Unmasking sophisticated marketplace scams

Phillip Roberts and Giacomo Marchese | 17 September 2024

Fake rental properties leveraging spoofed websites

Have you ever stumbled upon a rental deal so good that you had to pinch yourself to believe?

Well, you’re not alone. Fortian security analysts recently discovered a fraud campaign leveraging fake rental properties affecting housing providers, their clients, and renters broadly. This campaign is a significant step up in complexity compared to historically observed fake property rentals, as this campaign incorporates brand impersonation via spoofed websites to deceive victims. Fortian observed threat actors creating fraudulent listings on Facebook Marketplace and potentially other property websites, offering seemingly legitimate rental properties in Australia.  

The threat actors will employ social engineering to direct users to a malicious, attacker-controlled website that mirrors the appearance of a legitimate booking.com website. Once the victim reserves the accommodation, they will automatically receive an email with a fake invoice allegedly from booking.com requesting the victim to transfer the payment directly to the attacker-controlled bank account.

By creating a fake booking.com website that near-perfectly replicates the original, victims are more easily deceived into believing they are interacting with a trusted platform. This additional step of redirecting victims to the fake booking.com website aims to enhance the perceived credibility of the scam by exploiting the trust that people inherently place in well-known platforms.

This blog post will provide details of the campaign, the technical and social engineering techniques utilised, and recommendations for how to protect your organisation and clients from falling victim.

Unravelling the campaign

Targeting Vulnerable Populations The common theme seen across most threat campaigns is the ability to take advantage of victims who may be vulnerable to certain methods of extortion. In this campaign, the threat actor specifically targeted individuals seeking community housing, leveraging their urgent need for affordable accommodation.

Sophistication of the Spoofed Websites

Unlike typical malicious sites, which might be easily identified by poor design or obvious errors, the spoofed booking.com website in this campaign was a sophisticated replica of the legitimate booking.com website. It used HTTPS to appear secure and mimicked the real booking.com site closely. This high level of detail, combined with the use of a legitimate-looking domain name legitimises the appearance of the website.

Exploiting Trust in Established Brands

This campaign differs from previously observed campaigns  by exploiting the trust in well-established brands. By creating a near-perfect replica of booking.com, the threat actors capitalised on the victim's trust in the platform, making the scam more believable. The use of real property images and detailed fake invoices further enhanced the illusion of legitimacy.

Technical Intricacies

From a technical standpoint, the attackers demonstrated advanced knowledge in several areas. They registered a domain name that closely resembled the legitimate Booking.com site, employed HTTPS to create the appearance of security, and used tiny URLs to obscure the true destination of the malicious links. Additionally, they utilized email hyperlinking techniques, where words or sentences in the email contained links that appeared legitimate but redirected users to the fake site. These methods show a higher level of sophistication and a deeper understanding of how to bypass common user safeguards.

Background

Fake rental properties, sometimes referred to as phantom rentals, is not a new scam. However, in most historic cases a scammer will list a fake rental on a legitimate website and request a direct deposit from the victim before signing a contract. Generally, the  scam will never leave the original legitimate property listing website. In the latest  campaign  observed by Fortian, scammers developed  spoofed websites that masquerade as booking.com and allege that all payment and processes will be handled by booking.com. This  campaign, while including the traditionally observed social engineering techniques, includes an additional step of redirecting victims to the fake booking.com website to enhance the perceived credibility of the scam.

On June 17, 2024, Fortian  identified that a support worker of a client who operates in the Community Housing sector had interacted with a malicious URL which initiated multiple redirects before directing to a fake booking.com website. Fortian's investigation revealed that the URL had originated from an email chain forwarded to the support worker by a legitimate client of the housing provider.

This fraud campaign  begins when the victim interacts with a Facebook Marketplace listing advertising a fake rental property. In this instance, the listing was for a property in Brighton, Melbourne, with a real address (redacted for the real owner’s privacy) and real pictures that were obtained by the threat from a legitimate years-old listing on realestate.com.au.

Reverse searching the images revealed that they were originally uploaded to a legitimate property listing on realestate.com.au from several years prior. The threat actor appeared to have taken the images, address, and parts of the description from the original listing. It is notable that the fraudulent Marketplace listing did not include any direct links to malicious websites. This helps bolster the perceived legitimacy of the listing.

The victim messaged the owner expressing interest in the property, and after a brief discussion via Facebook Messenger, the owner directed the conversation to email.

Email conversation  

The email conversation is where the threat actor directs the victim to the malicious website. In this instance, the owner of the Marketplace listing used a generic Gmail email address (`andrew.luke342@gmail.com`) and employed social engineering to build rapport with the victim. They behaved cordially and professionally, initially requesting information from the victim  about their age, occupation, family size, and if they own any pets.

After the victim provided this information the threat actor informed the victim that the booking would be handled by booking.com, then requested more detailed information including full name, date of birth, photo ID, and information regarding the desired rental period. While the information requested included sensitive personal information (PI), Fortian assess that the primary intention was to increase the perceived credibility of the scam.

After the victim provided the requested information, the threat actor explained the terms and conditions of the rent and explained that the payments would all be handled by booking.com. This was another social engineering technique which leveraged the trust and authority of booking.com to provide assurance to the victim that this was genuine. The  threat actor then sent the victim an email that included a hyperlink to the attacker-controlled website. The text read `booking.com/rooms/56734556/listings/`, but the hyperlink redirected to `https://tinyurl[.]com/2y7ess82`.  

This was yet another spoofing tactic, making it appear as though the user was clicking a genuine booking.com URL contained within the email message. The Tinyurl redirect was also attempt to obfuscate the final URL redirect.    

Clicking the Tinyurl link redirected to the URL `  hxxps[:]//booking.eu-apt-booking[.]homes/property-aid-63785823-label-gen-832513841233/691886813`, which is the final stage URL of the redirect that hosted the fake property rental.

This website had a domain similar [www.booking.com](http://www.booking.com/) that was registered only a few days prior to the attack, and replicated all the assets of the original booking.com website.

By following the prompts on the fake websites, the victim can reserve the accommodation. After doing so, they are redirected to a page on the attacker-controlled website with payment details and will receive an automatic email from the sender `booking[@]invitations-booking[.]com` with a fake invoice, purportedly from booking.com. In both cases, the payment details allegedly belong to booking.com, but in reality are associated with an attacker-controlled bank account. To maintain the illusion of legitimacy, the fake invoice dynamically included  all details associated with the booking, including specified dates and the name and contact details submitted when “booking” the property.

Breakdown of Technical Methods

  1. Domain Mimicking: The attackers registered a domain name that closely resembled the legitimate Booking.com URL. They opted for “booking.eu-apt-booking.homes,” which, at a glance, appears authentic, especially to unsuspecting users. The choice of a domain with regional nuances (like “eu”) can add a veneer of legitimacy given that booking.com was founded and is headquartered in Europe.
  2. SSL Certificates: To further deceive victims, the threat actors used SSL certificates to enable HTTPS, making the spoofed site appear secure and legitimate. Users often equate the padlock symbol with safety, which helps the fake site avoid suspicion.
  3. Site Cloning: The attackers likely used web scraping tools to copy the HTML, CSS, and JavaScript of the legitimate Booking.com site. This method allows them to create an exact visual replica. They also cloned the site’s layout, fonts, images, reviews for listings, and functionality, ensuring the counterfeit site looks and feels identical to the original.
  4. Interactive Elements: To enhance the illusion, the fake site included interactive elements such as buttons and links that mimic the behaviour of the real Booking.com site. These elements all redirected users to the actual Booking.com site.

Security Recommendations

Organisations can protect themselves from this campaign via a combination of technical security controls and user awareness training.- Organisations should provide security training to internal staff on how to spot spoofed websites and verify the authenticity of websites.

Attributes to look out for include:  

  • Domain misalignment: The web page you are browsing has a different URL to the genuine platform. For example, a website claiming to be booking.com, but is not hosted on a www.booking.com domain. Spoofed websites may have URLs that are slightly different from the legitimate website. Look for misspellings, additional words, or variations in the domain name.  
  • A webpage with dummy links: This is when links on the websites either do not work, or all redirect to a website hosted on a different website. For example, when the links in the footer section all redirect to the same target page or do not work when clicking.
  • Website content: Includes grammatical errors, unusual phrasing, or poor language quality, which can be indications of a spoofed website.- Organisations and their clients should be wary of listings offering rental prices that appear too good to be true, as this is often a tactic employed by scammers.- Verify that the requested form of payment is consistent with those offered by the alleged provider.

From a technical control perspective, Fortian recommends:

  • Configuring web content filtering policies via endpoint detection and response (EDR) software, perimeter firewalls, or web proxies, to block connections to newly-registered and parked domains. Many phishing and fraudulent websites are hosted on newly-registered domains to evade detection from antivirus and EDR software, as these websites have not been online long enough to accumulate a bad reputation. Once the site has been identified by security vendors or frequently reported as fraudulent, threat actors will typically take down the website and re-host it on a different domain. Blocking all connections to newly registered domains will help protect against fraudulent websites.
  • Ensuring Safe link settings are configured in Defender to ensure real-time evaluation of links.

Conclusion

This fake rental properties campaign highlights the evolving tactics of cybercriminals, who are becoming increasingly adept at creating convincing fraudulent schemes. The use of spoofed websites, social engineering, and the exploitation of trusted platforms like Facebook Marketplace and Booking.com illustrate the need for heightened vigilance and education among potential victims. Users should always verify the authenticity of property listings, scrutinize URLs, and be wary of unrealistic offers. By understanding the latest tactics employed by threat actors, individuals and organisations can better protect themselves from falling victim.

Indicator

Type

Description

andrew.luke342[@]gmail[.]com

Email address

Email address used in the initial email discussion between the threat actor and the victim. This email address provided the malicious link directing the victim to the attacker-controlled website

booking[@]invitations-booking[.]com

Email address

Email address that sent the automatically-generated invoice after booking the apartment.

https://tinyurl[.]com/2y7ess82

URL

Stage one malicious link

https://booking.eu-apt-booking[.]homes/property-aid-63785823-label-gen-832513841233/691886813

URL

Final stage malicious website hosting the fake property listing.

CONTACT US

Speak with a Fortian Security Specialist

Request a consultation with one of our security specialists today.

Get in touch