{"id":13350,"date":"2019-05-29T06:08:41","date_gmt":"2019-05-29T10:08:41","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/travel-phishing\/13350\/"},"modified":"2020-03-26T17:01:34","modified_gmt":"2020-03-26T13:01:34","slug":"travel-phishing","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/travel-phishing\/13350\/","title":{"rendered":"Learn how to spot travel phishing"},"content":{"rendered":"<p>Summer\u2019s coming, and that means vacation season is on its way. A lot of people are looking through travel websites in search for interesting places to go, cheap places to stay, and tickets at interesting prices. And, as usual, scammers are eager to give them what they are looking for \u2014 sort of.<\/p>\n<p>In addition to <a href=\"https:\/\/www.kaspersky.com\/blog\/protect-your-vacation\/22352\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">the usual tactics scammers use to rob you<\/a> while you\u2019re looking forward to having a nice vacation, these travel tricks are worth knowing before you start planning your next trip. In this post we\u2019ll dig into some details and talk about how malefactors try to trick excited folks into believing they\u2019re on a genuine travel website. All of these methods were spotted in the wild by Kaspersky Lab\u2019s researchers during late April and early May, and you can thwart them all with three simple best practices.<\/p>\n<h2>1. Look at the address bar\n<\/h2><p>The most common advice on protection against phishing is to use simple vigilance, but still, if cybercriminals manage to create a really impressive looking clone of the original website, a lot of people forget this simple step and don\u2019t look at the URL to see what website they\u2019re actually on. And malefactors know how to make us unwary.<\/p>\n<p>For example, take a look at this sweet deal: a nice cozy apartment for just \u20ac14 a day. Interesting, huh? And the site looks as if it\u2019s really Airbnb.com. The design, the comments from different people describing their pleasant time at the apartment and being so pleased with the host \u2014 everything looks so real. Anything you\u2019d expect to find on Airbnb, you\u2019ll find here.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182515\/travel-phishing-airbnb1.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182515\/travel-phishing-airbnb1.jpg\" alt=\"\" width=\"972\" height=\"1160\" class=\"aligncenter size-full wp-image-13353\"><\/a><\/p>\n<p>Except it\u2019s not Airbnb. It\u2019s a fake. If you look at the URL in the address bar, you\u2019ll see something like this: <em>abnb63213491.byethost8.com\/rooms\/7858853<\/em>. Doesn\u2019t look like airbnb.com, does it?<\/p>\n<p>The scam <a href=\"https:\/\/www.kaspersky.com\/blog\/airbnb-landlordz-scam\/26926\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">usually goes as follows<\/a>: After a short conversation the \u201chost\u201d will ask you to send a certain amount of money to reserve the apartment for you. Once you do that, they stop responding.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182525\/travel-phishing-airbnb2.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182525\/travel-phishing-airbnb2.jpg\" alt=\"\" width=\"972\" height=\"1383\" class=\"aligncenter size-full wp-image-13355\"><\/a><\/p>\n<p>How do people usually get to pages such as this one? Similar offers can be found in spam e-mails, in messaging apps, and in social networks. Sometimes, they pop up in ads on search engines or social networks.<\/p>\n<p>By the way, even though scammers invest quite some time in creating such convincing website clones, they are still mostly lazy. Here\u2019s another example of a phishing Airbnb page, and you may notice that comments here are left by the very same \u201cguests\u201d as on the previous page. Once you know that, it\u2019s tough to take these pages seriously.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182533\/travel-phishing-airbnb3.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182533\/travel-phishing-airbnb3.jpg\" alt=\"\" width=\"972\" height=\"926\" class=\"aligncenter size-full wp-image-13357\"><\/a><\/p>\n<h3>2. Look closer: Tricky letters<\/h3>\n<p>Now let\u2019s take a look at another site, also neatly designed and resembling a real one. Now that you know to look at the URL first, you can do that. The first thing you should notice is that the URL seems to include booking.com, but the site looks as if it belongs to another travel giant, Expedia. But, OK, perhaps one of them bought the other one or something else happened \u2014 it\u2019s not your job to keep track of travel mergers, after all. You\u2019re just here to get a good deal on plane tickets or a place to stay.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182541\/travel-phishing-booking.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182541\/travel-phishing-booking.jpg\" alt=\"\" width=\"972\" height=\"528\" class=\"aligncenter size-full wp-image-13359\"><\/a><\/p>\n<p>But take a closer look at the URL, especially at the letters in the word <em>booking<\/em>. Notice those weird symbols below the letters <em>k, i, n<\/em> and <em>g<\/em>? That\u2019s not dirt on your screen or a computer glitch. In fact, these are different letters. They\u2019re part of the Latvian alphabet \u2014 and yes, boo\u0137\u012f\u0146g.com and booking.com are completely different websites. <\/p>\n<p>So, a quick glance at the URL may not be enough to spot the phish. You need to look closely; scammers really love using alternative alphabets to disguise phishing page URLs. To be sure, click on the lock at the left of the address bar and choose \u201cShow certificate\u201d to take a look at who the site\u2019s real owner is.<\/p>\n<h3>3. Look twice: URL shorteners<\/h3>\n<p>Another tactic scammers employ to try to fool you is using URL shorteners. Say you see a link somewhere advertising cheap rentals or discounts on airline tickets, and the link looks shortened. Thanks to Twitter, we\u2019re all used to shortened URLs, and links beginning with t.co or goo.gl don\u2019t surprise us at all. We treat those links as legitimate. So why should we worry about links beginning with, say, <em>twixar.me<\/em> or <em>tinyurl.com<\/em> \u2014 these certainly look like the results of using yet another shortener.<\/p>\n<p>And they are, but you should never trust shortened URLs. If you click on a shortened link, you always have to check where exactly it brought you. Shortened links aren\u2019t necessarily malicious, but they can be. You could end up on a fake Expedia page like the one below, where you will be prompted to enter your login and password for Expedia (for instant transfer to cybercriminals). Oh, and in this case the fake page also asks for your e-mail password, which you should never, ever enter anywhere but your e-mail provider\u2019s website or e-mail apps.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182553\/travel-phishing-expedia1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182553\/travel-phishing-expedia1.png\" alt=\"\" width=\"972\" height=\"566\" class=\"aligncenter size-full wp-image-13361\"><\/a><\/p>\n<p>As for Airbnb accounts, malefactors like to steal them for later use in money laundering. They use your account to offer places to stay and other accounts to pay for those stays, making the money appear to have been legitimately earned. <\/p>\n<h3>4. Bonus: Detecting travel spam<\/h3>\n<p>One of the easiest ways to lure people to phishing pages is send them very convincing messages. And that\u2019s what criminals do. The problem is, it may be hard to realize that the message from yet another airline company is a fake one. Looking into the \u201csender\u201d field doesn\u2019t give you much as e-mail protocol allows you to send mail from any address. The content may be thoroughly copied from the original mailing of the same airline.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182605\/travel-phishing-airline-scam.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/05\/29182605\/travel-phishing-airline-scam.png\" alt=\"\" width=\"856\" height=\"481\" class=\"aligncenter size-full wp-image-13363\"><\/a><\/p>\n<p>What gives the malefactors away is the link address. They want you to land on a website, and so they have to direct you there with a link or a button. But if you hover your cursor over that link, the URL\u2019s destination address will appear (in the bottom left corner of your browser or e-mail app, for example). And since you\u2019ve read the rest of this post, you know what to look for.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<h3>Tips to spot travel phishing<\/h3>\n<p>Now that you know the tricks scammers use to fool you, you can stay on the safe side and avoid their phishing nets. Let\u2019s quickly sum up a few short tips on how not to fall for phishing (you can <a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-ten-tips\/10550\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">read more about protection from phishing in general in this post<\/a>):<\/p>\n<ul>\n<li>If an offer seems too good to be true, it probably is. Best to avoid it.<\/li>\n<li>Carefully look at the address bar before entering any sensitive information such as your login and password. If something is wrong with the URL (it\u2019s misspelled, doesn\u2019t look like the original or uses some special symbols instead of letters), don\u2019t enter anything on such sites. When in doubt, check the certificate of the site by clicking on the lock icon to the left of the URL.<\/li>\n<li>Book your stay and tickets only on trusted websites of trusted providers, ideally typing the address of their website manually in the address bar.<\/li>\n<li>Don\u2019t click on links coming from unknown sources (be it in e-mails, messaging apps, or social networks).<\/li>\n<li>If you see a giveaway from a travel company or an airline either in e-mail or on social media, visit the business\u2019s official website to confirm the giveaway actually exists. Also, carefully check the links the giveaway ad leads you to.<\/li>\n<li>Use a good security solution that can protect you from spam and phishing. We recommend <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>No matter how good malefactors are at pretending to be the real deal, you can still spot travel phishing if you know these three simple rules.<\/p>\n","protected":false},"author":246,"featured_media":13351,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1737,1474,76,131,633],"class_list":{"0":"post-13350","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-advice","9":"tag-accounts","10":"tag-phishing","11":"tag-tips","12":"tag-travel"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/travel-phishing\/13350\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/travel-phishing\/15821\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/travel-phishing\/17730\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/travel-phishing\/15875\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/travel-phishing\/14632\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/travel-phishing\/18532\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/travel-phishing\/17371\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/travel-phishing\/22795\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/travel-phishing\/27078\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/travel-phishing\/11788\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/travel-phishing\/11898\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/travel-phishing\/10790\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/travel-phishing\/19348\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/travel-phishing\/23311\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/travel-phishing\/18427\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/travel-phishing\/22655\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/travel-phishing\/22605\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/246"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13350"}],"version-history":[{"count":15,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13350\/revisions"}],"predecessor-version":[{"id":16209,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13350\/revisions\/16209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13351"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}