
Avoid domain squatting and potential disputes by securing your domain name early.
Online fraudsters are becoming increasingly sophisticated in their methods, continuously adapting to the evolving habits of consumers. One of the latest trends in online fraud is the deliberate targeting of mobile users while intentionally neglecting the desktop counterparts of their fraudulent websites.
Cybercriminals are leveraging the growing reliance on smartphones for internet browsing, banking, and e-commerce. While the mobile version of their site appears fully functional and often indistinguishable from legitimate platforms, the desktop version may display a ‘maintenance’ page or simply nothing at all. This tactic allows fraudsters to evade detection by security teams that primarily rely on desktop systems for investigation, leaving mobile users highly vulnerable.
The shift toward mobile-first fraud is not surprising, considering the surge in mobile usage over the past decade. With more than half of global internet traffic now originating from mobile devices, cybercriminals recognise that users are more likely to browse, shop, and make financial transactions on their phones. Mobile users often take fewer precautions compared to desktop users, as mobile browsers mask phishing attempts more effectively due to limited screen space. This allows fraudsters to exploit users who are less suspicious of small interface changes that might otherwise raise red flags on a desktop.
Additionally, mobile devices are often equipped with fewer security features than desktops. Many mobile users fail to install antivirus software, neglect updates, or use unsecured public WiFi networks—all of which make mobile devices an easy target for fraud. By focusing on mobile-only fraud, criminals can increase their chances of success while maintaining a low profile on more secure desktop systems.
This technique is designed to confuse investigators and delay the detection of fraudulent activity. Security teams who check suspicious URLs on desktop systems might assume that the site is down or inactive, thereby allowing the scam to continue undetected.
This tactic also complicates automated tools used by businesses to track and combat phishing or fraudulent websites. Many fraud detection systems are optimised for desktop analysis, meaning they might not effectively capture the mobile version of a website that is actively targeting users.
When fraud is suspected it is crucial to perform a comprehensive investigation across both desktop and mobile platforms. Investigating only one platform gives an incomplete picture of the threat landscape and tactics used by fraudsters.
Understanding the full scope of an attack is key to an effective response. In cases where legal action, financial recovery, or brand protection is necessary, knowing how and where the fraud occurs allows for more targeted mitigation efforts. Moreover, a deep investigation can help identify patterns in fraudulent behaviour.
In this example, Clarins lawyers recovered the domain (clarins-discount.shop) via the UDRP. A domain investigation revealed at least three other domains associated with clarins-discount.shop have not been recovered, although they use the same registrar, nameserver host, registrant state and were all registered within a close time of one another.
This investigation would have enabled the Clarins to recover more than one domain in a single UDRP. Based on the mobile version the UDRP may not have been necessary as a take down and/or domain suspension would have resolved the issue quickly and more cost effectively.
At the time of writing this article the three additional domains, not recovered, had a mobile version of the Clarins website.
As online fraud continues to evolve, so too must the methods used to combat it. The rise of mobile-focused fraud underscores the importance of a thorough, multi-platform investigation when suspicious activity is detected. Security teams, businesses, and users must adapt their practices to consider the unique vulnerabilities and threats posed by mobile devices.
If you want to audit your enforcement process or need help, get in touch.