{"id":97587,"date":"2025-10-10T22:58:19","date_gmt":"2025-10-10T22:58:19","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/"},"modified":"2025-10-10T23:00:27","modified_gmt":"2025-10-10T23:00:27","slug":"phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/","title":{"rendered":"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div id=\"body\">\n<p><span class=\"label\">Unique<\/span> A Chinese language-developed phishing package hosted on 1000&#8217;s of domains and boasting 97 totally different manufacturers to make criminals&#8217; scams look extra plausible is driving a surge in monetary fraud across the globe, in response to safety researchers.<\/p>\n<p>Since 2023, the Chinese language cybercrime economic system \u2013 particularly phishing web sites \u2013 have seen their illicit enterprise increase. These are the monetary fraudsters that concentrate on victims by way of text-message phishes with lures like &#8220;your package deal is lacking,&#8221; or &#8220;you have got a toll violation.&#8221; More and more, they use iMessage and RCS as an alternative SMS to ship textual content messages, which suggests the texts can bypass SMS firewalls.<\/p>\n<p>These phishing kits make it particularly straightforward for monetary fraudsters to ship phishing lures in bulk, tailor-made to victims&#8217; particular languages and regional manufacturers. In analysis shared solely with <em>The Register<\/em>, menace hunters at SpyCloud and urlscan dove deep into considered one of these phishing-as-a-service panels. It is referred to as YYlaiyu &#8211; which roughly interprets to erotic fantasizing about catching fish &#8211; and earlier this 12 months, the DIY phishing service started providing bespoke model templates to its subscribers.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,dmpu,\" data-sm=\",fluid,mpu,dmpu,\" data-md=\",fluid,mpu,dmpu,\">\n        <noscript><br \/>\n            <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\"><br \/>\n                <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt=\"\"\/><br \/>\n            <\/a><br \/>\n        <\/noscript>\n    <\/div>\n<p>&#8220;They&#8217;re hitting globally, so virtually nobody is protected,&#8221; Jake Sloane, safety researcher at URL threat-scanning service urlscan informed <em>The Register<\/em>.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\">\n                <noscript><br \/>\n                    <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"><br \/>\n                        <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                    <\/a><br \/>\n                <\/noscript>\n            <\/div>\n<\/p><\/div>\n<p>The package, lively since not less than September 2024, spoofs all kinds of manufacturers that span the classics \u2013 like delivery corporations together with <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/urlscan.io\/result\/0198e0c0-03bb-71eb-86f3-ab5b0670ed8e\/\">DHL<\/a> and <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/urlscan.io\/result\/01981d6e-8817-76c9-9c9f-d5fa6ae190b6\/\">FedEx<\/a> &#8211; to newer lures similar to cryptocurrency platform <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/urlscan.io\/result\/0198d90b-e59d-72c9-954a-812727451608\/\">Coinbase<\/a>, video streaming app <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/urlscan.io\/result\/0195bdd5-bbb9-7443-a7e1-412a41caac77\/\">TikTok<\/a>, meals supply service <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/urlscan.io\/result\/0196b80c-e03e-72d8-ac14-925bc0d1aa8f\/\">Keeta<\/a> and main airways similar to Japan&#8217;s\u00a0<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/urlscan.io\/result\/0195bde7-c405-7331-a50c-3d55ae8242ac\/\">All Nippon Airways<\/a> and Australia&#8217;s <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/urlscan.io\/result\/01988883-19f1-720e-85a5-bdc017cd320e\/\">Quantas<\/a>.<\/p>\n<blockquote class=\"pullquote\">\n<p>They&#8217;re hitting globally, so virtually nobody is protected<\/p>\n<\/blockquote>\n<p>Starting in Could, the phishing service&#8217;s operators additionally started to roll out model templates that impersonate funding corporations together with Constancy and Schwab, plus Singaporean buying and selling app Tiger Brokers and Hong Kong primarily based buying and selling platform Futu NiuNiu.<\/p>\n<p>Urlscan is at present monitoring 2,158 distinctive domains which have had a YYlaiyu package hosted on them, in response to Sloane.<\/p>\n<p>&#8220;In addition they have numerous attention-grabbing cash-out strategies,&#8221; SpyCloud safety researcher Aurora Johnson, informed <em>The Register<\/em>, including that these happen in actual time. &#8220;They&#8217;ve 97 various things that they are attempting to impersonate directly, so that they have an precise bodily operator sitting there ready for a dwell session, for a sufferer to go to the location, after which they&#8217;ll determine what to do subsequent.&#8221;<\/p>\n<h3 class=\"crosshead\">Cashing out\u2026on the expense of your model<\/h3>\n<p>When somebody clicks on a textual content lure, they land on considered one of YYlaiyu&#8217;s phishing webpages that enables the attackers to seize OPT card verification codes. However as a result of totally different corporations use numerous OTP card verification strategies \u2013 some may ship a code to a consumer&#8217;s e mail, others ship a PIN to a cell gadget \u2013 there is a human operator standing by to work together with the sufferer in real-time.\u00a0<\/p>\n<p>When a possible sufferer visits considered one of these websites, the operator receives an alert that the web page has a customer. The operator then comes to a decision about what to show to the consumer primarily based on their enter, similar to prompting the sufferer for an OPT code.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,dmpu,\" data-sm=\",fluid,mpu,dmpu,\" data-md=\",fluid,mpu,dmpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>&#8220;The phishing operator can be interacting with the sufferer, they&#8217;re going to normally have a cell gadget, and so they&#8217;ll be loading information right into a digital pockets,&#8221; Johnson stated. &#8220;Then they&#8217;re going to use the digital pockets model of the bank card to money out in several methods.&#8221;<\/p>\n<p>These embrace making fraudulent transactions utilizing attacker-controlled level of sale (POS) terminals, buying present playing cards for luxurious corporations for resale, relaying the NFC site visitors to different telephones by way of the <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.threatfabric.com\/blogs\/ghost-tap-new-cash-out-tactic-with-nfc-relay\">Ghost Tap method<\/a>, or promoting telephones that they&#8217;ve <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/krebsonsecurity.com\/2025\/02\/how-phished-data-turns-into-apple-google-wallets\/\">loaded with stolen card data<\/a>.\u00a0<\/p>\n<p>One other methodology referred to as <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.fbi.gov\/how-we-can-help-you\/victim-services\/seeking-victim-information\/seeking-victim-information-in-ramp-and-dump-investment-fraud-investigation\">Ramp and Dump<\/a> entails phishing for login credentials to brokerage companies, utilizing these stolen names and passwords to purchase shares of attacker-owned shares. This drives up the shares&#8217; worth and permits the miscreants to dump their shares at inflated costs.<\/p>\n<p>Additionally distinctive to YYlaiyu is that operators can quickly disable their phishing pages when the panel is unattended to make sure victims do not submit their information when nobody is obtainable to obtain and operationalize it.<\/p>\n<p>Plus, the service&#8217;s area title registration integrates with Alibaba to permit the phisherfolk to simply register and handle new phishing pages with out leaving YYlaiyu&#8217;s panel.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aOmPii_ymyvVCtfYWeQSTwAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>And, this is only one such phishing service in a sea of comparable Chinese language-language websites enabling monetary fraud. Many of those phishing websites&#8217; operators share instruments, service suppliers, and methods with their fellow criminals, and more and more they <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/10\/07\/openai_bans_suspected_china_accounts\/\">use AI<\/a> to <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/04\/25\/darcula_ai\/\">spin up bespoke sites<\/a> in a number of languages extra effectively.<\/p>\n<p>Johnson cautioned towards companies viewing this as only a menace to people \u2013 though she does warn, &#8220;bear in mind that they are focusing on everybody.&#8221;<\/p>\n<p>&#8220;For enterprises,&#8221; she added, &#8220;bear in mind that not solely are they possible focusing on your your company customers, however they&#8217;re additionally going to focus on your prospects, and have the power to do custom-made branding, to impersonate your model, and attempt to steal your buyer data utilizing that model recognition.&#8221; \u00ae<\/p>\n<\/p><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2025\/10\/10\/chinese_phishing_kit_fraud\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unique A Chinese language-developed phishing package hosted on 1000&#8217;s of domains and boasting 97 totally different manufacturers to make criminals&#8217; scams look extra plausible is&#8230;<\/p>\n","protected":false},"author":1,"featured_media":97588,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-97587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-10T22:58:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-10T23:00:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/10\/phishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register\",\"datePublished\":\"2025-10-10T22:58:19+00:00\",\"dateModified\":\"2025-10-10T23:00:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/\"},\"wordCount\":890,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/phishing.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/\",\"name\":\"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/phishing.jpg\",\"datePublished\":\"2025-10-10T22:58:19+00:00\",\"dateModified\":\"2025-10-10T23:00:27+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/phishing.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/phishing.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/10\\\/10\\\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/","og_locale":"en_US","og_type":"article","og_title":"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2025-10-10T22:58:19+00:00","article_modified_time":"2025-10-10T23:00:27+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/10\/phishing.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register","datePublished":"2025-10-10T22:58:19+00:00","dateModified":"2025-10-10T23:00:27+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/"},"wordCount":890,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/10\/phishing.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/","url":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/","name":"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/10\/phishing.jpg","datePublished":"2025-10-10T22:58:19+00:00","dateModified":"2025-10-10T23:00:27+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/10\/phishing.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/10\/phishing.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/10\/10\/phishing-kit-yylaiyu-impersonates-97-brands-for-fraud-the-register\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Phishing kit YYlaiyu impersonates 97 brands for fraud \u2022 The Register"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/97587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=97587"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/97587\/revisions"}],"predecessor-version":[{"id":97589,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/97587\/revisions\/97589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/97588"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=97587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=97587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=97587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}