Empty shopping cart

Online Shopping frauds in India

Executive Summary

Since October 2023, our threat intelligence team has been tracking online shopping frauds in India, targeting e-commerce platforms such as DMart, JioMart, Flipkart, Amazon, Tata Croma and Tata 1mg.

These deceptive websites lure users with substantial discounts, enticing offers, and prizes in an attempt to extract Personally Identifiable Information(PII) and payment details of the user. The phishing websites closely resemble the appearance of authentic e-commerce websites.

Motive

The motive of the threat actors is financial fraud and to harvest the Personally Identifiable Information (PII) of the user not limiting to,

  • The name and address
  • The contact number
  • Debit/Credit Card details

Technical analysis of online shopping fraud websites

In this section, we will explore a few of online shopping frauds in India.

Phishing website #1 impersonating Flipkart

Figure 1 – Screenshot of the phishing website impersonating Flipkart

The deceptive website lures users with a good-to-be-true offer – a Tata Nexon car!

Figure 2 – The product page of the phishing website

Figure 3 – The page displays a list of prizes on offer 

Figure 4 – The page provides instructions on how users can win the prizes

Figure 5 – The page displays a list of winners

Figure 6 – The page urges users to enter their contact number to verify if they have won a prize.

Figure 7 – A page displaying the terms and conditions page of the phishing website

Figure 8 – Screenshot of the contact page on the phishing website.

Phishing website #2 impersonating Flipkart


Figure 9 – Screenshot of the phishing website #2 impersonating Flipkart


Figure 10 – Upon clicking on “Buy Now” the user is prompted to enter their address

Figure 11 – The website accepts any details and prompts the user to continue

Figure 12 – The payment page prompts the user to select a payment method

Figure 13 – The website generates a fake order ID and prompts the user to make the payment using UPI

Phishing website impersonating Amazon

Figure 14 – Screenshot of the phishing website impersonating Amazon


Figure 15 –  The product page of the phishing website

Clicking on “MORE DETAILS” redirects the user to the next page, where they are prompted to purchase the device.

Figure 16 – Upon clicking “BUY NOW,” the user is redirected to the authentic Amazon site.

Phishing website #1 impersonating DMart

Figure 17 – Screenshot of the phishing website impersonating DMart

Figure 18 – Screenshot of the “ORDER NOW” page of the phishing page

Figure 19 – The Shopping Cart of the phishing website

Figure 20 – Payment page requiring the users PII and payment details

Figure 21 – After clicking on “Pay,” the user is redirected to another page and prompts the message.

Phishing website #2 impersonating DMart

Figure 22 – Screenshot of the phishing website #2 impersonating DMart

Figure 23 – Login page on the phishing website

The website displays an error when attempting to log in with invalid credentials.


Figure 24 – Create account page on the phishing website

The phishing website accepts any details and allows the user to login without email verification.

Figure 25 – Shopping cart on the phishing website

Figure 26 – The payment page prompts the user for PII details

After entering the details, selecting the payment method and submitting the form, the website throws an error “Client_id Missing From The Provided Configuration. Please Add Your Application Client_id.”

Phishing website #3 impersonating DMart

Figure 27 – Screenshot of the phishing website impersonating DMart

Figure 28 – After choosing the product, the user is redirected to the cart.


Figure 29 – The Billing Details page prompts the user to enter their PII details and card details

Figure 30 – The billing page accepts any details.

The phishing website prompts the user to download a DMart APK to finalize the pending order.

Figure 31 – VirusTotal identifies the APK from the phishing website as malicious

Phishing website impersonating Tata Croma Electronics

Figure 32 – Screenshot of the home page of the phishing website impersonating the Croma store

Figure 33 – Screenshot of the products page of the phishing website

Figure 34 – Upon selecting “Buy Now,” the user is prompted to enter PII and payment details.

Phishing website impersonating JioMart franchisee application website

Figure 35 – Screenshot of the phishing website impersonating JioMart franchisee application website

Figure 36 – After clicking on “Apply Now,” the user is prompted to fill out a form.


Figure 37 – After the user submits the form, the user is informed that their application was successful and a representative will contact them soon.

Phishing website impersonating JioMart

Figure 38 – Screenshot of the phishing website impersonating JioMart


Figure 39 – After clicking on “Buy” the user is asked to Proceed to payment page


Figure 40 – The payment page prompts the user to enter their personal details and credit card information.

Figure 41 – The payment page accepts false details and asks the user to confirm their order

After confirming, the website prompts the user to download a JioMart APK.

APK – The Android Package with the file extension apk is the file format used by the Android operating system

Figure 42 – The APK is flagged by VirusTotal as Android.Riskware.TestKey.rA, Trojan-Spy.AndroidOS.Banker and Android.PUA.DebugKey

Phishing website #1 impersonating Tata 1mg


Figure 43 – Screenshot of the phishing website impersonating TATA 1mg pharmacy

The website prompts the user to apply for the TATA 1mg pharmacy franchise

Figure 44 – Clicking on “Apply Here” prompts the user to enter their PII details.

Upon submitting the details on the “Apply Now” page, the user receives a “Successfully Applied” message

Phishing website #2 impersonating Tata 1mg

Figure 45 – Screenshot of the phishing impersonating TATA 1mg

The phishing website prompts the user to apply for the TATA 1mg pharma franchise 

Figure 46 – After clicking on “APPLY NOW,” the user is prompted to enter their PII details.

Upon submitting the details, the user is greeted with a message informing that their information has been successfully added.

Safety Recommendations

  1. Purchase products directly from the official website of the brand or from recommended authorized retailers
  2. Research the seller before purchasing the product
  3. Be cautious of purchasing products from websites offering prices significantly lower than those on the official website, or offering free coupons/items.
  4. If you become a victim of cybercrime, particularly financial crime, call the national (India) cybercrime helpline 1930 or file a complaint at https://cybercrime.gov.in/ 

Conclusion

Online shopping frauds in India are on the rise. Threat actors are impersonating not only the online shopping platforms in India but also targeting business users who are interested in operating a franchise store of popular brands.

Interested to monitor your brand on the Internet?

Please send us an email to info@shreshtait.com for an early bird access to our brand monitoring product.

A few other threat intelligence blog posts that you might be interested in,

Website | + posts