Firewall Daily

Classiscam Fraudsters Target Online Store Owners in Singapore

A Russia-based hacker collective has expanded its operations in Singapore. The group is a famous threat actor known for stealing payment details from vendors and sellers on the internet. The scammer group uses this data to access the payment accounts and drains it to zero, leaving the victim party out of all the saved funds.

According to a report by the international cybersecurity company Group-IB, which is also credited with discovering the scammers, “Classiscam” is a scam-as-a-service operation that defrauds online sellers. The company claims that the scam has reached Singapore’s marketplaces and has been running covertly since March 2022.

The company has expressed its concerns regarding the threat actor and provided users with a thorough analysis of the situation and advice on avoiding falling victim to the scammers. It also states that Singapore residents may need to exercise extra caution when purchasing goods and devices from websites that may copy the design of the genuine website.

What is Classiscam?

Classiscam fraudsters are not an old group, nor does it belong to any bigger hacker groups. According to reports, Classiscam was first discovered in 2020 as a scam-as-a-service affiliate program. It runs on autopilot and is specifically designed to steal payment details from users on product websites like Amazon, Shopee, Alibaba, and more.

The report claimed that Classiscam uses “Telegram bots to coordinate operations and create scam pages in seconds,” making it an efficient tool for cybercriminals. By making it seem authentic, the scammers use these websites to scam people into giving them banking details, which can be used to transfer money.

Classiscam fraudsters first appeared in Russia and then propagated through Europe before entering the US markets. Its latest target is the Asia Pacific, specifically Singapore, which is home to over 147 E-commerce stores that operate daily.

How do Classiscam fraudsters operate?

Classiscam fraudsters operate in a pyramid hierarchy, where the top administration recruits new members and automates the scams. In contrast, the lower levels work on targeting people on eCommerce websites. The fraudsters rely heavily on bots, which automate the scams using online chat functions. In the case of Singapore, the hackers are reversing the techniques and instead targeting online sellers, not buyers.

To make this scam work, hackers use a unique phishing link inserted into an identical website that lures sellers to reveal their information. It works by making little changes to the fake website in the backend to display that a certain amount of payment has been made. This data helps win victims’ trust, and they try facilitating the delivery and other payment procedure by giving their credit card details.

However, since modern payment requires multiple-factor authentication, like a password or prompt, the hackers lead the seller to an online site that once again confirms the payment. This is where scammers exploit the OTP code. All the information they collected so far gives the fraudster enough material to drain the victim’s account.

How to tackle online scammers?

In its report, the report shared methods to identify and stop fraudsters. Users should always check the URL domain to verify if it’s the official website before sharing any personal and payment details,” the report stated. Lastly, users and sellers alike should stay away from too-good-to-be-true offers.

thecyberexpress

Recent Posts

The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

AI fraud, deepfake probes, SME cyber warnings, and ransomware cases highlight rising global risks in this week’s Cyber Express roundup.

2 days ago

French National Bank Authority Breach Exposed 1.2 Million Accounts

French national bank authority confirmed a major data breach affecting 1.2 million bank accounts after a malicious actor stole credentials…

2 days ago

What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

The real success of AI will not only depend on how powerful the technology becomes, but on how safely, fairly,…

2 days ago

Two Petabytes Worth Data of Israeli’s Siphoned, Says Cyber Head

Israel data breach totals two petabytes, with phishing up 35% and cyber influence attacks rising 170%, says Yossi Karadi.

2 days ago

Cyberattack Forces Clinic Closures, Surgery Cancellations at University of Mississippi Medical Center

The UMMC cyberattack halted surgeries, closed clinics statewide and triggered a federal probe into potential patient data exposure.

2 days ago

First Android Malware Weaponizes Gemini AI to Evade Detection, Maintain Persistence

ESET researchers discovered PromptSpy, the first known Android malware to integrate generative AI directly into its execution flow, marking a…

3 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More