{"id":24785,"date":"2025-10-08T07:00:25","date_gmt":"2025-10-08T11:00:25","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/airline-brands-scheme\/24785\/"},"modified":"2025-10-08T15:12:38","modified_gmt":"2025-10-08T11:12:38","slug":"airline-brands-scheme","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/airline-brands-scheme\/24785\/","title":{"rendered":"Fake partnership proposals"},"content":{"rendered":"<p>Our experts have detected a fraudulent email campaign on behalf of well-known airlines and airports. Since the beginning of September, our solutions have detected and blocked thousands of similar emails in which scammers posed as employees of Amsterdam Schiphol, Emirates Airlines, Etihad Airways, Lufthansa, Qatar Airways, and other well-known large aviation-related companies. Our experts then started discovering similar mailings exploiting the names of companies in the oil and gas sector. The attackers are imitating normal business correspondence, pretending to be looking for new partners and targeting companies of various sizes and from various industries. The essence of the scheme boils down to convincing the recipients of emails to transfer money to the fraudsters\u2019 accounts.<\/p>\n<h2>How the fraudulent scheme works<\/h2>\n<p>Attackers try to draw the victim into a correspondence exchange. At the first stage, they send the victim a rather innocuous email on behalf of the procurement department of a major airline or airport, in which they announce the start of a partnership program for 2025\/2026, and offer them mutually beneficial cooperation. If the recipient responds, the second stage begins: they send several documents to divert attention \u2014 registration forms for a new partner, non-disclosure agreements, and so on.<\/p>\n<p>These emails don\u2019t contain malicious attachments or links, and there are no hidden scripts in the documents, so basic defense mechanisms don\u2019t always block such correspondence. Attackers use only social engineering techniques. In the next letter they ask to pay a certain \u201cmandatory refundable deposit as an expression of interest\u201d of around several thousand dollars. The purpose of this payment is supposedly to secure a priority place on the schedule for consideration of partnership proposals. And the authors of the email give assurances that once the partnership agreement is finalized the money will be returned.<\/p>\n<h2>How to realize there\u2019s something wrong with the email<\/h2>\n<p>The letters used in this campaign look very plausible, but some inconsistencies can still be detected with the naked eye. The first thing to look closely at is the sender\u2019s email address. It often contains the name of the organization whose employees the scammers are imitating. But if you search for the company\u2019s real website and examine email addresses listed in the contact section, you\u2019ll see that the legitimate addresses of the airport or airline employees have a different domain name. Sometimes attackers don\u2019t bother to keep the <em>From<\/em> field plausible at all, and simply write the name of the imitated organization in the displayed name field, so you can see a completely unrelated domain in the email address field.<\/p>\n<p>The general rule for business correspondence that for some reason raises suspicion: if there are any doubts, you can write a letter to the address specified on the official website of the company and clarify whether an affiliate program mentioned in the emails really exists, whether the sender works for this company, and whether the address used in a suspicious email is their real email.<\/p>\n<p>But the main red flag is the offer to make a deposit to \u201cexpress interest\u201d. Respectable companies don\u2019t work that way. They choose partners, suppliers, and contractors after a serious and comprehensive business reputation check \u2014 not based on the ability to transfer a small (by their standards) amount of money.<\/p>\n<h2>How to protect your company from fraudsters<\/h2>\n<p>Ideally, you should implement solutions that prevent fraudulent, phishing and malicious emails from reaching employee inboxes in the first place. We recommend installing strong protection at the <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security\/mail-security-appliance?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">corporate email gateway level<\/a>.<\/p>\n<p>Another important aspect of protecting your company from cyberthreats is to increase employee awareness of scammers\u2019 tricks and other cyberthreats. Particular attention should be paid to training for finance, sales and procurement staff. Comprehensive training sessions can be conducted, for example, via our online <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"kesb-trial\" value=\"19422\">\n","protected":false},"excerpt":{"rendered":"<p>Attackers pretending to be airlines or airports are sending out fake partnership offers.<\/p>\n","protected":false},"author":2704,"featured_media":24786,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[19,80],"class_list":{"0":"post-24785","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-email","11":"tag-fraud"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/airline-brands-scheme\/24785\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/airline-brands-scheme\/29714\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/airline-brands-scheme\/12904\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/airline-brands-scheme\/29603\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/airline-brands-scheme\/28654\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/airline-brands-scheme\/30199\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/airline-brands-scheme-2\/40686\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/airline-brands-scheme\/13896\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/airline-brands-scheme\/54539\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/airline-brands-scheme\/23293\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/airline-brands-scheme\/24396\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/airline-brands-scheme-2\/29832\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/airline-brands-scheme\/35546\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/airline-brands-scheme\/35170\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2704"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24785"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24785\/revisions"}],"predecessor-version":[{"id":24787,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24785\/revisions\/24787"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24786"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}