Cyber Crime

Market volume of illegal online sales of alcohol exceeded 30 million USD in 2018 in Russia

Security firm Group-IB has estimated that the market volume of illegal online sales of alcohol in Russia exceeded 30 million USD in 2018, i.e. almost 5.8 million USD (+23%) more than in 2017.

Group-IB Brand Protection team discovered a total of around 4,000 websites illegally selling alcohol. Criminals create entire networks from the “mirror–websites” of their online alcohol stores; if one site is blocked, they swiftly migrate to a backup resource.

The intoxicating Internet

Active regulatory measures taken in 2018 and aimed at blocking websites that illegally sell alcohol online meant that the “alcohol kingpins” of the black market were forced to find new ways of doing business. In 2018, Group-IB Brand Protection experts discovered more than 4,000 websites selling counterfeit alcohol and bypassing the ban on sales of alcohol online, as well as around 3,000 web resources connected to them. Such schemes make it possible not only to create several “mirrors” of the main alcohol store, thereby attracting more customers, but also to swiftly migrate from one domain to another if a website is blocked. For example, until recently, the resource alcolavca.com included 45 connected websites, however most of the network has now been blocked.

During the research, the largest group discovered by Brand Protection specialists included 86 connected domains. Such schemes are used by both resellers who sell alcohol online bought from major retailers as well as fraudsters who sell counterfeit products.

Group-IB Brand Protection team analysed the illegal online sales of alcohol and concluded that, on average, 190 users per day visit websites that sell and deliver alcohol, i.e. 5,700 people per month. With a conversion rate of 0.7% and an average order amount of 16 USD, 4,000 online shops earn revenues starting at 2.5 million USD per month. As a result, criminals earned around 30 million USD in 2018, i.e.23% more than the year before.

Advertising and promotions of online stores via Telegram channels (just one channel can have up to 3,000 subscribers) and dedicated groups on social networks play a significant role in this illegal business. According to Group-IB, in 2018 interest in online shopping of alcohol increased by more than 35%, as can be seen with the higher numbers of search queries for “buy alcohol”. Around 30% more people searched for alcohol including delivery (search queries for “alcohol delivery”) compared to the previous year.

During pre-holiday periods, the number of search queries for online sales of alcohol increases by 28%. It is no coincidence that the first large-scale “wave” of domains registration for alcohol sales took place in the spring of 2018, on the eve of the May holidays, and continued throughout the summer during the FIFA World Cup. The second “wave” was detected in October, with a peak in registrations in December.

“The blocking of resources by the regulator undoubtedly had a positive effect, and some of the major illegal alcohol networks were shut down; nevertheless, administrators of banned resources began actively fighting against website blocking not only by registering new websites and constantly moving from one domain to another, but also thanks to various loopholes in legislation,” commented Andrey Busargin, Director of Brand Protection at Group-IB.

“A widely used scheme is selling “souvenirs”—keychains, magnets, tobacco accessories—that include alcohol as a “free gift”. Criminals resort to more complex schemes as well, such as closed resources that use QR codes that then redirect users to hidden websites, which are not indexed by search engines and as a result cannot be automatically detected and blocked”.

Source BBC

Do it yourself: from bottle to factory

When purchasing alcohol online, buyers often buy a “pig in a poke”. This makes the job considerably easier for criminals, who produce relatively crude fakes, the appearance of which sometimes has almost no resemblance to the original product: seal, cork (or illustrations thereon), label, excise stamp, brand colors on the packaging… not to mention the quality of the alcohol itself.

Group-IB Brand Protection team discovered dozens of websites and online bulletin boards used to sell the essential components of so-called “alcohol do-it-yourself kits” for illegal production of strong spirits—fakes of famous brands. One such kit, which includes the bottle, the label, the cork, and the branded box, is available for just 0.5 USD. This means that the cost of producing one 0.5-litre bottle of whisky is a little more than 1 USD = 0.5 USD + 0.05 USD (excise stamp) + 0.3 USD (spirit) + 0 USD (water) + 0.17 USD (essence).

Criminals can assemble not only a bottle of a famous spirit, but the entire production line. For example, on Aliexpress, fraudsters can acquire all the components of an automated bottling system for vodka, whisky, wine, or beer. The cost of such a mini-factory starts at 7,280 USD. According to the Russian Federal Service for the Regulation of the Alcohol Market (FSRAR), between 2015 and 2018 more than 450 illegal alcohol manufacturing and storage sites were shut down in Russia.

“While investigating the manufacture of counterfeit alcohol, we reached a disappointing conclusion: namely that buying a bottling or production line is no more complicated than ordering a book or a smartphone”, commented Andrey Busargin, Director of Brand Protection at Group-IB. “Although dozens of such clandestine mini-factories are closed down every year, there are always more daredevils willing to risk their freedom and other people’s health to make a quick buck”.

About the Author: Group-IB

Group-IB is a leading provider of solutions aimed at detection and prevention of cyberattacks, online fraud, and IP protection. GIB Threat Intelligence system was named one of the best in class by Gartner, Forrester, and IDC.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – illegal market, cybercrime)

[adrotate banner=”5″] [adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

2 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

14 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

19 hours ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

23 hours ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

1 day ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

2 days ago

This website uses cookies.