Threats and techniques to steal while shopping online

E-commerce is increasingly used by Internet users. For a few years it has experienced an increase without braking and more and more services and platforms are available. At the click of a button we can acquire a wide variety of products without leaving home. Now, all this can also cause problems for our security. There are many threats that are present and that could steal our information and even scam us when making purchases. In this article we will talk about it. We will explain what threats and techniques they use to rob us while we shop online .

The rise of Internet shopping

Undoubtedly the growth of electronic commerce has been enormous in recent years. Nowadays we can carry out all kinds of transactions simply from the mobile or computer. There are a lot of pages and platforms available. However, keep in mind that not all of them are safe.

Trust is vital to the rise of online shopping . Nowadays it is much safer to buy online than a few years ago. The platforms are more prepared, offer more guarantees and the payment methods are safe. At least on paper there should be no problems when making purchases online.

The problem is that many of these platforms can be illegitimate or have suffered an attack. They can put the security of users at risk and steal data and interfere with purchases.

Métodos por los que nos roban al comprar por Internet

What method they use to steal when shopping online

Hackers use different techniques to carry out their attacks. They always look for ways to steal information from users, credentials or passwords. It can also be done with payment methods and supplant identity. We will explain which are the most common.


This is how the method used by cybercriminals to inject malicious code into a web page is known. They are based on vulnerabilities that may exist on a site to modify it and steal visitors. One way to get the information and credentials of the victim.

It is a recurring method to register user payment methods. It could even be the case that the victim has made a purchase, has correctly received the product, but does not know that their data has gone to a server controlled by hackers. These cybercriminals could use these passwords to steal in the future.

Keyloggers and hidden malware

We can also be victims of a keylogger or malware in our system. This is something that can affect both desktop users and mobile devices. They are malicious programs that have no other purpose than to register our passwords and usernames.

Once they have collected this data they could impersonate us on the web. They could buy on our behalf, use our bank cards, etc. That is why it is very important to always have security tools and have two-step authentication

Fake Links and Phishing

They could also rob us when shopping online through fake links and Phishing attacks . We can reach a website that has fraudulent links that take us to unencrypted payment gateways or that have been maliciously modified.

Phishing attacks are very present on the network today. They can reach us in the form of a discount card, for example. They send us a supposed link to receive a discount but at the beginning of the session we are delivering our data to the attackers.

Fake sellers

It is certainly a classic on the Internet and it is still present today. Especially occurs on pages that are not protected and where anyone can sell. These are simply fake sellers who offer a product that they really do not have and never sell. They can offer payment methods that are not protected and therefore we have no guarantees.

Our advice is always to buy from sites that have protection and make sure that seller is a guarantee . We cannot buy on certain insecure platforms.

Insecure networks

Another risk to avoid is to buy through insecure networks. We refer to surfing public Wi-Fi networks and making purchases or economic transactions. Our data may be compromised.

If necessary, we can always make use of VPN services that encrypt our connections and give us greater security.