Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Spoofing Shein for Credential Harvesting

    Spoofing Shein for Credential Harvesting

    June 3, 2024

    By Jeremy Fuchs, Cybersecurity Researcher/Analyst Check Point Software LTD

    Shein is one of the most popular shopping apps in the world. In fact, it’s the second most downloaded shopping app globally, with over 251 million downloads.

    The e-commerce platform is Googled more frequently than major brands like Nike and Adidas. Shein gained popularity for its inexpensive clothing and low prices. However, the company has faced significant criticism for its poor human rights record.

    Additionally, according to a TIME report, Shein has been exploited by scammers in various ways, including the use of fake gift cards on Instagram and counterfeit websites.

    That brings us to the focus of today’s report. Researchers from Harmony Email will discuss how hackers are impersonating Shein in an effort to steal user credentials. Over the last month, they have identified more than 1,000 of these fraudulent emails.

    Email Example of Shein

    The email arrives with a tempting subject line: “Order Verification SHEIN” – claiming to be from Shein customer service. But a closer look reveals a red flag – the sender’s email address doesn’t match Shein’s official one.

    The email excitedly announces you’ve received a mystery box from Shein. However, the included link won’t bring you a surprise gift; it leads to a fake website designed to steal your personal information (a credential harvesting site).

    This phishing attempt is quite transparent. It preys on your excitement by claiming you’ve won a prize and uses the trusted brand name “Shein” to gain your trust. However, a vigilant user can easily spot the scam: check the sender’s email address (it shouldn’t be random letters) and verify that any links lead to legitimate Shein web pages.

    Techniques

    Just like other phishing attempts, scammers are trying to capitalize on popular brands and current trends to trick you. This time, they’re using Shein.

    There are several red flags that this email isn’t legitimate. First, there’s a strong sense of urgency surrounding the “mystery box” offer, which is designed to create excitement and pressure you into clicking.

    Another clue? The email address itself is a jumble of random letters, not a recognizable Shein address. You won’t find any Shein branding or logos in the email either. Finally, the link in the email won’t take you to an official Shein webpage, but to a fraudulent website designed to steal your information.

    Over the last month, we’ve seen over 1,000 of these attacks.

    Make sure you don’t click on links from websites whose address isn’t the official one and check the email’s source.
    Check the address of the website and the sender’s name for spelling and punctuation errors on websites that look real.
    Ensure the email is free of spelling errors. Pay attention to the language in the email: are you expecting to be addressed in this language by your shipping company?

    Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleDkhoon Emirates Faces Data Breach Concerns: Over 1.1 Million Customers Potentially at Risk
    Next Article SASE Threat Report: 8 Key Findings for Enterprise Security

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4831 – TOTOLINK HTTP POST Request Handler Buffer Overflow Vulnerability

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Logitech stoops to a new low (literally) with its latest gaming keyboard, and I have strong thoughts about it

    Development

    As Helldivers 2 players lose Moradesh to the Illuminate black hole, fans discover secret messages that may hint at what’s next

    News & Updates

    Streamlining PDF Tools with User-Friendly Design and Privacy-Focused UX

    Web Development

    Telangana Police in India Recover, Return $10.13 Billion to Cybercrime Victims in 2024

    Development

    Highlights

    CVE-2024-30147 – “Oracle HCL Leap Client-Side Script Injection Vulnerability”

    April 24, 2025

    CVE ID : CVE-2024-30147

    Published : April 24, 2025, 5:15 p.m. | 1 hour, 44 minutes ago

    Description : Multiple vectors in HCL Leap allow client-side
    script injection in the authoring environment and deployed applications.

    Severity: 6.5 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    How a breakdancing injury launched a coding empire with Scott Tolinski [Podcast #152]

    December 7, 2024

    Rilasciato KDE Frameworks 6.10: Nuove Funzionalità e Miglioramenti per Sviluppatori e Utenti

    January 10, 2025

    Creating Scalable Apps with Modular Architecture in React Native⚙️

    April 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.