B says that in Egypt, for example, attackers were observed using numbers formatted to resemble local mobile prefixes.


Once the victim taps the link, the phishing page often checks the user agent and shows its full content only on mobile browsers. Attackers also add endings such as index.html or similar masks to make links look more convincing and help the page load correctly on phones.

The pages usually present fake tracking details, a claimed reason for failed delivery, and a request to update address data or pay a small fee. The pressure is psychological, not technical. The goal is to make the victim act before thinking.

What makes the phishing technically dangerous

Group-IB says its HTML analysis found embedded scripts that open WebSocket connections and support live credential harvesting. In practice, that means attackers can receive entered data immediately, rather than waiting for the victim to submit a form and leave the page.

The researchers also found session tracking through unique UUID tokens, which suggests organized operations that manage victims individually and at scale. That infrastructure, combined with shared IPs, registrars, and hosting overlaps, points to coordinated phishing activity rather than isolated copycat pages.

Group-IB also says the campaign shows signs linked to Darcula, a Chinese-language phishing-as-a-service platform known for large volumes of counterfeit domains and ready-made phishing templates. The company says customers can review more detail about the activity and the Darcula Pushing Kit in its threat intelligence portal.

What Group-IB found in MEA

FindingDetail
Main lureSMS delivery failure message
Common asksAddress update, handling fee, taxes, tariffs
Main targetsPostal and delivery brands, then banks, telecom, mobility, e-commerce
User focusMobile users
Data at riskPersonal details, banking credentials, card numbers, CVV, OTPs
Delivery methodPhishing links sent through SMS

Why the scam keeps working

Shipment alerts blend into daily life. If people shop online often, they already expect delivery texts, tracking updates, and occasional address checks. Criminals exploit that normal behavior and make the fake message feel just plausible enough to trigger a fast tap.

The fake domains also help. Group-IB warns that many of these campaigns use disposable or low-cost extensions such as .xyz, .sbs, .top, and .click, which lets attackers replace blocked domains quickly and keep the scam moving.

How to protect yourself

  • Do not tap shipment links from unexpected SMS messages. Go to the courier’s official website and enter the tracking number manually.
  • Treat any message demanding urgent payment or address correction as suspicious. Legitimate courier companies usually do not charge for simple redelivery or basic address updates.
  • Watch for unfamiliar domain endings such as .xyz, .sbs, .top, and .click.
  • Use mobile security tools and browser protections that can flag phishing pages and suspicious links.
  • Report scam messages to your postal operator or local cyber authority.

What businesses should do

  • Publish clear alerts when scammers impersonate your brand.
  • Strengthen domain protections and email authentication with DMARC, DKIM, and SPF. Group-IB’s post appears to contain a typo and says “SKIM,” but the standard email protocol is DKIM.
  • Work with mobile operators to filter scam SMS patterns and block impersonation attempts.
  • Offer a public verification tool so users can confirm whether a message or tracking request is legitimate.

FAQ

What is a fake shipment tracking scam?

It is a phishing scheme where victims receive a fake delivery failure text and are pushed to a bogus courier page that steals personal and financial data.

Why is MEA seeing more of these attacks?

Group-IB says the activity has grown sharply since early 2024 and surged through 2025, especially as delivery and courier services have become a routine part of daily life.

What data do the attackers want?

They target personal information, banking credentials, card numbers, CVV codes, and one-time passwords.

What is the safest response to a delivery fee text?

Do not use the link in the message. Open the courier’s official website yourself and check the shipment manually.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages