Engineering and Technology | Open Access | DOI: https://doi.org/10.37547/tajet/Volume08Issue01-10

Investigation of a Courier Brand Impersonation Scam: A Case Study of the CDEK Delivery Fraud

Amal Mammadov , Independent Cybersecurity Researcher and Security Operations Practitioner Vilnius, Lithuania

Abstract

Courier-related phishing and impersonation scams have become a persistent threat, exploiting user trust in logistics providers and the rapid growth of e-commerce. This article presents a detailed case study of a delivery scam that impersonated the international courier company CDEK. The investigation reconstructs the full attack chain, beginning with initial social engineering via telephone contact and continuing through the use of a fraudulent web domain designed to harvest sensitive information. Technical artifacts including domain registration details, TLS certificate misuse, web content structure, and interaction flow are analyzed to illustrate how attackers combine psychological manipulation with low-cost technical infrastructure. The study highlights common weaknesses in user awareness, brand protection, and domain abuse monitoring that enable such scams to succeed. Based on the findings, practical detection indicators and mitigation recommendations are proposed for security teams, domain registrars, and end users. The case demonstrates how real-world incident investigations can contribute actionable insights into modern phishing operations and complement existing academic research on social engineering and online fraud (Cloudflare, 2025; Let’s Encrypt, 2021).

Keywords

phishing, social engineering, brand impersonation, online fraud, domain abuse, cybersecurity investigation

References

Anti-Phishing Working Group. (2025, August 28). Phishing Activity Trends Report, 2nd Quarter 2025. https://docs.apwg.org/reports/apwg_trends_report_q2_2025.pdf

CDEK. (n.d.). Отслеживание отправлений [Shipment tracking]. https://www.cdek.ru/ru/tracking/

Cialdini, R. B. (2006). Influence: The psychology of persuasion (Rev. ed.). Harper Business.

Cloudflare. (2025, January 15). Cloudflare SSL/TLS. https://developers.cloudflare.com/ssl/

Daigle, L. (2004). WHOIS Protocol Specification (RFC 3912). Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/rfc3912

EMVCo. (n.d.). EMV® 3-D Secure. https://www.emvco.com/emv-technologies/3-d-secure/

Hadnagy, C. (2018). Social engineering: The science of human hacking (2nd ed.). Wiley.

Internet Corporation for Assigned Names and Numbers. (n.d.). ICANN Lookup. https://lookup.icann.org/

Jakobsson, M., & Myers, S. (2006). Phishing and countermeasures: Understanding the increasing problem of electronic identity theft. Wiley. https://doi.org/10.1002/0470086106

Let's Encrypt. (2021, February 12). About Let's Encrypt. https://letsencrypt.org/about/

Mitnick, K. D., & Simon, W. L. (2002). The art of deception: Controlling the human element of security. Wiley.

Verizon. (2025). 2025 Data Breach Investigations Report. https://www.verizon.com/business/resources/Tea/reports/2025-dbir-data-breach-investigations-report.pdf

Download and View Statistics

Views: 0   |   Downloads: 0

Copyright License

Download Citations

How to Cite

Mammadov, A. (2026). Investigation of a Courier Brand Impersonation Scam: A Case Study of the CDEK Delivery Fraud. The American Journal of Engineering and Technology, 8(01), 71–77. https://doi.org/10.37547/tajet/Volume08Issue01-10