Struggling with IT problems and tired of overpriced local solutions? Choose my services for high-quality support at a price you control. Contact me today for a free, fair quote and exceptional service.

Scam Report: Moroccan Facebook Users Targeted in Dyson V15 Phishing Scheme

 |  ESTIMATED READING TIME:  2 MINUTES

Due to a lack of action from domain registrars and antivirus vendors, I’m documenting this publicly to raise awareness and protect Moroccan internet users. This post outlines a deceptive phishing campaign that has targeted Facebook users in Morocco under the guise of a Dyson V15 giveaway.

Overview of the Scam

This campaign begins with a malicious TinyURL link shared in the comments of a Facebook post by a fake profile named Yasmine El Fassi. When clicked from outside Morocco, the link redirects users to a harmless article. However, Moroccan users are redirected to a fraudulent product page offering a free Dyson V15 Detect vacuum.

Victims are asked to complete a short survey. Each step leads to a different redirect, and the URLs grow increasingly complex until the user lands on a fake payment page. Once personal and credit card information is entered, the page returns an error and claims the user will receive a phone call.

Targeting Methodology

  • Uses geo-targeting to serve malicious content only to Moroccan users.
  • Initial link: https://tinyurl.com/entrepot-vente-ma (Reporting [email protected] doesn’t help)
  • Facebook post URL: View post (Facebook Support relies heavily on AI for moderation, so it’s pretty much useless in taking down actual harmful content.)
  • Final destination: fraudulent payment pages designed to steal credit card data, and potentially double-charge unsuspecting customers.

Confirmed Malicious Domains

  • plenorhq.site
  • all4discount.world
  • gostyle4life.com
  • findall4cheap.xyz
  • getsupersell.world
  • blakfridaysales.click

Each of these domains uses services such as Cloudflare for DNS and is hosted under registrars known for low-cost or unregulated domain registrations.

Registrar Abuse Contacts

blakfridaysales.click[email protected]

DomainRegistrar Abuse Contact
gostyle4life.com[email protected]
all4discount.world[email protected]
plenorhq.site[email protected]
findall4cheap.xyz[email protected]
easytosellamerica.lat[email protected]
getsupersell.world[email protected]
blakfridaysales.click[email protected]

Case Study: A Victim’s Experience

A friend’s mother fell victim to this scam after seeing the Facebook post. She entered her credit card information and was charged twice. As of the time of this writing, she is contacting her bank to try to recover the funds.

Security Observations

  • Random fake data causes server errors, but realistic fake data occasionally allows the scam to proceed.
  • Payment pages accept sensitive information without validation.
  • Each visit and submission leads to different domains and increasingly obfuscated URLs.

Recommendations

  1. Do not trust giveaway claims on social media, especially those using link shorteners.
  2. Educate family members and especially older users on common phishing tactics.
  3. Use browser tools or VPNs to inspect geo-based redirects.
  4. Report malicious URLs and behavior to hosting providers, DNS services (like Cloudflare), and abuse contacts.
  5. If you’ve submitted personal or payment data, contact your bank immediately and monitor for suspicious activity.

Conclusion

Despite reporting the above domains to registrars and security vendors, many remain live or are quickly replaced by alternate versions. I’m publishing this in the hope that transparency and public documentation will help curb the spread of such campaigns.

If you are a registrar or a DNS provider reading this, consider this a call to action to review your abuse handling processes. Inaction only emboldens threat actors who are now comfortably targeting entire demographics.

For screenshots and more details, please check this PDF: Scam_Report_involving_4_domains_registered_with_3_different_registrars; I kept trying to send this PDF to the 3 registrars, so that they can do something about the malicious domains, but my emails kept getting rejected by their systems no matter how many times I tried to send them the evidence they asked for.