Feeds

Phishing scam aims to hoodwink hotel habitants

Counterfeit site ruse proves hard to pin down

Beginner's guide to SSL certificates

Phishing fraudsters have moved on from banking sites with an attack designed to hoodwink hotel customers, according to a team of security volunteers.

Hotel chains including Hyatt, TraveLodge, Comfort Inn, Ramada, Days Inn, and Wyndham are being targeted in the reported scam. More than 71,000 travelers each month have been redirected to counterfeit sites, volunteer security community FraudTip.com warns. Mainstream net security firms are unable to confirm these figures.

FraudTip.com culled its figures using "audience measurement" technology. It reckons the scam combines "advanced online advertising, bogus hotel locators, third-party reservation systems, and Internet browser crimeware to redirect hotel guest traffic to fake versions of well-known hotel chain websites".

However net security firms reckon the attack is nothing more or less than a straightforward phishing scam, albeit one directed at hotels rather than banks or ecommerce outlets. Some element of search engine trickery to inflate the rank of counterfeit sites may also be involved.

Roger Thompson, chief of research at AVG, said the attack described had all the hallmarks of a phishing assault that didn't involve malware.

"For what its worth, there's no mention of those brands in my records," he told El Reg. "I've also not heard of any malware doing any man in the middle attacks like that either. It's certainly possible, but I would think the machine is already hosed if they've got that sort of malware installed."

Symantec said the attack hadn't hit its radar either.

"I have looked through all of our normal sources and also checked to see if any of the hotels mentioned in this report show up in our databases as recently compromised - they haven't," a spokeswoman told us.

Nobody from FraudTip.com was immediately available to discuss details of the hotel chain attacks. ®

Internet Security Threat Report 2014

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.