National Cyber Warfare Foundation (NCWF)

Purchase Scam Networks: How fraudsters prey on victims


0 user ratings
2025-08-14 15:47:07
milo
Blue Team (CND)
Access expert insights on how brand impersonation, online ads, and malicious merchants help a purchase scam network prey on victims

Executive Summary


On April 19, 2025, Recorded Future® Payment Fraud Intelligence identified lidlorg[.]com as a likely purchase scam website that employs brand impersonation against a German international discount retailer. As of May 8, 2025, our analysis has linked lidlorg[.]com to a network of 71 likely purchase scam websites, including others that combine brand impersonation and online ad campaigns for propagation. All identified scam websites use one or more of twelve shared merchant accounts to process visitor transactions. All transactions with these merchant accounts are highly likely to be fraudulent and facilitate card compromise.


Purchase scams present financial fraud risks to card issuers and compliance risks to merchant acquirers, especially in cases where linked scam merchant accounts are also abused to support transaction laundering activity. To reduce these risks, card issuers should take action against identified merchant accounts and card accounts that have transacted with those merchants, while merchant acquirers should take action against the merchant accounts. We describe these mitigation strategies in detail in the Mitigations section of this report.


Key Findings



  • On April 19, 2025, we identified lidlorg[.]com as a likely purchase scam website that uses brand impersonation against a German retailer.

  • The scam website lidlorg[.]com is likely part of a network of 71 purchase scam domains using the same merchant accounts to defraud victims and steal victim data.

  • Transactions with the merchant accounts linked to lidlorg[.]com are highly likely to be fraudulent and facilitate card compromise. These merchant accounts include AKRU KERAMIK GMBH, ANT ONLINE E-COMMERCE STO, BALSAMIC, CLOTHWEARABLY, LMS AESTHETICS, MYCOZYBABIES, ONCLOTHESSHOES, PETHOUSEN LLC, REFINEDHAT, YSP CLOTHINGGSHOP, YSP NIHILSTOOL, and YSP QHWLKJSHOP.

  • It is unclear whether the network of scam domains and merchant accounts is controlled by a single threat actor or various threat actors acting in concert — for example, through partnership on the dark web and the provision of dark web-based services in a greater scam ecosystem.

  • To attribute this scam network to a single threat actor or various threat actors, card issuers and merchant acquirers with access to merchant data can likely leverage commonalities in associated merchant registration information, such as company data.


Threat Analysis of Purchase Scam Websites


On April 19, 2025, Recorded Future identified lidlorg[.]com as a likely purchase scam website. The operators of lidlorg[.]com employed brand impersonation targeting a German international discount retailer chain, as indicated by the use of typosquatting in the domain name and the abuse of a brand logo by “EU STORE” and “L Clearance”, two advertiser accounts linked to lidlorg[.]com (Figure 1). The scam website likely defrauds victims through the use of three linked merchant accounts, which enable the operator to conduct a fraudulent scam transaction while stealing victim personal and financial data for downstream fraud.


Recorded Future Payment Fraud Intelligence distinguishes purchase scam websites from phishing websites through their use of linked merchant accounts. While the purchase scams we identify are similar to other online scams (especially in their reliance on fraudulent offers for goods and services that buyers will never receive), they are distinct from phishing websites because they can process victim payments rather than simply collecting victim data through bogus form submissions.





brand-imperson-002.png



Figure 1: Online ad accounts for the likely scam website lidlorg[.]com impersonate a German brand (Source: Facebook Ads)



Our analysis indicated that lidlorg[.]com is part of a network of 71 likely scam e-commerce domains, as indicated by overlapping use of scam merchant accounts. All likely scam domains use various combinations of the same merchant accounts for their payment functionality and have been operational since no later than February 2025. Many of the domains also use typosquatting to impersonate multiple brands. At the time of our analysis, many of the domains were associated with active or historical online ad campaigns. Many of these were also removed by the ad platform for “Unacceptable Business Practices,” which includes scam activity. On average, the domains were 65 days old and likely malicious, as indicated by their average DomainTools risk score of 88/100.


Figure 2 illustrates the links between the identified scam domains and merchant accounts. The Appendix of this report lists the scam domains, merchant accounts, and all timestamps when we confirmed that they were linked.





brand-imperson-003.png



Figure 2: This graph demonstrates the overlapping use of eight merchant accounts by 71 scam domains; lidlorg[.]com, the “patient-zero” domain within the investigation, is graphed in light blue (Source: Recorded Future)



Transactions with merchant accounts linked directly or indirectly to lidlorg[.]com are highly likely to be fraudulent and facilitate card compromise. As of May 8, 2025, lidlorg[.]com has directly used three merchant accounts to process visitor transactions. We linked nine additional merchant accounts to lidlorg[.]com via overlapping use by other scam e-commerce domains within the network.




Merchant Name

Acquirer BIN

MCC

Date First Seen

Date Last Seen

Linked Scam Domains



AKRU KERAMIK GMBH

264431

5719

2025-04-30

2025-04-30

1



ANT*ONLINE E-COMMERCE STO

270514

5631

2025-04-09

2025-04-09

1



BALSAMIC

270522

5661

2025-04-01

2025-04-09

2



CLOTHWEARABLY

271109, 024440

5691

2025-02-25

2025-03-07

11



LMS AESTHETICS

230230

5719

2025-04-23

2025-04-30

3



MYCOZYBABIES

271109, 024440

5641

2025-04-16

2025-04-26

5



ONCLOTHESSHOES

875516

5311

2025-04-23

2025-04-30

5



PETHOUSEN LLC

230509

5995

2025-04-19

2025-04-30

3



REFINEDHAT

271109, 024440

5691

2025-04-14

2025-04-23

4



YSP*CLOTHINGGSHOP

020608

5621

2025-03-04

2025-04-19

9



YSP*NIHILSTOOL

020608

5311

2025-03-26

2025-04-19

9



YSP*QHWLKJSHOP

020608

5621

2025-02-25

2025-04-26

25



Table 1: All transactions with merchant accounts linked to lidlorg[.]com are likely to be fraudulent (Source: Recorded Future)


Note that inaccurate associated merchant URL data suggests that threat actors likely use merchant accounts within this group for transaction laundering. For example, merchant data indicates that PETHOUSEN LLC is associated with pethousen[.]com rather than the three scam domains we linked it to (biliability[.]com, dknyonlineuk[.]com, outletmalleu[.]shop). Inaccurately associated merchant URLs often indicate that a merchant is engaging in transaction laundering.


Transaction laundering allows threat actors to conceal high-risk or illegal activity by processing payments for an entity, goods, or services unknown to the merchant’s acquiring bank or payment provider. While the transactions are disguised as low-risk or legitimate purchases, they are often transactions for illegal activities. In this sense, all purchase scam transactions that defraud victims are inherently a form of transaction laundering.


It is unclear whether the scam network identified in this report is controlled by a single threat actor or various threat actors acting in concert. Merchant account abuse for purchase scams frequently overlaps between networks of linked domains, as shown in Figure 2. While merchant accounts dispersed throughout scam networks network can have similarities that suggest a common origin or operator, the networks of scam domains linked to the merchant accounts are often distinct (for example, in their abuse of different ad platforms for propagation to victims)


Because of this, we consider the two following scenarios equally likely regarding attribution of the scam network to an operator:



  • Multiple networks of scam domains operated by different threat actors may be using the same merchant accounts, whose services are rented out as part of a third-party, dark web-based “cash-out” offering.

  • A single threat actor may be controlling the domain and merchant infrastructure for the entire network, intentionally rotating the domain/merchant combinations in an attempt to obscure attribution.


An ecosystem of illicit dark web services likely supports fraud-focused threat actors. These threat actors leverage third-party services for a variety of scam use cases, including the following:



  • Fraud-based malvertising services: Threat actors organize illicit advertising services by compromising advertiser accounts for online ad platforms or by purchasing advertising campaigns using stolen financial data.

  • “Cash-out” services: Threat actors purvey merchant accounts under their control to other threat actors to monetize stolen card data.

  • Traffic services: Threat actors drive traffic to artificially boost malicious advertisements, including for scam websites, in search results. Alternatively, they partner with cash-out service providers to monetize existing victim traffic to scam domains.


Card issuers and merchant acquirers with access to merchant data can likely leverage merchant analysis for threat actor attribution of this scam network. Commonalities in merchant registration would likely indicate that the accounts are operated by a single threat actor, whereas discrepancies would indicate that the accounts are operated by various threat actors. Identical company data is an example of a commonality that we would expect to see in linked merchant accounts operated by a single threat actor.


Note that since scam domains are easier to acquire and less resilient to detection and mitigation than merchant accounts (and therefore more expendable as infrastructure), we consider domain analysis less likely to enable threat actor attribution of this scam network.


Mitigations for Fraud Prevention


Purchase scams present financial fraud risks to card issuers and compliance risks to merchant acquirers, especially in cases where linked scam merchant accounts are also abused to support transaction laundering activity. To reduce these risks, apply the mitigation strategies described below.


Card Issuers



  • To prioritize fraud prevention over potential customer friction, immediately decline transactions with the identified scam merchant accounts and track customer card accounts that have transacted with the merchant for additional fraud signals before taking action.

    • Escalate the fraud risk score of customer accounts that attempt transactions with the merchants or flag the account for additional review.

    • Consider the presence of additional fraud signals on flagged accounts as a high-confidence basis to reissue the customer card or apply other remediations.



  • To minimize customer friction, assess transaction data within your cardholder portfolio with the identified scam merchant accounts before taking action against either the merchant accounts or customer card accounts.

    • Bucket all customer transactions with the identified merchants.

    • Determine a fraud incidence threshold in accordance with your organization’s risk tolerance. This threshold should be higher than the baseline fraud incidence rate observed across your portfolio.

    • If customer transactions within the bucket exceed the fraud incidence threshold, automatically block all customer transactions with the identified merchant accounts and consider card reissue.




Merchant Acquirers





    • Analyze linked merchant domains to identify other likely fraudulent merchant accounts operated within the scam network. Card network acquirer data lookup APIs may enable merchant acquirers to search for merchant accounts based on domain.

    • Scan merchant acquirer BIN and MCC combinations within your merchant portfolio to identify other likely fraudulent merchant accounts registered with similar merchant data or within a short period of time. Card network APIs may enable merchant acquirers to search for merchant account registrations based on acquirer BIN and MCC.

    • Flag suspected fraudulent merchant accounts for enhanced due diligence, investigation, suspension, or termination in accordance with your risk tolerance.




Outlook for Purchase Scam Networks



  • Our analysis has confirmed that the likely purchase scam network identified in this report has been operational since February 2025. Because we continue to confirm new scam domains within the group are operational, the scam operation appears to be ongoing. By extension, the scam operator will likely continue deploying new domains and online ad campaigns to support their scam activity, especially as old domains and ad campaigns are taken offline.

  • These new scam domains will likely use the merchant accounts identified in this report. Termination or suspension of scam merchant accounts by their acquirers is unlikely to halt all scam activity by the operator. However, this kind of remediation would almost certainly place additional time and resource demands on the scam network operator to acquire new merchant account infrastructure.


Appendix: Identified Scam Domains, Linked Merchant Accounts, and Detection Dates


The table below displays the identified scam domains, the merchant accounts linked to them, and the dates they were confirmed to be linked.




Scam Domain

Merchant Name

Date Seen



adairs-store[.]shop

YSP*QHWLKJSHOP

2025-03-20



biglotsfactory[.]com

YSP*QHWLKJSHOP

2025-03-26



biliability[.]com

PETHOUSEN LLC

2025-04-19



biliability[.]com

MYCOZYBABIES

2025-04-19



boxrawstore[.]shop

REFINEDHAT

2025-04-19



bugaboo-store[.]shop

YSP*QHWLKJSHOP

2025-03-21



camper-bestsale[.]shop

YSP*NIHILSTOOL

2025-04-09



candywarehouses[.]com

YSP*NIHILSTOOL

2025-03-26



clarkseuoff[.]sa[.]com

MYCOZYBABIES

2025-04-16



deuter-eu-store[.]shop

YSP*QHWLKJSHOP

2025-03-21



discountmarkets[.]shop

CLOTHWEARABLY

2025-03-07



dknyonlineuk[.]com

PETHOUSEN LLC

2025-04-30



eccoshpedk[.]com

YSP*CLOTHINGGSHOP

2025-03-20



ecoalffashion[.]shop

YSP*CLOTHINGGSHOP

2025-03-20



ecofoodcontainers[.]shop

ONCLOTHESSHOES

2025-04-30



eu[.]goldengoosefan[.]com

ONCLOTHESSHOES

2025-04-23



eu[.]stanleys1913[.]com

YSP*CLOTHINGGSHOP

2025-04-19



eu[.]stanleys1913[.]com

MYCOZYBABIES

2025-04-19



eur[.]piinkovip[.]com

CLOTHWEARABLY

2025-02-26



factorydealseu[.]com

YSP*QHWLKJSHOP

2025-04-09



factorydealseu[.]com

CLOTHWEARABLY

2025-02-25



featherrunon[.]shop

YSP*QHWLKJSHOP

2025-04-19



filippa-k[.]shop

CLOTHWEARABLY

2025-02-25



filson-stores[.]com

YSP*NIHILSTOOL

2025-04-09



finalclearancehub[.]com

ONCLOTHESSHOES

2025-04-26



finalclearancehub[.]com

MYCOZYBABIES

2025-04-26



firelighthome[.]shop

YSP*QHWLKJSHOP

2025-04-09



flagshipsale[.]com

YSP*QHWLKJSHOP

2025-04-02



florisvanbommel-outlet[.]shop

YSP*CLOTHINGGSHOP

2025-04-19



fredperrypoloss[.]shop

MYCOZYBABIES

2025-04-16



frosttrekdown[.]shop

YSP*QHWLKJSHOP

2025-04-09



goldberghdeals[.]shop

REFINEDHAT

2025-04-14



groceryoutlet[.]ru

CLOTHWEARABLY

2025-02-26



gudrunstyle[.]com

YSP*QHWLKJSHOP

2025-04-09



guessdiscount[.]shop

YSP*CLOTHINGGSHOP

2025-04-09



hotdealsok[.]shop

YSP*QHWLKJSHOP

2025-04-09



icedcoffee[.]store

YSP*CLOTHINGGSHOP

2025-04-09



jblspeaker[.]shop

CLOTHWEARABLY

2025-02-26



joma-eu[.]shop

REFINEDHAT

2025-04-19



kenwoodappliances[.]shop

CLOTHWEARABLY

2025-03-04



kenwoodkitchen[.]shop

CLOTHWEARABLY

2025-02-28



ketersale[.]shop

YSP*QHWLKJSHOP

2025-03-20



lacoste-eu[.]com

CLOTHWEARABLY

2025-02-26



lidlmarket[.]store

YSP*QHWLKJSHOP

2025-04-03



lidlmarket[.]store

YSP*NIHILSTOOL

2025-04-03



lidlods[.]com

YSP*NIHILSTOOL

2025-04-16



lidlorg[.]com

YSP*NIHILSTOOL

2025-04-19



lidlorg[.]com

REFINEDHAT

2025-04-19



lidlorg[.]com

LMS AESTHETICS

2025-04-23



lidloutlets[.]eu

YSP*QHWLKJSHOP

2025-02-25



lidlsport[.]top

YSP*CLOTHINGGSHOP

2025-03-04



lidlstores[.]com

YSP*QHWLKJSHOP

2025-03-18



lidlv[.]com

YSP*QHWLKJSHOP

2025-04-02



networktsales[.]com

MYCOZYBABIES

2025-04-26



oakley-qc[.]shop

REFINEDHAT

2025-04-19



officialfactorysale[.]com

YSP*QHWLKJSHOP

2025-04-01



onlinedesales[.]com

YSP*QHWLKJSHOP

2025-04-11



ortovox-vip[.]shop

YSP*QHWLKJSHOP

2025-03-20



outletmalleu[.]shop

PETHOUSEN LLC

2025-04-30



outletmalleu[.]shop

LMS AESTHETICS

2025-04-30



outletmalleu[.]shop

AKRU KERAMIK GMBH

2025-04-30



parkside-tool[.]com

BALSAMIC

2025-04-09



parksideamonlini[.]shop

CLOTHWEARABLY

2025-02-27



perfectfoodstorage[.]shop

CLOTHWEARABLY

2025-02-28



physicalant[.]com

REFINEDHAT

2025-04-23



physicalant[.]com

LMS AESTHETICS

2025-04-23



pnjeduewmj[.]com

CLOTHWEARABLY

2025-02-26



pocketchicvip[.]shop

YSP*QHWLKJSHOP

2025-04-11



sale-rapha[.]com

YSP*NIHILSTOOL

2025-03-26



sale-vivobarefoot[.]com

YSP*NIHILSTOOL

2025-04-09



smecmc[.]com

YSP*CLOTHINGGSHOP

2025-03-30



snowpeakk[.]shop

YSP*QHWLKJSHOP

2025-04-26



sportsale-shop[.]click

YSP*NIHILSTOOL

2025-04-16



stanleys1913[.]com

YSP*CLOTHINGGSHOP

2025-03-26



tojoy[.]online

ONCLOTHESSHOES

2025-04-25



tupolevshop-eu[.]top

YSP*QHWLKJSHOP

2025-04-11



ufpro-onlines[.]shop

YSP*QHWLKJSHOP

2025-03-11



uskuiusvipstore[.]shop

YSP*QHWLKJSHOP

2025-04-01



uskuiusvipstore[.]shop

BALSAMIC

2025-04-01



uskuiusvipstore[.]shop

ANT*ONLINE E-COMMERCE STO

2025-04-09



vejadeals[.]shop

ONCLOTHESSHOES

2025-04-23



wayfairbestoffers[.]com

YSP*QHWLKJSHOP

2025-03-26



yogasports[.]shop

REFINEDHAT

2025-04-19




Source: RecordedFuture
Source Link: https://www.recordedfuture.com/blog/purchase-scam-networks-prey-on-victims


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Blue Team (CND)



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.