· Cybersecurity  · 4 min read

AI-Driven TikTok Scam Uses Fake Shops to Spread Malware

A massive, AI-driven scam campaign codenamed 'ClickTok' is targeting TikTok Shop users worldwide. Cybersecurity firm CTM360 reports that threat actors have created over 15,000 fake TikTok Shop domains to execute a dual-pronged attack involving phishing and malware distribution. The campaign leverages AI-generated videos and fake influencer promotions on Meta platforms to lure victims to these lookalike sites. Once there, users are tricked into entering credentials on phishing pages or downloading a trojanized TikTok app. This malicious app contains the SparkKitty malware, a cross-platform threat designed to steal sensitive data, including cryptocurrency wallet seed phrases from screenshots on both Android and iOS devices. The scam's primary goals are financial, using fake product listings, fraudulent crypto payments, and credential theft to exploit both buyers and affiliate sellers on the popular e-commerce platform.

A graphic showing the TikTok logo with a shopping cart and a warning sign, representing the TikTok Shop scam.

Cybersecurity researchers have lifted the veil on a widespread malicious campaign targeting TikTok Shop users globally, aiming to steal credentials and distribute trojanized apps.

“Threat actors are exploiting the official in-app e-commerce platform through a dual attack strategy that combines phishing and malware to target users,” CTM360 said. “The core tactic involves a deceptive replica of TikTok Shop that tricks users into thinking theyʼre interacting with a legitimate affiliate or the real platform.”

The Bahrain-based cybersecurity company has codenamed the scam campaign ClickTok. It highlights the threat actor’s multi-pronged distribution strategy, which involves Meta ads and artificial intelligence (AI)-generated TikTok videos that mimic influencers or official brand ambassadors.

Core Tactics: Lookalike Domains and Malware

Central to the effort is the use of lookalike domains that resemble legitimate TikTok URLs. Over 15,000 such impersonated websites have been identified to date, with the vast majority hosted on .top, .shop, and .icu top-level domains.

These domains host phishing landing pages designed to either steal user credentials or distribute bogus apps. These apps deploy a variant of a known cross-platform malware called SparkKitty, which is capable of harvesting data from both Android and iOS devices.

What’s more, a significant number of these phishing pages lure users into depositing cryptocurrency on fraudulent storefronts by advertising fake product listings and heavy discounts. CTM360 identified at least 5,000 URLs set up to download the malware-laced app by advertising it as the official TikTok Shop.

“The scam mimics legitimate TikTok Shop activity through fake ads, profiles, and AI-generated content, tricking users into engaging to distribute malware,” the company noted. “Fake ads are widely circulated on Facebook and TikTok, featuring AI-generated videos that mimic real promotions to attract users with heavily discounted offers.”

Anatomy of the Fraudulent Scheme

The fraudulent scheme operates with three primary motives, although the ultimate goal is always financial gain:

  • Deceiving buyers and affiliate sellers with bogus products and asking them to make payments in cryptocurrency.
  • Convincing affiliate participants to “top up” fake on-site wallets with cryptocurrency, under the promise of commission payouts or withdrawal bonuses that never materialize.
  • Using fake TikTok Shop login pages to steal user credentials or instructing them to download trojanized TikTok apps.

Once installed, the malicious app prompts the victim to enter their credentials. This process repeatedly fails, deliberately guiding them to use an alternative login with their Google account. This approach likely aims to bypass traditional authentication and weaponize the OAuth-based session token for unauthorized access. If the victim tries to access the TikTok Shop section, they are redirected to another fake login page to steal their credentials.

Embedded within the app is SparkKitty, a malware that can fingerprint the device and use optical character recognition (OCR) to scan a user’s photo gallery for cryptocurrency wallet seed phrases, which are then exfiltrated to an attacker-controlled server.

This disclosure comes as CTM360 also detailed another phishing campaign, dubbed CyberHeist Phish. It uses Google Ads and thousands of phishing links to dupe victims searching for corporate online banking sites, redirecting them to pages that mimic the targeted bank’s login portal to steal credentials.

“This phishing operation is particularly sophisticated due to its evasive, selective nature and the threat actors’ real-time interaction with the target to collect two-factor authentication on each stage of login, beneficiary creation and fund transfer,” CTM360 said.

In recent months, phishing campaigns have also targeted Meta Business Suite users in a campaign called Meta Mirage. This operation uses fake policy violation alerts and ad account restriction notices to lead victims to credential and cookie harvesting pages.

These developments coincide with an advisory from the U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN), urging financial institutions to be vigilant against fraud involving convertible virtual currency (CVC) kiosks.

Newsletter Signup

News Feed

Get the Hottest Cybersecurity News Delivered to You!

Related News

Discover more news articles that might interest you

View All →