Brand impersonation, online ads, and malicious merchants help purchase scam network prey on victims

Brand impersonation, online ads, and malicious merchants help purchase scam network prey on victims

Executive Summary

On April 19, 2025, Recorded Future® Payment Fraud Intelligence identified lidlorg[.]com as a likely purchase scam website that employs brand impersonation against a German international discount retailer. As of May 8, 2025, our analysis has linked lidlorg[.]com to a network of 71 likely purchase scam websites, including others that combine brand impersonation and online ad campaigns for propagation. All identified scam websites use one or more of twelve shared merchant accounts to process visitor transactions. All transactions with these merchant accounts are highly likely to be fraudulent and facilitate card compromise.

Purchase scams present financial fraud risks to card issuers and compliance risks to merchant acquirers, especially in cases where linked scam merchant accounts are also abused to support transaction laundering activity. To reduce these risks, card issuers should take action against identified merchant accounts and card accounts that have transacted with those merchants, while merchant acquirers should take action against the merchant accounts. We describe these mitigation strategies in detail in the Mitigations section of this report.

Key Findings

Threat Analysis of Purchase Scam Websites

On April 19, 2025, Recorded Future identified lidlorg[.]com as a likely purchase scam website. The operators of lidlorg[.]com employed brand impersonation targeting a German international discount retailer chain, as indicated by the use of typosquatting in the domain name and the abuse of a brand logo by “EU STORE” and “L Clearance”, two advertiser accounts linked to lidlorg[.]com (Figure 1). The scam website likely defrauds victims through the use of three linked merchant accounts, which enable the operator to conduct a fraudulent scam transaction while stealing victim personal and financial data for downstream fraud.

Recorded Future Payment Fraud Intelligence distinguishes purchase scam websites from phishing websites through their use of linked merchant accounts. While the purchase scams we identify are similar to other online scams (especially in their reliance on fraudulent offers for goods and services that buyers will never receive), they are distinct from phishing websites because they can process victim payments rather than simply collecting victim data through bogus form submissions.

brand-imperson-002.png
Figure 1: Online ad accounts for the likely scam website lidlorg[.]com impersonate a German brand (Source: Facebook Ads)

Our analysis indicated that lidlorg[.]com is part of a network of 71 likely scam e-commerce domains, as indicated by overlapping use of scam merchant accounts. All likely scam domains use various combinations of the same merchant accounts for their payment functionality and have been operational since no later than February 2025. Many of the domains also use typosquatting to impersonate multiple brands. At the time of our analysis, many of the domains were associated with active or historical online ad campaigns. Many of these were also removed by the ad platform for “Unacceptable Business Practices,” which includes scam activity. On average, the domains were 65 days old and likely malicious, as indicated by their average DomainTools risk score of 88/100.

Figure 2 illustrates the links between the identified scam domains and merchant accounts. The Appendix of this report lists the scam domains, merchant accounts, and all timestamps when we confirmed that they were linked.

brand-imperson-003.png
Figure 2: This graph demonstrates the overlapping use of eight merchant accounts by 71 scam domains; lidlorg[.]com, the “patient-zero” domain within the investigation, is graphed in light blue (Source: Recorded Future)

Transactions with merchant accounts linked directly or indirectly to lidlorg[.]com are highly likely to be fraudulent and facilitate card compromise. As of May 8, 2025, lidlorg[.]com has directly used three merchant accounts to process visitor transactions. We linked nine additional merchant accounts to lidlorg[.]com via overlapping use by other scam e-commerce domains within the network.

Merchant Name
Acquirer BIN
MCC
Date First Seen
Date Last Seen
Linked Scam Domains
AKRU KERAMIK GMBH
264431
5719
2025-04-30
2025-04-30
1
ANT*ONLINE E-COMMERCE STO
270514
5631
2025-04-09
2025-04-09
1
BALSAMIC
270522
5661
2025-04-01
2025-04-09
2
CLOTHWEARABLY
271109, 024440
5691
2025-02-25
2025-03-07
11
LMS AESTHETICS
230230
5719
2025-04-23
2025-04-30
3
MYCOZYBABIES
271109, 024440
5641
2025-04-16
2025-04-26
5
ONCLOTHESSHOES
875516
5311
2025-04-23
2025-04-30
5
PETHOUSEN LLC
230509
5995
2025-04-19
2025-04-30
3
REFINEDHAT
271109, 024440
5691
2025-04-14
2025-04-23
4
YSP*CLOTHINGGSHOP
020608
5621
2025-03-04
2025-04-19
9
YSP*NIHILSTOOL
020608
5311
2025-03-26
2025-04-19
9
YSP*QHWLKJSHOP
020608
5621
2025-02-25
2025-04-26
25

Table 1: All transactions with merchant accounts linked to lidlorg[.]com are likely to be fraudulent (Source: Recorded Future)

Note that inaccurate associated merchant URL data suggests that threat actors likely use merchant accounts within this group for transaction laundering. For example, merchant data indicates that PETHOUSEN LLC is associated with pethousen[.]com rather than the three scam domains we linked it to (biliability[.]com, dknyonlineuk[.]com, outletmalleu[.]shop). Inaccurately associated merchant URLs often indicate that a merchant is engaging in transaction laundering.

Transaction laundering allows threat actors to conceal high-risk or illegal activity by processing payments for an entity, goods, or services unknown to the merchant’s acquiring bank or payment provider. While the transactions are disguised as low-risk or legitimate purchases, they are often transactions for illegal activities. In this sense, all purchase scam transactions that defraud victims are inherently a form of transaction laundering.

It is unclear whether the scam network identified in this report is controlled by a single threat actor or various threat actors acting in concert. Merchant account abuse for purchase scams frequently overlaps between networks of linked domains, as shown in Figure 2. While merchant accounts dispersed throughout scam networks network can have similarities that suggest a common origin or operator, the networks of scam domains linked to the merchant accounts are often distinct (for example, in their abuse of different ad platforms for propagation to victims)

Because of this, we consider the two following scenarios equally likely regarding attribution of the scam network to an operator:

An ecosystem of illicit dark web services likely supports fraud-focused threat actors. These threat actors leverage third-party services for a variety of scam use cases, including the following:

Card issuers and merchant acquirers with access to merchant data can likely leverage merchant analysis for threat actor attribution of this scam network. Commonalities in merchant registration would likely indicate that the accounts are operated by a single threat actor, whereas discrepancies would indicate that the accounts are operated by various threat actors. Identical company data is an example of a commonality that we would expect to see in linked merchant accounts operated by a single threat actor.

Note that since scam domains are easier to acquire and less resilient to detection and mitigation than merchant accounts (and therefore more expendable as infrastructure), we consider domain analysis less likely to enable threat actor attribution of this scam network.

Mitigations for Fraud Prevention

Purchase scams present financial fraud risks to card issuers and compliance risks to merchant acquirers, especially in cases where linked scam merchant accounts are also abused to support transaction laundering activity. To reduce these risks, apply the mitigation strategies described below.

Card Issuers

Merchant Acquirers

Outlook for Purchase Scam Networks

Appendix: Identified Scam Domains, Linked Merchant Accounts, and Detection Dates

The table below displays the identified scam domains, the merchant accounts linked to them, and the dates they were confirmed to be linked.

Scam Domain
Merchant Name
Date Seen
adairs-store[.]shop
YSP*QHWLKJSHOP
2025-03-20
biglotsfactory[.]com
YSP*QHWLKJSHOP
2025-03-26
biliability[.]com
PETHOUSEN LLC
2025-04-19
biliability[.]com
MYCOZYBABIES
2025-04-19
boxrawstore[.]shop
REFINEDHAT
2025-04-19
bugaboo-store[.]shop
YSP*QHWLKJSHOP
2025-03-21
camper-bestsale[.]shop
YSP*NIHILSTOOL
2025-04-09
candywarehouses[.]com
YSP*NIHILSTOOL
2025-03-26
clarkseuoff[.]sa[.]com
MYCOZYBABIES
2025-04-16
deuter-eu-store[.]shop
YSP*QHWLKJSHOP
2025-03-21
discountmarkets[.]shop
CLOTHWEARABLY
2025-03-07
dknyonlineuk[.]com
PETHOUSEN LLC
2025-04-30
eccoshpedk[.]com
YSP*CLOTHINGGSHOP
2025-03-20
ecoalffashion[.]shop
YSP*CLOTHINGGSHOP
2025-03-20
ecofoodcontainers[.]shop
ONCLOTHESSHOES
2025-04-30
eu[.]goldengoosefan[.]com
ONCLOTHESSHOES
2025-04-23
eu[.]stanleys1913[.]com
YSP*CLOTHINGGSHOP
2025-04-19
eu[.]stanleys1913[.]com
MYCOZYBABIES
2025-04-19
eur[.]piinkovip[.]com
CLOTHWEARABLY
2025-02-26
factorydealseu[.]com
YSP*QHWLKJSHOP
2025-04-09
factorydealseu[.]com
CLOTHWEARABLY
2025-02-25
featherrunon[.]shop
YSP*QHWLKJSHOP
2025-04-19
filippa-k[.]shop
CLOTHWEARABLY
2025-02-25
filson-stores[.]com
YSP*NIHILSTOOL
2025-04-09
finalclearancehub[.]com
ONCLOTHESSHOES
2025-04-26
finalclearancehub[.]com
MYCOZYBABIES
2025-04-26
firelighthome[.]shop
YSP*QHWLKJSHOP
2025-04-09
flagshipsale[.]com
YSP*QHWLKJSHOP
2025-04-02
florisvanbommel-outlet[.]shop
YSP*CLOTHINGGSHOP
2025-04-19
fredperrypoloss[.]shop
MYCOZYBABIES
2025-04-16
frosttrekdown[.]shop
YSP*QHWLKJSHOP
2025-04-09
goldberghdeals[.]shop
REFINEDHAT
2025-04-14
groceryoutlet[.]ru
CLOTHWEARABLY
2025-02-26
gudrunstyle[.]com
YSP*QHWLKJSHOP
2025-04-09
guessdiscount[.]shop
YSP*CLOTHINGGSHOP
2025-04-09
hotdealsok[.]shop
YSP*QHWLKJSHOP
2025-04-09
icedcoffee[.]store
YSP*CLOTHINGGSHOP
2025-04-09
jblspeaker[.]shop
CLOTHWEARABLY
2025-02-26
joma-eu[.]shop
REFINEDHAT
2025-04-19
kenwoodappliances[.]shop
CLOTHWEARABLY
2025-03-04
kenwoodkitchen[.]shop
CLOTHWEARABLY
2025-02-28
ketersale[.]shop
YSP*QHWLKJSHOP
2025-03-20
lacoste-eu[.]com
CLOTHWEARABLY
2025-02-26
lidlmarket[.]store
YSP*QHWLKJSHOP
2025-04-03
lidlmarket[.]store
YSP*NIHILSTOOL
2025-04-03
lidlods[.]com
YSP*NIHILSTOOL
2025-04-16
lidlorg[.]com
YSP*NIHILSTOOL
2025-04-19
lidlorg[.]com
REFINEDHAT
2025-04-19
lidlorg[.]com
LMS AESTHETICS
2025-04-23
lidloutlets[.]eu
YSP*QHWLKJSHOP
2025-02-25
lidlsport[.]top
YSP*CLOTHINGGSHOP
2025-03-04
lidlstores[.]com
YSP*QHWLKJSHOP
2025-03-18
lidlv[.]com
YSP*QHWLKJSHOP
2025-04-02
networktsales[.]com
MYCOZYBABIES
2025-04-26
oakley-qc[.]shop
REFINEDHAT
2025-04-19
officialfactorysale[.]com
YSP*QHWLKJSHOP
2025-04-01
onlinedesales[.]com
YSP*QHWLKJSHOP
2025-04-11
ortovox-vip[.]shop
YSP*QHWLKJSHOP
2025-03-20
outletmalleu[.]shop
PETHOUSEN LLC
2025-04-30
outletmalleu[.]shop
LMS AESTHETICS
2025-04-30
outletmalleu[.]shop
AKRU KERAMIK GMBH
2025-04-30
parkside-tool[.]com
BALSAMIC
2025-04-09
parksideamonlini[.]shop
CLOTHWEARABLY
2025-02-27
perfectfoodstorage[.]shop
CLOTHWEARABLY
2025-02-28
physicalant[.]com
REFINEDHAT
2025-04-23
physicalant[.]com
LMS AESTHETICS
2025-04-23
pnjeduewmj[.]com
CLOTHWEARABLY
2025-02-26
pocketchicvip[.]shop
YSP*QHWLKJSHOP
2025-04-11
sale-rapha[.]com
YSP*NIHILSTOOL
2025-03-26
sale-vivobarefoot[.]com
YSP*NIHILSTOOL
2025-04-09
smecmc[.]com
YSP*CLOTHINGGSHOP
2025-03-30
snowpeakk[.]shop
YSP*QHWLKJSHOP
2025-04-26
sportsale-shop[.]click
YSP*NIHILSTOOL
2025-04-16
stanleys1913[.]com
YSP*CLOTHINGGSHOP
2025-03-26
tojoy[.]online
ONCLOTHESSHOES
2025-04-25
tupolevshop-eu[.]top
YSP*QHWLKJSHOP
2025-04-11
ufpro-onlines[.]shop
YSP*QHWLKJSHOP
2025-03-11
uskuiusvipstore[.]shop
YSP*QHWLKJSHOP
2025-04-01
uskuiusvipstore[.]shop
BALSAMIC
2025-04-01
uskuiusvipstore[.]shop
ANT*ONLINE E-COMMERCE STO
2025-04-09
vejadeals[.]shop
ONCLOTHESSHOES
2025-04-23
wayfairbestoffers[.]com
YSP*QHWLKJSHOP
2025-03-26
yogasports[.]shop
REFINEDHAT
2025-04-19