Fake airline tickets catch out 90% of phishing targets

Ignore that unexpected airline email - you're not going anywhere, though your data may be

Phishing attacks designed to look like airline tickets catch out as many as 90% of their business targets, according to Barracuda Networks.

The security firm uncovered the specialist spin on standard phishing emails in its usual scans of customers' emails.

"We've seen this attack with several of our customers, especially in industries that deal with frequent shipping of goods or employee travel, such as logistics, shipping, and manufacturing," noted Asaf Cidon, vice president of content security services, in a blog post.

Advertisement - Article continues below

"Our analysis shows that for the airline phishing attack, attackers are successful over 90% of the time in getting employees to open airline impersonation emails," he added, though targets will need to open the attachment or click embedded links in order to be infected. "This is one of the highest success rates for phishing attacks."

The attack works so well because it combines multiple techniques, he said, starting with impersonation. "The attacker will either impersonate a travel agency or even an employee in HR or finance that is sending an airline ticket or e-ticket," Cidon said. "The email will be constructed to appear inconspicuous to the untrained recipient."

Using targeted research, the attacker selects a likely destination and airline that fit with what the company does or its location, he added.

Advertisement
Advertisement - Article continues below

The email will feature an attachment that appears to be a flight confirmation or receipt, perhaps in PDF or DOCX format. Once opened, the embedded malware kicks in. Some versions of the attack also include links, encouraging targets to click through to malicious pages that are designed to look like airline websites or travel booking systems.

Advertisement - Article continues below

"This step in the process is designed to trick the victim of the attack into entering corporate credentials into the site," Cidon said. "The attacker will then capture the credentials, and use them to infiltrate the corporate network and internal company systems, such as databases, email servers, and file servers."

What can companies do to avoid such attacks? Cidon advises companies to use sandboxing to prevent malware from ever reaching the corporate mail server, and using anti-phishing protection that scans links and looks for malicious code. And, as usual, training will help staff avoid being caught out.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/26138/how-to-speed-up-windows-10
operating systems

How to speed up Windows 10

4 Mar 2020
Visit/security/cyber-security/355041/critical-nhs-cyber-security-checks-suspended-due-to-coronavirus
cyber security

Critical NHS cyber security checks suspended due to coronavirus response

19 Mar 2020
Visit/hardware/355039/apples-2020-ipad-pro-might-finally-be-a-computer-replacement
Hardware

Apple’s 2020 iPad Pro might finally be a computer replacement

19 Mar 2020
Visit/business-strategy/flexible-working/355051/perfecting-your-remote-working-strategy
flexible working

Perfecting your remote working strategy

20 Mar 2020