Uncovering Black-hat SEO based fake E-commerce scam groups from their redirectors and websites
Uncovering Black-hat SEO based fake E-commerce scam groups from their redirectors and websites
While law enforcements agencies and cybercrime researchers are working hard, fake E-commerce scam is still a big threat to Internet users. One of the major techniques to victimize users is luring them by black-hat search-engine-optimization (SEO); making search engines display their lure pages as if these were placed on compromised websites and then redirecting visitors to malicious sites. In this study, we focus on the threat actors conduct fake E-commerce scam with this strategy. Our previous study looked at the connection between some malware families used for black-hat SEO to enlighten threat actors and their infrastructures, however it shows only a limited part of the whole picture because we could not find all SEO malware samples from limited sources. In this paper, we aim to identify and analyze threat actor groups using a large dataset of fake E-commerce sites collected by Japan Cybercrime Control Center, which we believe is of higher quality. It includes 692,865 fake EC sites gathered from redirectors over two and a half years, from May 20, 2022 to Dec. 31, 2024. We analyzed the links between these sites using Maltego, a well-known link analysis tool, and tailored programs. We also conducted time series analysis to track group changes in the groups. According to the analysis, we estimate that 17 relatively large groups were active during the dataset period and some of them were active throughout the period.
Makoto Shimamura、Shingo Matsugaya、Keisuke Sakai、Kosuke Takeshige、Masaki Hashimoto
计算技术、计算机技术
Makoto Shimamura,Shingo Matsugaya,Keisuke Sakai,Kosuke Takeshige,Masaki Hashimoto.Uncovering Black-hat SEO based fake E-commerce scam groups from their redirectors and websites[EB/OL].(2025-05-27)[2025-06-07].https://arxiv.org/abs/2505.21021.点此复制
评论