Feeds

Crumbs! Holiday phish based on genuine hotel booking surfaces

'The email looked incredibly authentic,' warns scam target

Security for virtualized datacentres

Scammers have launched a devious phishing campaign aimed at tricking customers of targeted hotels into transferring funds to a drop account.

Securobods suggested cybercrooks either hacked into a Spanish hotel's system or persuaded someone to hand over customer records on a false pretext before using the purloined details to trick their customers into transferring funds to a bank account in Poland. Prospective marks were also asked to hand over credit card verification codes (CVV numbers) to scammers.

The wife of Reg reader Paul received a scam email after booking a family holiday in Spain via Booking.com.

El Reg notes that security experts have said the following issue was likely not due to any vulnerability in hotel reservations aggregator Booking.com itself.

Phishing emails are, of course, all too common, but this one distinguished itself because it featured the name of a genuinely booked hotel alongside the dates of stay, the reader's home address and the correct invoice amount.

"The email looked incredibly authentic and given the personal details contained, looked very plausible," Paul told El Reg. "All the personal details used in the email are correct."

Paul's wife also received a text message (content below) shortly after the delivery of the dodgy email.

Dear Client, We have sent you an invoice to your e-mail address you have on file with us. Many Thanks, Booking.com

The customer service agent at Booking.com told Paul that it is most likely that they phished the details directly from the hotel, pretending to be Booking.com

El Reg approached both Booking.com and the Mallorca-based hotel named in the scam email for comment on Friday. Neither has responded as yet. We'll update this story as and when we hear more.

Going phishing

Security experts have said a breach of some sort may have occurred at the Spanish hotel involved, but emphasised that this was just a working theory. Alternative explanations would include a banking Trojan harvesting most of the details of a transaction from Paul's machine or a breach at Booking.com.

"I don't think there's been a breach at Booking.com because the net would be ablaze with comments and targeted phishing emails which means it is possible they're phoning up hotels and - perhaps - working their way through guest lists then sending their highly targeted missives to unfortunate individuals", said Chris Boyd, a malware intelligence analyst at anti-virus firm Malwarebytes.

"The victim in this case can probably rest easy - I don't think they were singled out for any other reason than they happened to be on the hotel books the scammers picked on the day. Having said that, they should run some AV scans if they haven't already and keep a close eye on any unusual attempts at outgoing payments just in case there is any malware involvement," he added.

Fraudsters have recently targeted Booking.com customers with a malware-based attack. This may, or may not, be a follow-up campaign, according to Boyd.

"There was a malware campaign last month which targeted Booking.com and Allegro customers - they sent personalised emails to the victims which mentioned outstanding invoices, complete with password stealer attachment," Boyd explained.

"While not quite the same thing that's happening here, it could be relevant in some way - perhaps a spin-off group, or the returns on fake emails with malware weren't good enough so they've moved into full blown social engineering. Unfortunately, all we can do is speculate on that last point - they may be entirely unrelated," he added.

Rik Ferguson, veep of security research at Trend Micro, was also inclined to think that a breach at the Spanish hotel where Paul's family had made their booking was the most likely source of the scam.

"Given the extent of accurate information in the scam email, malware seems unlikely," Ferguson told El Reg adding that three scenarios seemed plausible.

The most likely of the three would be a breach at the hotel itself. "This doesn't need to be voice or phishing, rather a breach of that hotel’s booking system would do nicely," Ferguson explained. A breach at Booking.com is "less likely as they would be under legal obligation to disclose a breach", according to Ferguson, who added that a targeted MITM [man-in-the-middle] malware looking for well-known booking sites is another possibility.

The scam attempted to hoodwink the recipients into wiring money to a Polish bank account. Ferguson said the person running the account is either a knowing or unwitting participant in the con.

"The Polish bank account will certainly be traceable, but that is standard practice, passing money through a mule account  or two (unsuspecting or otherwise) allowing the mule to cream off a certain percentage before having the mule convert it into wire transfers or some other untraceable transaction," he concluded.

Malwarebytes' Boyd added: "Without knowing more about the wire procedure being used by the scammers in this case, we can't say for sure what they'd do at the receiving end to pick up the funds or how easy it would be for them to get away with it."

"Asking the victim to provide a scanned receipt is something wire fraud scammers will use along with a fake ID when they pick up the money - often, they'll pretend to be the victim at the bank, or have the victim send money to a relative via wire transfer then pretend to be that relative and claim the cash," he added.

A partially redacted copy of the scam email:

From: "Booking.com" <payment@booking-resolution.com>

Date: 29 July 2014 01:31:50 BST

To: XXXXX Subject: XXXX Please confirm your reservation

Booking.com Dear XXXX ,

First of all thank you for selecting ******* & Spa · #883029917 .

We were informed by ******* Hotel & Spa · #883029917 that the credit card you provided could not be processed to secure your reservation.

The stated reason was:

Code: 0125, The card verification value the user gave for the attempted transaction did not match the card verification value on file for the account (This authorization check normally occurs for cardless accounts and for internet and telephone orders.)

What you can do now:

Please do not try to pay using your credit card again, just go to your bank and send a wire transfer to our account below, also you can do it from home if you have access to internet banking :

Account Name: Anibal Pagaimo

Bank Name: ING IBAN: PL 71 1050 1025 1000 0091 XXXX XXXX

Swift/BIC: INGBPLPW

Bank address: ul. Grojecka 186, 02-390 Warszawa

Owner Address: ul. XX XX/XX, XX-XXX Warsawa Country: Poland

Once the payment is completed, please reply to this e-mail with the scanned receipt of the deposit.

Many thanks, Booking.com

Arrival Thursday, August XX, 2014

Departure XXXday, August XX, 2014

Number of nights X

Address: XXXXX,XXX, XXXX, United Kingdom

Secure remote control for conventional and virtual desktops

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
FBI boss: We don't want a backdoor, we want the front door to phones
Claims it's what the Founding Fathers would have wanted – catching killers and pedos
Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
Pull it out ASAP, it is SWISS CHEESE
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.