Cyber Criminals Stealing Reward Points & Air-Miles

Research by security firm Flashpoint uncovered a thriving online marketplace where illicit “booking services” offer discounts at the expense of genuine customers in the UK and elsewhere.

Russian cyber criminals are using British victims' reward points and air-miles to enjoy luxury holidays at budget prices, a report has revealed.

The fraud sees lucrative rewards sites accessed through compromised bank accounts and credit cards, usually without the owner’s knowledge, and used to purchase hotel rooms, flights, cruises and car rentals. One British couple only found out 30,000 points had been stolen from their Avios account after a hotel was booked for three nights in Spain, using one legitimate name as the lead traveler alongside “Dimitri and Olga”.

Several other travellers have found points being used for Russian flights, including one from Moscow to Kiev and an internal Russian flight for two passengers, or hotels in the country like the 5* Intercontinental Moscow. 

Flashpoint analysts say the Russian-speaking and English-speaking marketplaces were the biggest in the fraudulent trade, followed by French and Spanish.

Liv Rowley, one of the report’s authors, said it was part of a “cyber-criminal ecosystem” incorporating hackers and middle-men who purchase and sell on the necessary details.
“They’re real services and points but going to the wrong person,” she explained.
“We believe that this is actually working,” she added, describing photos posted online by jubilant holidaymakers and happy reviews on illicit websites.
“I believe the people taking part in this knowing it’s illegal. A lot of the listings we see include flights at 30 or 25 per cent of the listing price. 
“If you’re buying a flight for only a quarter of its value, there’s probably something and weird.”

One Russian-language forum has established its own group of members dedicated to cyber-crime targeting hotels, while another offers plane tickets to anywhere in the world, apart from Russian domestic flights.

On the now-defunct AlphaBay Market, 3,601 customers purchased one provider’s fraudulent hotel and car rental services between March 2015 and December last year. Researchers said it was impossible to tell the success rate of the fraud, which should be thwarted by identification checks by airlines, hotels and car rental companies.

Some sites have been encouraging customers to make reservations in their own names, as attempting to fake a passport or travel document is too risky.
“Some people commenting on forums posts say they experienced a bit of difficulty,” Ms. Rowley said.
“Hotels can ask to see the card the booking was made under but they don’t have the information, so they find a way to get out of it by coming up with lies like ‘I lost my wallet’ or ‘it was present’.”

Although several known sites have been shut down, cyber criminals are moving to other platforms to offer their wares, which also include retail gift cards. Providers have been refunding stolen points but Flashpoint is urging people to frequently check their reward accounts or set up alerts for anomalies, while ensuring their online bank accounts are under maximum security and being aware of phishing attempts and other scams.

So-called “brute-forcing software”, which runs through a large number of possible password combinations until the correct one is determined, is one of the many ways the accounts can be compromised so complexity and variation is key.

The warning comes after security officials said that Russian-speaking countries pose the “number one cyber-crime threat to the UK”.

Billions of pounds have so far been lost in online attacks that are affecting British people every day, following the huge WannaCry ransomware attack that crippled the NHS.

Around 1.8 million cyber-dependent crimes took place last year, according to the Crime Survey for England and Wales, mostly from online criminals seeking profit.

“Things are likely to get worse before they get better,” said Oliver Gower, head of the National Cyber Crime Unit.
“With innovative criminal capability available to the highest bidder, it is inevitable that hostile states will explore its possibilities, and conversely that very entrepreneurial cyber criminals may seek to steal data in order to sell to states.”

Independent:

You Might Also Read:

Russian Hackers Feel The Heat:

Russian Cyber Gang Arrested By …. Russia:

UK Under Attack By Russian & Chinese State Sponsored  Hackers:

 

« Apple Must Fix Its Embarrassing Password Bug
Replaying Crime Scenes With An Advanced Scanner »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

Quorum Cyber

Quorum Cyber

Quorum Cyber offer end-to-end cyber security solutions, specialising in Managed Security Services, Consulting and Resourcing.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

VIPRE Security Group

VIPRE Security Group

VIPRE Security Group is an award-winning global cybersecurity, privacy and data protection company.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Excite Cyber

Excite Cyber

Excite Technology Services (formerly Cipherpoint) is focused on improving the security posture of our customers.

Fivecast

Fivecast

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.

Morrow Global Network

Morrow Global Network

Morrow is the global venture network for venture accelerators, studios, hubs, and their visionary leaders.

Trustlink Technologies

Trustlink Technologies

Trustlink Technologies is an information technology company founded with a steadfast vision to fortify the digital landscapes of businesses through a foundation of trust.