Valentine's Day Phishing Domains Surge 44% Ahead of Feb 14
Check Point documents 44% spike in fake Valentine's domains with 97.5% unclassified. Four in ten Valentine-themed emails are scams targeting U.S. consumers.
Attackers registered Valentine's Day-themed domains at a 44% higher rate in January compared to December, according to Check Point research released ahead of February 14. Nearly all of these domains—97.5%—remain unclassified, meaning they could activate for malicious use at any moment. This follows the same pattern we observed with Microsoft domain spoofing campaigns earlier this year.
The findings arrive as Bitdefender reports nearly four in ten Valentine-themed emails are scams, and SpyCloud identifies more than 630,000 threat actors with footprints spanning dating platforms, cryptocurrency exchanges, and cybercrime forums.
Domain Registration Surge
Check Point documented a steady increase in Valentine-related domain activity:
- March-December 2025: Average 474 new domains registered monthly
- January 2026: 696 domains registered (44% increase)
- First 5 days of February: 152 additional domains (36% higher daily average)
The 97.5% unclassified rate is concerning. Newly registered domains that haven't been categorized by threat intelligence services can bypass domain reputation filters. Attackers often register domains weeks in advance, let them age past initial scrutiny, then activate them for campaigns timed to holidays.
Active Attack Types
Researchers identified several active phishing patterns:
Fraudulent e-commerce sites feature professional layouts, product categories, and checkout pages designed to harvest payment credentials. One active site—funkovalentineclub—sells counterfeit merchandise while impersonating legitimate Funko branding.
Dating platform clones use simple typosquatting to capture credentials. Researchers found 710 look-alike dating domains impersonating platforms like Tinder in January—a 9% increase from December. Examples include domains like "tinnderCFD" that differ by a single character from legitimate services.
Gift card and courier impersonation targets consumers expecting Valentine's deliveries. Attackers impersonate FedEx, UPS, DHL, and digital gift card platforms with fake shipping notifications and purchase confirmations. These campaigns often abuse Google Cloud infrastructure for phishing to evade email filters.
Geographic Targeting
The United States accounts for 55% of Valentine's-themed spam, making American consumers the primary target. Attackers leverage common search terms like "Valentine's Day gifts" and "cheap Valentine deals" to drive traffic to malicious sites through search engine poisoning and malicious ads.
For those unfamiliar with how these attacks work, our guide to phishing email examples covers the common patterns to watch for.
Romance Scam Infrastructure
SpyCloud's analysis of infostealer logs revealed the industrial scale of romance-linked cybercrime. More than 630,000 unique threat actors maintain digital footprints across three categories:
- Cybercrime forums where tactics and victim lists are traded
- Dating and social platforms used for victim targeting
- Cryptocurrency exchanges for laundering proceeds
This overlap demonstrates how romance scams connect to broader cybercrime operations. Stolen dating profiles become social engineering weapons. Cryptocurrency provides the cash-out mechanism. Forums enable specialization—some actors focus on initial contact, others on psychological manipulation, others on funds extraction.
Protection Recommendations
For consumers:
- Verify retailer legitimacy before purchasing from unfamiliar sites
- Type URLs directly rather than clicking links in emails or messages
- Reject unusual payment methods including cryptocurrency, gift cards, and wire transfers
- Download dating apps only from official app stores
- Enable multi-factor authentication on all accounts
For organizations:
- Update web filters with newly registered domain blocking
- Alert employees to seasonal phishing themes
- Monitor brand impersonation if you're in retail, hospitality, or delivery
- Review DNS logs for connections to recently registered domains
Why This Matters
Seasonal phishing campaigns exploit predictable consumer behavior. People expect Valentine's emails about gifts, deliveries, and date planning—making malicious messages blend with legitimate ones. The delivery impersonation tactics are similar to those used in LastPass credential theft campaigns targeting security-conscious users.
The infrastructure being built now won't disappear after February 14. These domains, once established, can be repurposed for future campaigns. The threat actors behind them operate year-round, simply adjusting their lures to match the calendar.
Related Articles
MetaMask Users Hit by Phishing Using Fake Security Reports
SANS ISC documents phishing campaign using fabricated incident reports to steal MetaMask wallet credentials. Attackers host phishing pages on AWS S3.
Feb 17, 2026Germany Warns of Signal Phishing Targeting Officials
Germany's BfV and BSI issued a joint advisory warning of state-sponsored phishing campaigns targeting politicians, military officials, and journalists through Signal's device linking feature.
Feb 12, 2026Phishers Hide Behind Google Slides Publish Feature
Attackers exploit Google Presentations' publish mode to host phishing pages that bypass Google's own security warnings, targeting Vivaldi Webmail users.
Jan 30, 2026LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call
Scattered Lapsus$ Hunters offers $500-$1,000 to recruit women for IT help desk social engineering attacks. The supergroup combines LAPSUS$, Scattered Spider, and ShinyHunters tactics.
Feb 26, 2026