未加载
评论 #33446981 未加载
zinckiwiover 2 years ago
An Amazon?
评论 #33446972 未加载
quickthrower2over 2 years ago
A phish
评论 #33447062 未加载
评论 #33446960 未加载
评论 #33447140 未加载