Temu – Not just for bargain hunters, but also for criminals

The meteoric rise of the Chinese online cheap retailer Temu has also caused a stir in Europe. The platform, which has quickly established itself as a leading portal for a variety of products, not only attracts consumers, but unfortunately also cybercriminals.

The appeal of Temu, coupled with the growing hype surrounding the app, has revealed a dark side: a growing vulnerability to internet fraud, particularly phishing attacks.

Cybercriminals have found a goldmine within the digital walls of Temu. They imitate the merchant's communications and send fake emails to their customers in order to obtain sensitive data such as account details or login information.

This practice is not new, but Temu's popularity provides fraudsters with a large target and a gullible audience. The target group of people over 50 seems to be particularly vulnerable, as they not only actively shop on the platform but also show a high willingness to respond to emails.

Phishing: gateway for further cyber attacks

However, the phishing problem is not limited to the theft of login credentials. Rather, it often serves as a springboard for more serious cyberattacks, including the distribution of ransomware. This malware encrypts the victim's data and demands a ransom in order to release it.

In its Federal Cybercrime 2022 situation report, the Federal Criminal Police Office (BKA) identified phishing as the most common entry vector for ransomware attacks. The average ransom demanded in 2022 was a staggering $276,619 per case.

Criticism of Temu: Beyond the cyber danger

In addition to cybersecurity concerns, Temu is also under fire for its business practices. Not only the susceptibility to fraud is criticized, but also the sale of defective products and the aggressive demand for access rights to users' smartphones, which are not necessary for the actual purchasing process.

These practices have sparked anger from consumer advocates and the general public. The Temu debate therefore goes far beyond the issue of cybersecurity and touches on issues of consumer ethics, data protection and fair competition in the market.

Questions and answers about Temu and cybercrime

Question 1: How do Temu-related phishing attacks work?
Answer 1: Cybercriminals imitate Temu's email communications in order to obtain sensitive user data such as account details or login information.

Question 2: Who is particularly affected by these fraud attempts?
Answer 2: The target group of people over 50 is particularly affected, as they often shop on the platform and tend to respond to emails.

Question 3: What is the cybercriminals' main goal in these attacks?
Answer 3: In addition to directly stealing data, fraudsters also use these attacks to spread ransomware and extort ransoms.

Question 4: What other criticisms are there of Temu?
Answer 4: In addition to the susceptibility to fraud, consumer advocates criticize defective products, misleading advertising methods and unnecessary access rights that Temu demands on users' devices.

Question 5: How can users protect themselves from phishing and other cyber attacks?
Answer 5: Users should be critical of emails from online retailers, never reveal sensitive data and pay attention to using strong passwords and regular software updates.

Conclusion

The issue surrounding Temu underlines the need for increased caution when shopping online. Consumers need to be aware of the risks and take active steps to protect their personal information. Both platforms and users must take responsibility to make online shopping safer.

The Temu case is a cautionary tale of how quickly cybercriminals can adapt to the dynamics of online commerce. It is a wake-up call for consumers to find out about possible dangers and protect themselves accordingly.

Source: hna.de

For further information and protective measures, we recommend registering for the Mimikama newsletter and participating in our online lectures and workshops .

You might also be interested in:

Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )