back to article Cybercrooks book a stay in hotel email inboxes to trick staff into spilling credentials

Cybercriminals are preying on the inherent helpfulness of hotel staff during the sector's busy holiday season. Researchers at Sophos said the latest malware campaign targeting hotels involves sending emails that play on the emotions of staff, while at the same time applying time pressure, to trick them into downloading and …

  1. Woodnag

    Solution

    Instead of training every staff member, simply pre-vet all emails and auto-respond to ones with links and/or attachments telling the sender to re-send without them.

    Also convert all incoming to plain text before passing them on.

    1. Rikki Tikki
      Joke

      Re: Solution

      Auto reply to all complaint emails à la Basil Fawlty:

      "You ponce in here expecting to be waited on hand and foot, while I'm trying to run a hotel here. Have you any idea of how much there is to do? Do you ever think of that? Of course not, you're all too busy sticking your noses into every corner, poking around for things to complain about, aren't you?"

    2. Diogenes8080

      Re: Solution - not commercially practical

      Even the pointy-haired ones can see that's a silly idea that is still exploitable.

      1) text based bogus writ threats will still get through

      2) socially engineer the recipient to reassemble the link - which is a variation of these password-protected droppers that are making a comeback.

  2. djnapkin

    Missing the step between the download and the installation

    I'm missing a step in the exploit chain here. Once the staff member downloads the google drive file, it wouldn't be automatically installed. I'm assuming the file is a .exe executable? Are the hotel staff double clicking it and clicking Yes on the UAC prompt?

    1. diodesign (Written by Reg staff) Silver badge

      Pretty much

      Yup, you get a digitally signed executable that the staffer is tricked into running, clicking through any of those pesky prompts. Then the malware is running at the same level as the logged-in user at least. Priv-esc holes are a dime a dozen in Windows - if needed.

      C.

    2. Cook942

      Re: Missing the step between the download and the installation

      I'm guessing you don't have much experience with end users, because yes. Yes they do

  3. sitta_europea Silver badge

    You'd have thought with all that AI that Gurgle could scan stuff that people put on Gurgle Drive with some kind of, like, well, a malware scanner.

    I see dozens of links to Gurgle Drive in emails every day. They're all from criminals and they all link to malware.

    Any email that arrives here with Gurgle Drive links in it is automatically reported to a dozen different DNSBLs.

    I've never seen Gurgle Drive used legitimately.

    I'm hoping it will go the way of most other Gurgle flashes in the pan.

    1. Cook942

      that's why they are using password protected files. unencrypted files can be and are scanned by google

    2. John Robson Silver badge

      "I've never seen Gurgle Drive used legitimately."

      Really? I find that hard to believe.

      I regularly get customers providing files using GDrive.

      1. Diogenes8080

        Public file sharers

        Precisely, and it's not just Giggle; your collective correspondent base is going to want to use every sharing service out there, and some of the dodgier encrypted mail providers too.

    3. MachDiamond Silver badge

      "I see dozens of links to Gurgle Drive in emails every day. They're all from criminals and they all link to malware."

      I work with a lot of real estate agents and they just love Google for free services. I keep trying to tell them that a gMail account and anything else Google screams cheap and nothing but a hobbiest. Google Drive accounts are free and simple to set up without any checks so they are perfect for scammers. They don't have to persist long to do their job so if Google does find out they're driving the get-away car, it's too late.

  4. Nifty

    The major scam with booking.com is that the scammers insert messages directly into the chat stream of your booking. Asking for a cash transfer, since your card "didn't go through". Bank account details for the transfer are always included. This is a 5 year old scam on booking.com and a perennial on chat forums. When will this platform have the wit to block anything that looks like a payment request with bank transfer details?

  5. iron

    Graham Cluely has been talking about this on the Smashing Security podcast for several weeks, after the crooks sent him a message through the Booking.com app.

    1. MiguelC Silver badge
      Angel

      It's always nice of the scammers to target a security pro

  6. Anonymous Coward
    Anonymous Coward

    Having used Booking.com I'm pretty sure the whole thing is a scam..

  7. Prst. V.Jeltz Silver badge

    To see naked ladies click on "downloadhelper.exe"

    which leads to the download of a digitally signed executable.

    Its comforting that this is still the favorite method , that training and OS/ browser warnings and user admin rights should be able to keep in check.

    I know there will always be people who are fooled but jeeeesus: it couldnt be any simpler could it ?

    "do not down load executables"

    what is NOT helping is Microsoft's insistence on hiding file extensions preventing easy identification of filetypes.

    In a separate rant what Microsoft is also not only not helping with but actively hindering is users understanding filepaths. They hide them obfuscate them , add "libraries" , ID the whole path as "my documents" , add super-hidden Junctions for backward compatibility ...

    How are users meant to learn to know where their shit is?

    File paths and filetypes are the TWO MOST absolutely fundamental concepts if you ask me and you shouldnt be allowed near a computer till you "get it" .

    Microsoft apparently thinks otherwise.

    1. yetanotheraoc Silver badge

      Re: To see naked ladies click on "downloadhelper.exe"

      "File paths and filetypes are the TWO MOST absolutely fundamental concepts"

      I think the idea is to make computing possible even for people who can't learn fundamental concepts. For an extreme example, I have a learning-disabled niece who gets on quite well with an iPad. On the more mundane end of the spectrum, all of us humans are challenged in one way or another. For a large chunk of people who theoretically _could_ learn fundamental concepts, asking them to do so is only going to make them tired and irritated.

      I should add, I don't agree with this idea of hiding file paths, but I don't have a better one.

      1. Prst. V.Jeltz Silver badge

        Re: To see naked ladies click on "downloadhelper.exe"

        " asking them to do so is only going to make them tired and irritated."

        Its nothing more complicate than learning which cupboard and shelf your freshly laundered towels are to be stored on .

        You need to know that if you're ever going to be able to locate your towel .

        #HHGTTG

        .

        .

        I'm not asking they know the path to where chrome stores its appdata , just to where they put "mygasbill.xls"

  8. Spanners
    Linux

    "May only work in Windows"

    That should immediately ring an alarm!

    The thing that Windows, famously, does best is run viruses etc.

    If I ever got a message containing such a comment, I would open it on a Raspberry Pi or some other unimportant device that would not run anything like them (I hope).

    1. Prst. V.Jeltz Silver badge

      Re: "May only work in Windows"

      why would you run any sort of executable if its being proffered as a picture or video to assist the conversation?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like