Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign
    Cybersecurity

    Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

    adminBy adminFebruary 5, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    AI use in Fraud
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cloned websites – If in doubt, check the depth.

    Sygnia has uncovered a live network of cloned, scam websites supposedly belonging to law firms. Business impersonation scams are nothing new, but this campaign, in total, comprises more than 150 related domains.

    Sygnia’s research started when a single law firm contacted them after discovering several websites impersonating its brand. Sygnia investigated and rapidly found the activity to be part of a coordinated campaign involving more than 60 websites. As the investigation continued, it connected more than 150 related domains.

    This network is not simply large but is also designed for persistence. “Infrastructure decisions favored evasion and durability over operational simplicity, consistent with a coordinated network rather than isolated or opportunistic impersonation activity,” states Sygnia’s report on its discoveries.

    The domains are registered through multiple registrars across different IP ranges; each site uses a distinct SSL/TLS certificate; and many are deployed behind Cloudflare, obscuring the servers, hiding their relationships and making takedowns more difficult. Each cloned website aims to appear as a single domain rather than being part of a wider campaign.

    The primary purpose of these clones appears to be a repeat victimization of subjects already victim to previous fraud. The lure is a cloned legal site offering to recover money already lost to prior fraud, noticeably stating that no payment will be required before the lost funds are recovered.

    Advertisement. Scroll to continue reading.

    There is some indication of a relationship between this campaign and earlier fraud scams. For example, Sygnia found the phone number +354-42-12434 has been used over an eight year period within multiple scam campaigns, including a vehicle auction scam (vehicles paid for, but not delivered), and also asset recovery scams tied directly to Sygnia’s current investigation.

    A US phone number +1-347-871-7726 was used in a COVID-era panic buying e-commerce scam — and has again been found in asset recovery scams linked to the current investigation. On the surface, this could suggest that a single gang is behind multiple online scams over many years. Sygnia, however, is not able to claim this is the case. 

    “The repeated appearance of the same phone number across multiple fraudulent domains suggests reused infrastructure within the campaign. However, as phone numbers can change ownership, this should be treated as an indicator rather than definitive evidence of a single actor,” says Amir Sadon, Sygnia’s director of IR research.

    One current puzzle with this campaign is how the threat actors intend to monetize their efforts. Assurances within the cloned legal sites that payment would be required only after funds are recovered adds apparent authenticity to the sites, but would likely raise an immediate red flag with the target as soon as there is any attempt to request money.

    Sadon has no definitive answer to this. “We cannot conclude at this point how the criminals monetize from this campaign since we haven’t deeply engaged with them,” he told SecurityWeek. “However, we suspect they may be tricking their victims into sharing information that can then be leveraged for profit.”

    AI-powered scam campaign

    So, what can we learn from this newly discovered but extensive and technically complex infrastructure involving 150 or so separate domains? Firstly, we will likely see more similarly large and sophisticated campaigns going forward. The ability for AI to assist in cloning websites at speed, scale and low cost will increasingly be used by criminals. “The use of AI and automation tools makes it easier for attackers to create these sites quickly and at scale while maintaining a convincing appearance. This increases the likelihood of similar campaigns,” suggests Sadon.

    “AI is likely to lower the barrier to entry for cybercrime while increasing its scale, speed, and personalization. It enables less-skilled actors to carry out more sophisticated attacks, particularly in areas like phishing, social engineering, fraud, malware development, and reconnaissance,” he continued. “At the same time, AI allows criminals to automate operations and adapt more quickly, meaning the overall volume and diversity of cybercrime is expected to grow – even if the number of highly skilled actors remains relatively stable.”

    The visible quality of the end product and the almost certain increase in online fraud will be a growing problem for business and users, neither of whom will have the forensic and investigative skill of firms like Sygnia. Both should consider taking some responsibility on themselves to prevent victimization. Firms could make occasional searches to see if they have been cloned – and Google’s image search could help in finding if their logo is being used elsewhere. 

    “During our investigation, one of the techniques we used looked for the reuse of unique elements from the impersonation sites, including logos. This led us to additional domains using the same visual assets, which helped identify further impersonation sites,” said Sadon.

    Individual users should look further at any site that requests money for any reason. “Across the impersonation sites, the main landing pages were generally well-designed, but the sites themselves were relatively shallow,” he added. “Most consisted of a primary page and, at most, one or two additional pages such as a contact page. In some cases, navigation menus were present but non-functional or repetitive. Compared to legitimate law firm websites, these sites appeared thin rather than content rich.”

    None of this is conclusive to an untrained investigator, but a bit of self-help could go a long way. If in doubt, examine the depth.

    Related: Cyber Fraud Overtakes Ransomware as Top CEO Concern: WEF

    Related: Hacker Conversations: Alex Hall, One-Time Fraudster

    Related: Former Accenture Employee Charged Over Cybersecurity Fraud

    Related: Account Takeover Fraud Caused $262 Million in Losses in 2025: FBI

    AIPowered Campaign Cloned Expose Firm Law Network researchers scam websites
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleYouTube Music (Android Automotive) 9.05.20-CAR_RELEASE APK Download by Google LLC
    Next Article Google Shows How To Check Passage Indexing
    admin
    • Website

    Related Posts

    VMware Aria Operations Vulnerability Exploited in the Wild

    March 4, 2026

    CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

    March 4, 2026

    AMD accelerates telecom network AI

    March 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    VMware Aria Operations Vulnerability Exploited in the Wild

    March 4, 2026

    From SEO volume to brand fame

    March 4, 2026

    CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

    March 4, 2026

    Why Atlas & Comet Are Unlikely To Win The AI Browser War

    March 4, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (592)
    • Privacy & Online Earning (88)
    • SEO & Digital Marketing (372)
    • Tech Tools & Mobile / Apps (727)
    • WiFi / Internet & Networking (106)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    VMware Aria Operations Vulnerability Exploited in the Wild

    March 4, 2026

    From SEO volume to brand fame

    March 4, 2026

    CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

    March 4, 2026
    Most Popular
    • VMware Aria Operations Vulnerability Exploited in the Wild
    • From SEO volume to brand fame
    • CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
    • Why Atlas & Comet Are Unlikely To Win The AI Browser War
    • Avatar: Realms Collide 1.4.815 APK Download by Tilting Point
    • AMD accelerates telecom network AI
    • Why workforce identity is still a vulnerability, and what to do about it
    • 8 Best Robo-Advisors of March 2026
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.