blog.checkpoint.com Open in urlscan Pro
18.173.205.29  Public Scan

URL: https://blog.checkpoint.com/research/navigating-the-evolving-threat-landscape-ahead-of-black-friday/
Submission Tags: @nominet_threat_intel rnt-string-2nd reference_article_link confidence_medium cluster_60494359 Search All
Submission: On November 21 via api from GB — Scanned from GB

Form analysis 3 forms found in the DOM

<form id="search-form">
  <input type="image" src="https://www.checkpoint.com/wp-content/themes/checkpoint-theme-v2/images/search-btn.png" value="Submit" alt="Search"><input type="text" id="stq" name="stq" class="st-search-input" placeholder="Enter your keywords..."
    x-webkit-speech="" x-webkit-grammar="builtin:search" autocomplete="off" aria-label="Search Term">
</form>

<form id="search-form1">
  <label style="display: none;">Search</label>
  <input type="image" src="https://www.checkpoint.com/wp-content/themes/checkpoint-theme-v2/images/search-btn.png" value="Submit" alt="Search"><input type="text" id="stq1" name="stq1" class="st-search-input" placeholder="Enter your keywords..."
    x-webkit-speech="" x-webkit-grammar="builtin:search" autocomplete="off" aria-label="Search Term">
</form>

GET /

<form action="/" id="searchform" class="search-form" method="get">
  <div class="form-group">
    <input type="search" name="s" class="search-form__input" autocomplete="off" placeholder="Search ...">
    <button type="submit" class="btn search-form__submit"><i class="atbs-atoms-icon-right-arrow"></i></button>
  </div>
</form>

Text Content

Get a Demo Contact Us Support Log In
 * Search
   * 
 * Geo Menu
   * * Choose your language...
     * English (English)
     * Spanish (Español)
     * French (Français)
     * German (Deutsch)
     * Italian (Italiano)
     * Portuguese (Português)
     * Japanese (日本語)
     * Chinese (中文)
     * Korean (한국어)
     * Taiwan (繁體中文)

 * Solutions
   * * Use Cases
     * Industry
     * Organization Size
     
     * Hybrid Cloud
     * Hybrid Mesh Firewall
     * Generative AI
     * Zero Trust & Least Privilege
     * Developer Security & Operations
     * IoT Security Solutions
     * Anti-Ransomware
     * SD-WAN
     * Threat Hunting
     * Compliance
     * Collaboration Security
     * Email Security
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     * Retail
     * Financial Services
     * Federal Government
     * State & Local Government
     * Healthcare
     * Telco Service Provider
     * Education
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     * Enterprise
     * Small & Medium Business
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
 * Platform
   * * Infinity Platform
     * Secure the Network
     * Secure the Cloud
     * Secure the Workspace
     * Security Operations
     
     Explore Infinity
     * Platform OverviewIndustry leading AI-Powered and Cloud-Delivered cyber
       security platform
     * Infinity ServicesPrevention-first security operation, AI Copilot,
       ThreatCloud AI, and 24/7 managed security services, consulting, and
       training
     * Infinity PortalLearn about and sign into Check Point's unified security
       management platform
     * Infinity Platform AgreementPredictable cyber security environments
       through a platform agreement
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     Explore Quantum
     * Next Generation Firewall (NGFW) Security GatewayIndustry leading
       AI-powered security gateways for modern enterprises
     * SD-WANSoftware-defined wide are network to converge security with
       networking
     * Security Policy and Threat ManagementManage firewall and security policy
       on a unified platform for on-premise and cloud networks
     * Internet of Things (IoT)Autonomous IoT threat prevention with zero trust
       profiling, virtual patching, and segmentation
     * Remote Access VPN Secure, seamless remote access to corporate networks
     * Industrial Control System Security Gateways Protect ICS, Operational
       Technology, and SCADA systems
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     Explore CloudGuard
     * Cloud Network SecurityIndustry leading threat prevention with
       cloud-native firewalls
     * Cloud Native Application Protection PlatformCloud-native prevention-first
       security
     * Code SecurityDeveloper-centric code security
     * Web Application and API SecurityAutomated application and API security
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     Explore Harmony
     * Email and Collaboration SecurityEmail security that includes office and
       collaboration applications
     * Endpoint SecurityComprehensive endpoint protection to prevent attacks and
       data compromise
     * Mobile SecurityComplete protection for the workforce across all mobile
       devices
     * SASEUnified security with optimized internet and network connectivity
     * SaaS SecurityThreat prevention management for SaaS
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
     
     Security Operations
     * External Risk ManagementProtect against threats like credential theft,
       fraud, and brand impersonation.
     * Extended Prevention & ResponseAI-powered, cloud-delivered security
       operations with Infinity XDR/XR
     * Secure Automation and CollaborationAutomate response playbooks with
       Infinity Playblocks
     * Unified Security Events and Logs as a ServiceInfinity events cloud-based
       analysis, monitoring, and reporting
     * AI Powered TeammateAutomated Security Admin & Incident Response with AI
       Copilot
     * ThreatCloud AIThe brain behind Check Point’s premier threat prevention
     * Managed Prevention & Response ServiceSOC operations-as-a-service with
       Infinity MDR/MPR
     * 
     * See All Products >
     
     UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now
     
 * Support & Services
   * * Strategy & Risk
     * Professional Services
     * Training Programs
     * Incident Response
     * Managed Security
     * Support
     
     Explore Strategy & Risk Services
     * External Risk ManagementOutsource specialized cybersecurity functions to
       Check Point security experts
     * Cyber Risk AssessmentAssess your cyber risks and plan actionable strategy
     * Attack Surface & Penetration TestingEvaluate security defenses against
       potential cyber attacks and threats
     * Security Controls Gap Analysis
       (NIST, CIS)Analyze technology gaps and plan solutions for improved
       security and ROI
     * Threat Intelligence & Brand ReputationAnalyzed data on cyber threats,
       aiding proactive security measures
     * See All Strategy & Risk Services >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Professional Services
     * Security Deployment & OptimizationStrategic deployment and refinement of
       security for optimal protection
     * Advanced Technical Account ManagementProactive service delivered by
       highly skilled cyber security professionals
     * Lifecycle Management ServicesEffectively maintain the lifecycle of
       security products and services
     * See All Professional Services >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Training Programs
     * Training & CertificationsComprehensive cyber security training and
       certification programs
     * CISO TrainingGlobally recognized training for Chief Information Security
       Officers
     * Security AwarenessEmpower employees with cyber security skills for work
       and home
     * Cyber Park - Cyber RangeSimulated gamification environment for security
       training
     * Mind Training HubCheck Point cyber security and awareness programs
       training hub
     * See All Training Programs >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Incident Response Services
     * Incident ResponseManage and mitigate security incidents with systematic
       response services
     * Managed Detection and Response24/7 SOC Operations for Check Point + 3rd
       party solutions, 24/7 response
     * Digital ForensicsComprehensive investigation and analysis of cyber
       incidents and attacks
     * See All Incident Response Services >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Managed Security Services
     * SOC-as-a-ServiceLeverage SOC expertise to monitor and manage the security
       solutions
     * Network Security and NOC-as-a-ServiceManagement of IT network and
       firewall infrastructure
     * Cloud & ITAccess to managed cloud and IT technologies, expertise, and
       resources
     * Managed Firewall as a ServiceSimplify data center workflow orchestration
       and scale up on demand
     * See All Managed Security Services >
     
     INFINITY GLOBAL SERVICES
     
     FIND THE RIGHT END-TO-END CYBERSECURITY SERVICE SOLUTIONS TAILORED TO MEET
     YOUR ORGANIZATION'S SPECIFIC NEEDS.
     
     Explore All Services
     
     
     Explore Support Services
     * Support ProgramsPrograms designed to help maximize security technology
       utilization
     * Check Point PROProactive monitoring of infrastructure program offerings
     * Contact Support
     
     OUR CUSTOMER SUPPORT TEAM IS ONLY A CLICK AWAY AND READY TO HELP YOU 24
     HOURS A DAY.
     
     Visit Support Center
     
   
 * Solutions
   * Use Cases
     * Hybrid Cloud
     * Hybrid Mesh Firewall
     * Generative AI
     * Zero Trust & Least Privilege
     * Developer Security & Operations
     * IoT Security Solutions
     * Anti-Ransomware
     * SD-WAN
     * Threat Hunting
     * Compliance
     * Collaboration Security
     * Email Security
   * Industry
     * Retail
     * Financial Services
     * Federal Government
     * State & Local Government
     * Healthcare
     * Telco Service Provider
     * Education
   * Organization Size
     * Enterprise
     * Small & Medium Business
   
   
 * Platform
   * Infinity Platform
     * Platform Overview
     * Infinity Services
     * Infinity Portal
     * Infinity Platform Agreement
   * Secure the Network
     * Next Generation Firewall (NGFW) Security Gateway
     * SD-WAN
     * Security Policy and Threat Management
     * Internet of Things (IoT)
     * Industrial Control System Security Gateways
     * Remote Access VPN
   * Secure the Cloud
     * Cloud Network Security
     * Cloud Native Application Protection Platform
     * Code Security
     * Web Application and API Security
   * Secure the Workspace
     * Email and Collaboration Security
     * Endpoint Security
     * Mobile Security
     * SASE
     * SaaS Security
   * Services
     * External Risk Management
     * Managed Prevention & Response Service
     * Extended Prevention & Response
     * Secure Automation and Collaboration
     * Unified Security Events and Logs as a Service
     * AI Powered Teammate
     * ThreatCloud AI
   
   
 * Support & Services
   * Strategy & Risk
     * External Risk Management
     * Cyber Risk Assessment
     * Attack Surface & Penetration Testing
     * Security Controls Gap Analysis (NIST, CIS)
     * Threat Intelligence & Brand Reputation
   * Professional Services
     * Security Deployment & Optimization
     * Advanced Technical Account Management
     * Lifecycle Management Services
   * Training Programs
     * Training & Certifications
     * CISO Training
     * Security Awareness
     * Cyber Park - Cyber Range
     * Mind Training Hub
   * Incident Response
     * Incident Response
     * Managed Detection and Response
     * Digital Forensics
   * Managed Security
     * SOC-as-a-Service
     * Network Security and NOC-as-a-Service
     * Cloud & IT
     * Managed Firewall as a Service
   * Support
     * Support Programs
     * Check Point PRO
     * Contact Support
   
 * Partners
   * Check Point Partners
     * Find a Partner
     * Channel Partners
     * Technology Partners
     * MSSP Partners
     * AWS Cloud
     * Azure Cloud
   * Become a Partner
     * Overview
   * Enrolled Partners
     * Partner Portal
   
   * CHECK POINT IS 100% CHANNEL. GROW YOUR BUSINESS WITH US!
     
     Sign Up Now
 * More
   * Company
     * About Us
     * Leadership
     * Careers
     * Investor Relations
     * Newsroom
   * Learn
     * Resource Center
     * Customer Stories
     * Blog
     * Events & Webinars
     * Cyber Hub
   * Cyber Security Insights
     * Check Point Research
     * CheckMates Community
   
   * UNVEILING THE FUTURE OF NETWORK SECURITY IN THE ERA OF AI
     
     Register Now

 * Search
   * Search
 * Geo Menu
   * Choose your language...
   * English (English)
   * Spanish (Español)
   * French (Français)
   * German (Deutsch)
   * Italian (Italiano)
   * Portuguese (Português)
   * Japanese (日本語)
   * Chinese (中文)
   * Korean (한국어)
   * Taiwan (繁體中文)

Toggle Navigation

Blog Home > Research > Navigating the Evolving Threat Landscape Ahead of Black
Friday
Filter by: Select category Research  (594) Security  (966) Securing the
Cloud  (313) Harmony  (195) Company and Culture  (36) Innovation  (6) Customer
Stories  (14) Infinity Security Operations  (5) Securing the Network  (13)
Partners  (10) Connect SASE  (10) Email Security  (99) Artificial
Intelligence  (26) Infinity Global Services  (21) Crypto  (13) Healthcare  (14)
Harmony SASE  (10) MSSP  (4) Executive Insights  (230)
ResearchNovember 19, 2024


NAVIGATING THE EVOLVING THREAT LANDSCAPE AHEAD OF BLACK FRIDAY

ByCheck Point Team
Share
 * 
 * 
 * 
 * 
 * 

As Thanksgiving and Black Friday approach, so do the risks of fraudulent
shopping scams. Cyber criminals take advantage of shoppers eager to benefit from
the exceptional sales available on Black Friday. In preparation for this
shopping season, Check Point Research has examined the activities of these cyber
criminals. They found a significant increase in malicious websites related to
Black Friday. Additionally, researchers noted that phishing emails have remained
consistent, indicating that it is easy for cyber attackers to recreate these
scams.

In this blog, we will explore the new websites and phishing emails that appear
ahead of Black Friday.

New “Black Friday” Websites

As each year draws near to the much-anticipated Black Friday after Thanksgiving,
many new websites emerge, often bearing names that resonate with the shopping
extravaganza. This phenomenon reaches its zenith during the week of Black Friday
when the activity peaks. A comparison with previous years reveals a striking
trend: in the weeks leading up to this significant shopping event, the rate of
registered new websites surged tremendously. For instance, this year, the number
of newly established websites linked to Black Friday two weeks before the event
has skyrocketed, showing an 89% increase compared to 2023. Even more
impressively, this figure has more than tripled when stacked against the numbers
from 2022, indicating a robust and growing interest in capitalizing on the
shopping frenzy surrounding Black Friday each year.

While not all of these websites are designed with malicious intent, our analysis
reveals a concerning statistic: approximately 3% are categorized as risky or
outright malicious, with virtually none classified as “safe.” The overwhelming
majority of these sites remain shrouded in ambiguity, typically displaying a
default “parked” webpage cluttered with advertisements and links. This benign
appearance can quickly transform, turning them into platforms for phishing
attacks.

The malicious websites Check Point Research has observed signals a troubling
trend. The websites not only impersonate well-known global brands but also
target smaller, boutique brands that may be less recognizable. Interestingly,
many of these fraudulent sites exhibit similar design elements and formatting,
suggesting the possibility of a coordinated operation behind these deceptive
practices.

The following are examples of fake “Black Friday” brand websites:

 * Stüssy (Steatwear): stussycanadablackfriday[.]com
 * Longchamp (Bags): longchampblackfriday[.]com
 * Wayfair (Online Home Store): wayfareblackfriday[.]com
 * SOREL (Footwear): soreloutletblackfriday[.]com
 * Crew (Retail): jcrewblackfriday[.]com
 * IUN (Footwear): blackfriday-shoe[.]top



Recurring banners on fake “Black Friday” websites (note the grammatical error in
the first banner).



The display of similar product and pricing can be found on the following sites:
jcrewblackfriday[.]com, soreloutletblackfriday[.]com and
longchampblackfriday[.]com

wayfareblackfriday[.]com still seems as work-in-progress by the attacker –
displaying wrong items and unrelated inline text



Brand

Rolex

Year

2023

2024

Subject

[Black Friday Special Offer] Rolex Watches Start at $250 Today! Shop Online Now!

[Black Friday] Top Luxury Watches Starting at $250 – Shop Today!

From

Rolex Watches
(hxdvd@a[.]mtcyfizfdu[.]ru)

Hot Rolex
(kfnvibimprocurement@ogmabeille[.]net)

Fake Website

www[.]hotwatch[.]su



www[.]lzrox[.]co



 

Brand

Louis Vuitton

Year

2023

2024

Subject

[Black Friday] Louis Vuitton Bags Up To 90% Off! Top Quality Low Cost! Shop
Online Now!

[Black Friday]Louis Vuitton Bags Up To 90% Off! Top Quality Low Cost! Shop
Online Now!

From

Louis Vuitton
(fzcypmsta@a[.]htaegewg[.]ru)

Louis Vuitton
(qtly@a[.]ebtjbfrmbqu[.]ru)

Fake Website

www[.]85off-lvbags[.]com

 

www[.]hottest-bag[.]com



 

Shopping Safely with Security Tips 

To help online shoppers stay safe this year, following some practical security
tips is essential. First, always check URLs carefully for misspellings or
unusual top-level domains, as these could indicate counterfeit sites designed to
steal your data. Create strong, uncrackable passwords for your accounts,
particularly for platforms like Amazon. Ensure the website URL starts with
“https://” and has a padlock icon, signaling a secure connection. Limiting the
personal information you share with online retailers is also wise, avoiding
unnecessary details like your birthday or social security number. Be cautious
with emails; phishing attacks often use urgent language to lure you into
clicking links or downloading attachments—always verify the source. If a deal
seems too good to be true, trust your instincts and avoid suspicious offers.
Finally, credit cards over debit cards are preferred for online shopping, as
they provide better protection and reduce liability in the event of theft.

 

0 201


YOU MAY ALSO LIKE

Research November 14, 2024


SPOTLIGHT ON IRANIAN CYBER GROUP EMENNET PASARGAD’S MALWARE

Executive Summary On October 21, 2024, multiple emails impersonating the ...
Research November 12, 2024


HAMAS-LINKED THREAT GROUP EXPANDS ESPIONAGE AND DESTRUCTIVE OPERATIONS

Check Point Research has been monitoring the ongoing activities of ...
Research November 11, 2024


OCTOBER 2024’S MOST WANTED MALWARE: INFOSTEALERS SURGE AS CYBER CRIMINALS
LEVERAGE INNOVATIVE ATTACK VECTORS

Check Point Software’s latest threat index reveals a significant rise ...
Research November 4, 2024


THE EVOLUTION OF TRANSPARENT TRIBE’S NEW MALWARE

Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, ...

 * COMPANY
   * About Us
   * Careers
   * Leadership
   * Newsroom
   * Trust Center
   * Investor Relations
   * Merchandise Store
   * Contact Us
 * TECHNICAL RESOURCES
   * User Center Sign In
   * Advisories
   * Threat Map
   * Threat Wiki
   * URL Categorization
   * App Wiki
 * EXPAND & LEARN
   * Resource Center
   * Cyber Hub
   * Check Point Research
   * Check Point Blog
   * Customer Stories
   * Product Knowledge Center
 * SUPPORT & SERVICES
   * Support Center
   * Infinity Global Service
   * IGS Portal
 * * Contact Sales
     * North America:
     * +1-866-488-6691
     * International:
     * +44-125-333-5558
   * Contact Support
     * North America:
     * +1-888-361-5030
     * International:
     * +44-114-478-2845

--------------------------------------------------------------------------------

Follow Us
YOU DESERVE THE BEST SECURITY™ ©1994- 2024 Check Point Software Technologies
Ltd. All rights reserved.
Copyright | Privacy Policy | Cookie Settings | Get the Latest News




This website uses cookies in order to optimize your user experience as well as
for advertising and analytics.  For further information, please read our Privacy
Policy and ourCookie Notice.

DISMISS
Manage Preferences



When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices