China-based phishing groups, notorious for their relentless barrage of scam SMS messages concerning undelivered packages or unpaid toll fees, have unveiled a sophisticated new tactic just in time for the critical holiday shopping season: advanced phishing kits designed for the mass creation of convincing fake e-commerce websites. These meticulously crafted digital storefronts are engineered to harvest customer payment card data and convert it directly into mobile wallets, specifically targeting Apple and Google platforms. Security experts have further revealed that these same sophisticated phishing operations are now employing SMS lures that promise enticing rewards points and offer illusory unclaimed tax refunds, preying on consumer vulnerabilities during a period of heightened online activity and financial transactions.

In a concerning surge over the past week, thousands of domain names have been registered for fraudulent websites masquerading as legitimate platforms, promising T-Mobile customers the opportunity to claim a substantial number of rewards points. These deceptive domains are being aggressively promoted through scam messages delivered via Apple’s iMessage service and Google’s functionally equivalent RCS messaging service, designed to appear as authentic communications. The accompanying visual evidence, including a screenshot of an instant message spoofing T-Mobile, clearly depicts the lure: an offer of thousands of rewards points, a highly attractive proposition for many consumers.

The website scanning service urlscan.io has documented the alarming deployment of thousands of these phishing domains in a mere matter of days. A critical aspect of this scam is its mobile-centric nature; the phishing websites are engineered to load exclusively when accessed from a mobile device. Upon visiting these sites, users are prompted to provide sensitive personal information, including their name, address, phone number, and crucially, their payment card data, all under the guise of claiming the promised rewards points.

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Once a victim submits their card details, the phishing website escalates its deception by prompting the user to share a one-time code sent via SMS by their financial institution. In reality, this code is not for verification but is a critical step for the fraudsters. The bank is sending the code because the criminals have just initiated an attempt to enroll the victim’s phished card details into a mobile wallet service provided by Apple or Google. If the unsuspecting victim provides this one-time code, the phishers gain the ability to link the victim’s compromised card to a mobile device that they physically control, effectively hijacking the victim’s financial identity.

Further investigation by pivoting off these T-Mobile phishing domains within urlscan.io reveals a similar, coordinated scam targeting AT&T customers, demonstrating the widespread nature of this evolving threat. The visual evidence showcases an SMS phishing, or "smishing," website specifically designed to ensnare AT&T users, further highlighting the broad reach of these criminal enterprises.

Ford Merrill, a security researcher at SecAlliance, a CSIS Security Group company, explains that multiple China-based cybercriminal groups operating on a "phishing-as-a-service" model have been leveraging the mobile points lure for an extended period. However, this particular scam has only recently been strategically directed towards consumers within the United States. Merrill notes that while these points redemption schemes have historically seen less traction in the U.S. compared to geographies like the EU and Asia, their current application indicates a significant shift in targeting.

A meticulous review of other domains flagged by urlscan.io, which are demonstrably linked to this Chinese SMS phishing syndicate, reveals an expansion of their fraudulent activities. These groups are now actively spoofing U.S. state tax authorities, fabricating messages that inform recipients of an unclaimed tax refund. The ultimate objective remains consistent: to phish the user’s payment card information and the critical one-time verification code, thereby facilitating unauthorized access to financial accounts. The example of a text message spoofing the District of Columbia’s Office of Tax and Revenue underscores the growing sophistication and geographical reach of these tax-related scams.

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Caveat Emptor: The Shifting Landscape of Online Deception

While many SMS phishing, or "smishing," domains are rapidly identified and flagged by browser manufacturers as malicious, Merrill highlights a burgeoning area of growth for these phishing kits: the creation of fake e-commerce shops. These fraudulent online stores are particularly insidious because they do not draw attention to themselves through mass spamming efforts, allowing them to operate more covertly.

Merrill elaborates that the very same Chinese phishing kits employed for blasting out package redelivery message scams are equipped with modules that enable the swift deployment of a multitude of fake, yet highly convincing, e-commerce storefronts. These counterfeit stores are typically advertised on prominent platforms like Google and Facebook, luring unsuspecting consumers who are actively searching online for deals on specific products. The deception is further compounded by the fact that consumers often land on these sites while seeking genuine bargains, making them more susceptible to the scam.

In these fraudulent e-commerce scenarios, customers willingly provide their payment card and personal information as part of the standard checkout process. This process is then punctuated by a request for a one-time code, purportedly sent by the user’s bank to verify the transaction. In reality, this code is dispatched to the user because the scammers are simultaneously attempting to enroll the supplied card data into a mobile wallet. The visual representation of an ad from a China-based phishing group promoting their fake e-commerce shop templates, with its machine-translated text, starkly illustrates the global nature of this operation and the deceptive tactics employed.

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Merrill further explains that these fake shopping sites typically fetch the malicious code that exposes them as fraudulent only during the checkout process. This timing makes it exceptionally difficult to detect these operations through mass web scanning. Moreover, most customers who complete purchases on these sites do not realize they have been defrauded until weeks later, when the ordered item fails to arrive. The inherent difficulty in detecting these sites is a significant concern, as Merrill notes, "The fake e-commerce sites are tough because a lot of them can fly under the radar. They can go months without being shut down, they’re hard to discover, and they generally don’t get flagged by safe browsing tools."

Fortunately, reporting these SMS phishing lures and websites is an effective method for ensuring their prompt identification and shutdown. Raymond Dijkxhoorn, CEO and founding member of SURBL, a widely utilized blocklist that flags malicious domains and IP addresses, has spearheaded the creation of smishreport.com. This website encourages users to forward screenshots of any smishing messages they receive. Dijkxhoorn emphasizes the tool’s effectiveness: "If [a domain is] unlisted, we can find and add the new pattern and kill the rest of the matching domains. Just make a screenshot and upload. The tool does the rest." The visual of the smishreport.com interface underscores its user-friendly approach to combating smishing.

Merrill points out that the final weeks of the calendar year typically witness a substantial surge in smishing activity, with package redelivery schemes impersonating the U.S. Postal Service or commercial shipping companies being particularly prevalent. He elaborates on the seasonal nature of this threat: "Every holiday season there is an explosion in smishing activity. Everyone is in a bigger hurry, frantically shopping online, paying less attention than they should, and they’re just in a better mindset to get phished."

Shop Online Like a Security Pro: Navigating the Holiday Shopping Season Safely

SMS Phishers Pivot to Points, Taxes, Fake Retailers

The advice for consumers is clear: adopting a shopping strategy solely based on the lowest advertised prices online can be akin to playing Russian Roulette with one’s finances. Even individuals who primarily shop at well-known online retailers can fall victim to scams if they are not vigilant about overly enticing offers, particularly from third-party sellers on these platforms.

For unfamiliar online merchants, it is prudent to invest a few minutes in investigating their reputation. The risk of being scammed escalates significantly when purchasing from a brand-new online store. A simple yet effective method to gauge a site’s legitimacy is to perform a basic WHOIS search on its domain name. A recent "created" date for a website offering a must-have gadget at an unbelievably low price is a strong indicator of a potential "phantom store."

When receiving messages that warn of issues with an order or shipment, it is imperative to navigate directly to the e-commerce or shipping website and avoid clicking on any embedded links or attachments. Phishers and malware distributors frequently exploit urgent situations to create a false sense of panic, often causing recipients to lower their guard.

Beyond outright scams, consumers may also encounter deceptive pricing strategies where steep discounts on products are offset by exorbitant shipping and handling fees. Therefore, careful consideration of all terms and conditions is essential. Consumers should verify shipping times and thoroughly understand the store’s return policies. It is also wise to be vigilant for hidden surcharges and to approach the checkout process with caution, rather than blindly clicking "ok."

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Most critically, maintaining a close watch on monthly financial statements is paramount. The holiday season presents an opportune time for fraudsters to mask unauthorized charges on stolen cards amidst a flurry of legitimate transactions. Consequently, meticulously reviewing credit card bills and promptly disputing any unauthorized charges is a crucial defense mechanism against financial fraud.