Scam-as-a-Service operation made more than $6.5 million in 2020

"Classiscam" operation is made up of around 40 groups operating in the US and across several European countries.

classiscam.png

Image: Group-IB

A newly uncovered Russian-based cybercrime operation has helped classified ads scammers steal more than $6.5 million from buyers across the US, Europe, and former Soviet states.

Security

Everything you need to know about viruses, trojans and malicious software

Cyber attacks and malware are one of the biggest threats on the internet. Learn about the different types of malware - and how to avoid falling victim to attacks.

Read More

In a report published today, cyber-security firm Group-IB has delved into this operation, which the company has described as a Scam-as-a-Service and codenamed Classiscam.

According to the report, the Classiscam scheme began in early 2019 and initially only targeted buyers active on Russian online marketplaces and classified ads portals.

The group expanded to other countries only last year after they began recruiting scammers who could target and have conversations with foreign-language customers. Currently, Classiscam is active in more than a dozen countries and on foreign marketplace and courier services such as Leboncoin, Allegro, OLX, FAN Courier, Sbazar, DHL, and others.

How Classiscam operates

But despite the wide targeting, Classiscam's modus operandi follows a similar pattern —adapted for each site— and revolvs around publishing ads for non-existing products on online marketplaces.

"The ads usually offer cameras, game consoles, laptops, smartphones, and similar items for sale at deliberately low prices," Group-IB said today.

Once users are interested and contact the vendor (scammer), the Classiscam operator would request the buyer to provide details to arrange the product's delivery.

The scammer would then use a Telegram bot to generate a phishing page that mimicked the original marketplace but was hosted on a look-a-like domain. The scammer would send the link to the buyer, who would fill it with their payment details.

telegram-classiscam.png

Image: Group-IB

Once the victim provided the payment details, the scammers would take the data and attempt to use it elsewhere to purchase other products.

More than 40 Classiscam groups active today

Group-IB said that the entire operation was very well organized, with "admins" at the top, followed by "workers," and "callers."

Admins had the easiest job in the scheme, managing the Telegram bots, creating the fake ads, and recruiting "workers," both inside Russia and abroad.

Workers were the people who interacted with victims directly, doing most of the work, generating the individual phishing links, and making sure payments were made.

Callers had the smallest part in the scheme, acting as support specialists and having conversations with victims over the phone in case any suspected anything or had technical problems.

classiscam-structure.png

Image: Group-IB

Based on the number of Telegram bots it discovered, Group-IB believes there are more than 40 different groups currently using Classiscam's services.

Half of the groups run scams on Russian sites, while the other half target users in Bulgaria, the Czech Republic, France, Poland, Romania, the US, and post-Soviet countries.

Group-IB said that more than 5,000 users (working as scammers) were registered in these 40+ Telegram chats at the end of 2020.

The security firm estimates that on average, each of these groups makes around $61,000/month, while the entire Classiscam operation makes around $522,000/month in total.

"So far, the scam's expansion in Europe is hindered by language barriers and difficulties with cashing our stolen money abroad," said Dmitriy Tiunkin, Head of Group-IB Digital Risk Protection Department, Europe. "Once the scammers overcome these barriers, Classiscam will spread in the West."