Skip to content

Two-Site Redirect Cloaking

Two-Site Cloaking (or Redirect Masking) physically separates the high-risk content from the payment processing domain to prevent the PSP from seeing the "dirty" site.


📝 Summary

  • Technique: Frontend Redirects & Iframe Injection.
  • Goal: Hide the traffic source (High-Risk Site A) from the PSP (hosted on Low-Risk Site B).
  • Risk Score: High.

🏗 Technical Architecture

mermaid
flowchart TD
    subgraph HighRisk[High-Risk Site A]
        SiteA[cheap-iptv-streams.com]
    end
    
    subgraph LowRisk[Low-Risk Site B]
        SiteB[tech-support-hub.com]
        Page[Payment Page]
    end
    
    User([User]) -->|Browses| SiteA
    SiteA -->|Clicks Buy<br/>302 Redirect| SiteB
    SiteB -->|Render| Page
    Page -->|Submit| PSP[PSP Gateway]
    
    style HighRisk fill:#b91c1c,stroke:#7f1d1d,color:#fff,fill-opacity:0.1
    style LowRisk fill:#15803d,stroke:#14532d,color:#fff,fill-opacity:0.1

The Flow

  1. Browsing: Customer shops on Site A.
  2. Checkout: Clicking "Pay" triggers a redirect to Site B.
  3. Payment: The PSP sees the transaction originating from tech-support-hub.com.
  4. Return: User is redirected back to Site A.

🕵️‍♂️ Detection & Risk Signals

1. Referrer Leaks

  • Signal: The Referer HTTP header on the payment page shows cheap-iptv-streams.com.
  • Counter-Measure: Merchants use rel="noreferrer" or meta refresh tags to strip this.
  • Detection: Missing Referrer is itself a high-risk signal (Dark Traffic).

2. "0-Second Shopper"

  • Signal: User lands on Site B and pays immediately without browsing.
  • Behavior: A legitimate user would browse Site B before paying.

3. Session Metadata

  • Signal: Site B has no "Add to Cart" events in its own analytics, only "Checkout" events.

🏦 PSP Detection Probability

ProviderProbabilityDetection Analysis
Stripe90%Very Strong. stripe.js telemetry captures referrer data even if stripped from headers. Flags "Direct" traffic anomalies.
Adyen92%Very Strong. "Shopper DNA" tracks redirect chains. Flags high volume of "0-second" sessions on checkout pages.
PayPal85%Strong. Detects "Dark Traffic" (no referrer) combined with high dispute rates typical of redirect schemes.
Checkout.com88%Strong. Uses traffic analysis to identify checkout pages with no upstream navigation history.
Shopify Payments95%Very Strong. If Site B is Shopify, they see full navigation logs. Impossible to hide the redirect within their ecosystem.
Braintree80%Strong. Leverages PayPal's network data. Good at detecting "clean" sites with suspiciously high velocity.
Worldpay75%Medium/Strong. Effective at detecting missing referrers, but legacy integrations (Direct Post) can be harder to trace.
Nuvei80%Strong. Manual risk teams investigate sites with high "Direct Entry" traffic sources.
Authorize.net50%Medium. Older integration methods (SIM/AIM) often lack full visibility into the browser's navigation history.
Apple/Google Pay40%Weak. Rely on the underlying processor. The wallet tokenization process obscures some web session data.

⚠️ Analyst Notes

Look for "Generic" Site B templates (e.g., "Consulting", "Hosting") that have high payment volume but low site engagement metrics (Time on Site < 10s).

Risk Science Documentation - Payment Cloaking & Evasion