Thomas Cook phishing sites skyrocket following firm's collapse

Former employees and customers are believed to be the targets of malicious campaigns capitalising on the company's liquidation


Security researchers have detected 53 Thomas Cook-related domains having been registered in the week after the travel operator went into receivership, a sharp rise from the norm.

Skurio's researchers issued an alert to former employees and customers of Thomas Cook calling for greater vigilance when visiting online services claiming to be associated with the fallen travel company.

Advertisement - Article continues below

The researchers told reporters at a media event that some of the domains were registered with good or harmless intent, but it seemed as though a minority were created for phishing purposes.

Patrick Martin, head of threat intelligence at Skurio said as of 1 October, as far as he could see, none of the sites were actively hosting malware, "but there's 53 domains out there so I'd be surprised if at least one or more [wasn't]".

"With the majority of the ones I looked up, malware wasn't the game, it was more about harvesting user data," added analyst John Evans. Below is a screenshot of one of the new sites and the form it asks users to complete.

Martin added that roughly 25% of the domains were simply piggybacking off the collapse and used as harmless redirects to other sites one redirected to a UK license plate website.

Others were simply using the domain to get clicks on adverts, according to Evans. "There were quite a few I bumped into though that were just capitalising on ad revenue. There was one that was like, how to help Thomas Cook holidaymakers, so if you want to book a new holiday or find jobs for Thomas Cook employees all it's doing is, when you click on it, it takes you straight to Expedia, or wherever."

Advertisement - Article continues below
Advertisement - Article continues below

"One of them is German, it was a .de domain which took you to a German page," said Martin. "It was just two lawyers talking about Thomas Cook and their subsidiaries." The site pretends to be a legitimate business using the Thomas Cook likeness to make money from customer refund claims.

Around 50% of the domains had holding pages, like stock home pages, given to websites using platforms such as Wix or WordPress as they waited for the full site to go live.

The small remaining portion had no landing page at all which, according to the researchers, could indicate that the domain was registered so phishing attempts could be made on former employees and customers from a legitimate-looking email address.

Related Resource

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now

Skurio's team were monitoring the state of Thomas Cook-related sites for over a year, long before it first became apparent the company was in trouble - supporting them as it would any other client. Its researchers said roughly one-to-two sites using the Thomas Cook name were consistently, like a flatline, being registered per fortnight prior to the company's issues which illustrates the extreme rise following the company's demise.

Advertisement - Article continues below

"So that flatline turned into this spike and nearly every day subsequent to that, roughly eight per day [being registered]," said Martin.

UK citizens may have already been alerted to the influx of Thomas Cook-related scams already as banks have been quick to issue alerts to customers warning against the rise in threats targeting them.

Users of the Co-operative's mobile banking app are being presented with an alert on logging in, saying: "Criminals are taking advantage of people impacted by the news that Thomas Cook have ceased trading. Never give out your bank account or card details to anybody that contacts you out of the blue".

The company also added a fraud prevention statement to its website on the day Thomas Cook announced its liquidation, as did Santander and HSBC.

Those affected by the collapse should contact the CAA in the first instance, which will be able to offer guidance on what to do next.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now



University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020

How to find RAM speed, size and type

24 Jun 2020
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020