This Black Friday and into next week, shoppers will inevitably be lured to fake websites for '60% off iPhone X' or a 'last in stock' super deal fraudulent campaign. Mostly via phishing emails and increasingly via expertly crafted login pages, making you think you are logging into a valid site.
If you fail to notice the web login page is fake, typically hackers receive your login details and/or credit card information. Your stolen login details including username and password, together with your and personal information are then used to carry out fraudulent activities. Simple phishing campaigns can use an almost identical copy of a login page for Social Media platforms, e.g. Facebook, or search engines, e.g. Google, plus a variety of popular retailers and banks, etc. Often using typos in domain names, whilst still using a secure certificate, with a malicious PHP script to send home the details captured.
However, at this time of year the sophisticated and 'long game' players in organised cyber-crime will have pre-planned a deeper trap. Often embedding within the file structure of a web site. Black Friday to Cyber Monday is a promotion lasting at least a week. Notwithstanding the malware, credit card skimming inject, at the checkout to steal your credit card details. Taking advantage of web site extensions, embedding malware e.g. a backdoor alongside a key logger many months ago to bridge access and exfiltrate data at will. Successful campaigns and sources are tweaked in terms of the messaging and left in play throughout the forthcoming holiday season. This is big business every year.
Compromised website owners will see a performance impact and under normal circumstances this would raise alarms. In the midst of high volume transactions for Black Friday could be missed. In fact 'unwanted software' installed on websites by nefarious means has been an issue for years, with Google publishing the typical characteristics for website owners to look out for.
If you believe you have been a victim of a phishing campaign, here some tips for you;
- Change your passwords
- Adopt a multi-factor authentication
- Regularly review your bank account for unusual transactions
- Block the cards used for online transactions
- Contact the site where the phishing page originated
There is an old adage, "if it looks too good to be true, it always is", even on Black Friday!
Visit qa.com/cyberfor more information on how they can help solve the Cyber Security skills gap.

Richard Beck
Richard Beck is Director of Cyber at QA. He works with customers to build effective and successful learning solutions tailored for business needs, helping to solve business problems. Richard has designed and architected numerous enterprise and nationwide cyber programmes for QA customers. Responsible for the QA cyber portfolio, products, proposition and cyber partner community. He has over 15 years' experience in senior Information Security roles.
Prior to QA, Richard was Head of Information Security for an organisation who underpin 20% of the UK's Critical National Infrastructure. Richard also held Security and Technical Management posts in Defence, Financial Services and HMG. He holds a number of leading cyber professional certifications, including CISSP, CISM, CISA.
Richard sits on a number of industry boards and security advisory panels, and previously chaired the Communication Industry Personnel Security Information Exchange (CPNI). He is the work stream lead for Cyber Skills & Diversity on the techUK Cyber Management Committee, in addition Richard is also supporting a work stream for the UK Cyber Security Council Formation project. Richard is a regular contributor for cyber insights and industry collaboration including speaker engagements.
He is also a STEM Ambassador working to engage and enthuse young people in the area of cyber security. Providing a unique perspective on the world of cyber security to teachers and encourage young people to consider a career in cyber security.
More articles by Richard
CISOs should prioritise the “human firewall” during Covid-19
Richard Beck, QA's Director of Cyber, outlines why home working presents a new set of cyber security risks for CISOs to prior…
11 January 2021Cyber Pulse: Edition 141 | 11 January 2021
Read the latest edition of Cyber Pulse: Crypto-mining botnet is stealing Docker and AWS credentials; Sensitive London council…
11 January 2021Cyber Pulse: Edition 140 | 4 January 2021
Read the latest edition of Cyber Pulse: Law enforcement takes down global cybercrime VPN services Safe-Inet; European Medicin…
04 January 2021Cyber Pulse: Edition 139 | 18 December 2020
Read the latest edition of Cyber Pulse: The SolarWinds ‘Sunburst’ critical supply chain compromise, TCP/IP stack vulnerabilit…
18 December 2020Cyber Pulse: Edition 138 | 8 December 2020
Read the latest edition of Cyber Pulse: Canada’s Vancouver Metro disrupted by cyber attack, Covid-19 vaccine spear-phishing c…
08 December 2020Cyber Pulse: Edition 137 | 13 November 2020
Read the latest edition of Cyber Pulse: Google Play Store identified as main distribution for Android malware, Desktop Ubuntu…
13 November 2020Cyber Pulse: Edition 136 | 5 November 2020
Read the latest edition of Cyber Pulse: Scammers use Google Drive notifications to send malicious links, Australian Nitro PDF…
05 November 2020Cloud Native Security – Accelerate Left or Get Left Behind
Cloud native applications are designed and built on the cloud. But is your security incorporated into the cloud native lifecy…
28 October 2020Cyber Pulse: Edition 135 | 27 October 2020
Read the latest edition of Cyber Pulse: Microsoft creates alliance for machine learning system threats, steelmaker Stelco sus…
27 October 2020Cyber Pulse: Edition 134 | 21 October 2020
Read the latest edition of Cyber Pulse: Discord security vulnerabilities nets Bug Bounty, British Airways fined £20m for data…
21 October 2020