CloudSEK, a leading cybersecurity firm, has exposed a sophisticated China-based operation selling high-quality counterfeit U.S. and Canadian driver’s licenses and Social Security Number (SSN) cards, posing a severe threat to national security, financial systems, and public trust.
The investigation, conducted by CloudSEK’s STRIKE team, uncovered a sprawling network of 83+ interconnected domains supported by 24/7 WeChat customer support, custom order flows, and multiple payment channels. Analysis of the exfiltrated database revealed over 6,500 counterfeit licenses sold to 4,500+ buyers, generating more than $785,000 in revenue.
A Hidden Threat Undermining Trust
Counterfeit IDs aren’t just tools for underage drinking—they enable serious crimes, including illegal firearm purchases, SIM-swap fraud, large-scale logistics misuse, and even election interference. CloudSEK researchers confirmed that the IDs, priced as low as $65 in bulk, are fully scannable and replicate advanced security features such as holograms, UV markings, laser engraving, and relief printing, making them nearly indistinguishable from genuine documents.
“This isn’t just about fake IDs – this is about a systematic attack on the foundation of trust that underpins our financial, legal, and civic systems,” said Sourajeet Majumder, security researcher at CloudSEK STRIKE. “When a single counterfeit license can enable unauthorized drivers, bypass compliance checks, or facilitate smuggling, we’re looking at a genuine national security threat.”
Sophisticated Operations
The threat actor demonstrated remarkable sophistication:
- Shell E-commerce Sites: Transactions were routed through fake online stores (clothing, shoes, accessories) to mask payments via PayPal, LianLian Pay, and cryptocurrencies.
- Covert Packaging: IDs were shipped globally via FedEx, USPS, DHL, and Canada Post, hidden inside toys, purses, or layered cardboard with camouflage stickers to evade detection. Tutorial videos guided buyers on retrieving concealed IDs.
- Systemic Misuse: One buyer linked to two trucking companies with revoked U.S. operating authorities purchased 42 counterfeit commercial driver’s licenses—highlighting risks to transportation safety and regulatory integrity.
- High-Confidence Attribution: Through HUMINT and OSINT, CloudSEK pinpointed the actor’s exact geolocation in Xiamen, Fujian, China and obtained a facial image via webcam capture.
Key Findings
- Massive Scale: Over 6,500 fake IDs sold, with dense clusters of buyers in New York, Pennsylvania, Florida, Georgia, Ontario, and British Columbia.
- Financial Footprint: $785,000+ generated through PayPal, LianLian Pay, Bitcoin, Ethereum, and Western Union.
- Age Analysis: Nearly 60% of buyers were above 25 years old, signaling intentions beyond casual misuse.
- Marketing Tactics: The network promoted IDs via Meta Ads, TikTok, Telegram, and YouTube, openly advertising uses like passing police checks, renting cars, or accessing benefits.
Real-World Consequences
The implications are far-reaching:
- National Security: Fake IDs can bypass airport, border, and law enforcement checks.
- Financial Fraud: Scannable IDs enable SIM swaps and account takeovers.
- Election Integrity: IDs can be exploited for mail-in ballot and voter registration fraud.
- Logistics & Trafficking Risks: Fake commercial driver’s licenses allow unlicensed operators to bypass U.S. Department of Transportation checks.
A Call to Action
CloudSEK urges urgent global action:
- Law Enforcement: Seize the 83+ domains and pursue legal action using attribution evidence.
- Courier Vigilance: Alert FedEx, USPS, and DHL to the covert packaging tactics.
- Payment Processors: Trace and freeze illicit accounts across PayPal, Western Union, and crypto platforms.
- Continuous Monitoring: Deploy threat intelligence platforms like CloudSEK’s XVigil for proactive detection.
For More Information, Read The Full Report
Heathrow And Other European Airports Pwned In Cyberattack
Posted in Commentary with tags Hacked on September 22, 2025 by itnerdOver the weekend, Heathrow was among a number of airports hit by a cyber-attack. You can get details here:
https://www.msn.com/en-gb/travel/news/heathrow-and-major-european-airports-suffer-fourth-day-of-disruption-after-cyber-attack/ar-AA1N2MN7?ocid=BingNewsSerp
Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4 had this to say:
“More information has come to light: Dublin airports have also been affected, and a ransomware demand was made. This does not mean the motivation could not also have been sabotage, but one motivation is now clear: extortion.
We still need more information to actually understand the true impact and ramification of the attack.
The EU is still investigating the attack while the impact is widespread. We should not expect the EU to determine the source as early. That is because there is still a lack of clarity since authorities and corporations have confusing messaging. The NCSC is investigating a cyber incident. Collins Aerospace is talking about a cyber-related disruption. We require more transparency before we can make meaningful conclusions as to who is behind this and what their benefits are.
Organizations must ready themselves, as the incident highlights the urgency of protecting organizations and enforcing supply chain security. NIS2 and other regulations are more important than ever.”
Javvad Malik, Lead Security Awareness Advocate at KnowBe4 follows with this:
“Air travel depends on shared systems, so a failure in a common check‑in platform quickly cascades into missed connections, accessibility shortfalls, and staff forced into manual workarounds.
It’s why it’s important to build in graceful failure by assuming the primary system will go down and rehearsing manual operations, offline boarding, and accessible contingencies, with cross‑trained staff and basic tools ready.
Reduce single points of failure by diversifying providers where feasible, segmenting tenants, and ring‑fencing critical functions so one vendor outage doesn’t halt everyone. Above all, communicate clearly and often, prioritize vulnerable passengers, and empower frontline teams to make humane decisions.”
This is brutal for travellers. And unless governments and airport authorities do everything possible to beef up their defences from this sort of thing, the possibility exists that this scenario will repeat itself.
Leave a comment »