{"id":2277,"date":"2010-02-16T13:21:56","date_gmt":"2010-02-16T20:21:56","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=2277"},"modified":"2018-01-30T12:34:31","modified_gmt":"2018-01-30T19:34:31","slug":"phishing-scampaign-targets-frequent-fliers","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/02\/16\/phishing-scampaign-targets-frequent-fliers\/","title":{"rendered":"Phishing Campaign Targets Frequent Fliers"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2005.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/02\/16\/phishing-scampaign-targets-frequent-fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2015.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F02%2F16%2Fphishing-scampaign-targets-frequent-fliers&amp;title=Phishing%20Campaign%20Targets%20Frequent%20Fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2025.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F02%2F16%2Fphishing-scampaign-targets-frequent-fliers&amp;title=Phishing%20Campaign%20Targets%20Frequent%20Fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2035.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F02%2F16%2Fphishing-scampaign-targets-frequent-fliers&amp;title=Phishing%20Campaign%20Targets%20Frequent%20Fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2045.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F02%2F16%2Fphishing-scampaign-targets-frequent-fliers&amp;title=Phishing%20Campaign%20Targets%20Frequent%20Fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2055.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F02%2F16%2Fphishing-scampaign-targets-frequent-fliers&amp;Title=Phishing%20Campaign%20Targets%20Frequent%20Fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2065.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Phishing%20Campaign%20Targets%20Frequent%20Fliers+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F02%2F16%2Fphishing-scampaign-targets-frequent-fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2075.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2010%2F02%2F16%2Fphishing-scampaign-targets-frequent-fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2085.png\" \/><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F02%2F16%2Fphishing-scampaign-targets-frequent-fliers&amp;t=Phishing%20Campaign%20Targets%20Frequent%20Fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Furl\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2095.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F02%2F16%2Fphishing-scampaign-targets-frequent-fliers&amp;h=Phishing%20Campaign%20Targets%20Frequent%20Fliers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2105.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2115.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_spam_blogpost.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-2280\" title=\"20100216-aa_spam_blogpost_crop3\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_spam_blogpost_crop3.jpg\" width=\"414\" height=\"87\" \/><\/a>A variation of a phishing scam aimed at members of <strong>American Airlines&#8217; AAdvantage<\/strong> program is circulating again. With links to a phishing Web site embedded in a spam message, the scampaign promises (in characteristically broken English) that all participants in a survey will receive, depending on the campaign, either $100, or &#8220;$50 &amp; 25,000 miles&#8221; credited to their account.<\/p>\n<p>The spam messages are appearing not only <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_spamemail.jpg\" target=\"_blank\">in email inboxes<\/a>, but also as posts on what appear to be <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_spam_blogpost.jpg\" target=\"_blank\">compromised blogs<\/a>. The messages usually include the following text, signed by &#8220;<strong>American Airlines Reward Department<\/strong>,&#8221; obvious errors and all:<\/p>\n<blockquote><p>We are proud to inform you that today (current date) AmericanAirlines.com launch a new reward program. Please log in to your American Airlines account and take the 5 questions survey. For your effort you will be rewarded with &#8230;<\/p><\/blockquote>\n<p>It&#8217;s also amusing to note that the fraudsters have had to periodically raise the bar on what they&#8217;re offering. In the earliest iterations of this scheme, dating back to autumn 2008, they only offered $50&#8230;no miles included. Even in this tough economy, a fraudulent offer of merely $50 isn&#8217;t good enough to snare dupes anymore. <span style=\"text-decoration: line-through;\">Suckers<\/span> Customers can be so demanding!<\/p>\n<p><!--more--><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_bonuscode.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2283\" title=\"20100216-aa_bonuscode_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_bonuscode_crop.jpg\" width=\"694\" height=\"22\" \/><\/a><\/p>\n<p>The spam messages tell recipients to click a link and enter a &#8220;Bonus Code&#8221; in order to participate in the survey. The Bonus Code,<strong> AA-1028917109<\/strong>, is hard-coded into the page.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_addressform.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2290\" title=\"20100216-aa_addressform_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_addressform_crop.jpg\" width=\"222\" height=\"181\" \/><\/a><\/p>\n<p>The site proceeds to ask victims to provide full details of their AAdvantage account, address, credit cards, drivers license, social security numbers, mother&#8217;s maiden name, and the rest of the stuff that would essentially permit the operators of the scam to freely abuse a victim&#8217;s financial accounts. Be sure to enter the proper salutation, Bro.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_bonuscode_formpage.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2286\" title=\"20100216-aa_bonuscode_formpage_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_bonuscode_formpage_crop.jpg\" width=\"331\" height=\"107\" \/><\/a><\/p>\n<p>Airlines haven&#8217;t exactly been swimming in cash lately, so I doubt they&#8217;re willing to pay $50 to $100 per head for a survey as rudimentary as <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/02\/20100216-aa_bonuscode_fullpage.jpg\" target=\"_blank\">the one the scammers are touting<\/a>. Looks like another instance of &#8220;if it seems too good to be true, it probably is.&#8221;<\/p>\n<p><a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n<p><em>Tip &#8216;o the hat to the folks at <a href=\"http:\/\/www.flyertalk.com\/forum\/american-aadvantage\/860681-fake-aa-e-mail-warning-phishing-malware-spoofs-etc-consolidated-4.html\" target=\"_blank\">Flyertalk<\/a>! <\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A variation of a phishing scam aimed at members of American Airlines&#8217; AAdvantage program is circulating again. With links to a phishing Web site embedded in a spam message, the scampaign promises (in characteristically broken English) that all participants in a survey will receive, depending on the campaign, either $100, or &#8220;$50 &amp; 25,000 miles&#8221; [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17051,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4263,7355,7349,7353,3673,7351,7347,7345,3881,6675,3539,4441,7357,5573,4371,3675,6807,7241,4251,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2277"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=2277"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2277\/revisions"}],"predecessor-version":[{"id":19141,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2277\/revisions\/19141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17051"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=2277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=2277"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=2277"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=2277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}