Threat Database Rogue Websites Mysmarterdeals.shop

Mysmarterdeals.shop

Threat Scorecard

Ranking: 15,295
Threat Level: 20 % (Normal)
Infected Computers: 39
First Seen: August 22, 2022
Last Seen: August 30, 2023
OS(es) Affected: Windows

Mysmartdeals.shop may sound like a site designed to help users locate the best deals available to them, but unfortunately, this is not what cybersecurity researchers discovered on the page. Instead, they encountered a phishing tactic disguised as a giveaway supposedly organized by T-Mobile. More specifically, Mysmartsdeals.shop appears to be running a variant of the 'T-Mobile Customer Reward Program' tactic. To create a sense of legitimacy, the main page of the site is designed to appear as a real T-Mobile page, while the displayed pop-ups carry the T-Mobile logo.

Users who land on the page may be presented with pop-ups claiming that they have been selected as one of the 100 participants eligible to participate in the giveaway with a chance to win a lucrative reward, such as a Samsung Galaxy S22 or an Apple iPad Pro. Before they can claim their gift, though, users must complete a short survey of 8 questions. Like most phishing schemes, all of the site's actions are designed to hide its true intentions of trying to obtain sensitive or confidential details from its victims.

Indeed, when users complete the survey and press the 'Take it' button to receive the won gift, they will instead be taken to a phishing portal. Here, the fraudsters will ask their victims to provide various personal details, such as first and last names, email addresses, phone numbers and potentially more. All entered information will be collected by the con artists. Subsequently, they can exploit the obtained data to perform various fraudulent activities. Alternatively, the information could be packaged and offered for sale to any interested third party, potentially including cybercriminal organizations.

URLs

Mysmarterdeals.shop may call the following URLs:

mysmarterdeals.shop

Trending

Most Viewed

Loading...