Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Airline-mimicking fraud | Kaspersky official blog

0
Medium
Phishing
Published: Wed Oct 08 2025 (10/08/2025, 11:00:25 UTC)
Source: Kaspersky Security Blog

Description

Scammers are sending emails purporting to be from major airlines/airports trying to swindle money by demanding refundable deposits.

AI-Powered Analysis

AILast updated: 10/08/2025, 11:08:35 UTC

Technical Analysis

This threat involves a sophisticated phishing campaign where attackers impersonate employees of major airlines and airports such as Amsterdam Schiphol, Emirates Airlines, Etihad Airways, Lufthansa, and Qatar Airways. The attackers send initial emails announcing a new partnership program, aiming to engage recipients in a seemingly legitimate business dialogue. Following initial contact, they provide fabricated but plausible documents like registration forms and non-disclosure agreements to build trust. These emails do not contain malicious attachments or links, making them harder to detect with traditional security tools. The core of the scam is a request for a refundable deposit, typically several thousand dollars, purportedly to secure a priority spot for partnership consideration. The attackers promise to refund the deposit once the partnership is finalized, exploiting the victim's desire for business opportunities. The campaign also extends to companies in the oil and gas sector, indicating a broad targeting strategy. Detection relies on scrutinizing sender email domains against official company domains and recognizing the unusual business practice of requiring deposits. The scam leverages social engineering without technical exploits, making it a challenge for automated defenses. The campaign has been active since September 2025, with thousands of emails detected and blocked by Kaspersky's solutions. The threat highlights the importance of verifying unsolicited business proposals through official channels and maintaining high employee awareness, especially in finance, sales, and procurement departments.

Potential Impact

For European organizations, this phishing campaign poses a significant financial risk through fraudulent money transfers. Companies engaged in procurement, sales, or partnerships with airlines, airports, or related sectors may be targeted, potentially leading to direct monetary losses. The social engineering nature of the attack can also erode trust within business communications and damage reputations if fraudulent transactions become public. Small and medium enterprises may be particularly vulnerable due to less mature security awareness and controls. The absence of malware or technical exploits means traditional endpoint protections offer limited defense, increasing reliance on human vigilance and email security gateways. Additionally, the campaign's use of well-known European airline brands increases the likelihood of targeting organizations within Europe, potentially disrupting legitimate business operations and causing financial and operational setbacks. The psychological impact on employees and the potential for follow-up attacks exploiting compromised trust relationships also represent secondary risks.

Mitigation Recommendations

Implement advanced email filtering solutions at the corporate gateway that can detect and quarantine phishing attempts based on sender domain anomalies and suspicious content patterns. Conduct targeted security awareness training for finance, procurement, and sales teams emphasizing the identification of social engineering tactics, especially unusual payment requests and verification procedures. Establish strict internal protocols requiring independent verification of unsolicited partnership offers by contacting companies through official channels listed on their verified websites. Deploy multi-factor authentication and strict access controls for financial transaction approvals to prevent unauthorized fund transfers. Encourage a culture of skepticism towards unsolicited business proposals involving upfront payments, and maintain updated contact lists of legitimate partners to cross-check suspicious communications. Utilize automated security awareness platforms, such as Kaspersky's Automated Security Awareness Platform, to provide continuous and measurable employee training. Regularly review and update incident response plans to include procedures for handling suspected phishing fraud. Monitor financial transactions for unusual patterns that may indicate fraudulent activity related to such scams.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/airline-brands-scheme/54539/","fetched":true,"fetchedAt":"2025-10-08T11:08:22.712Z","wordCount":1062}

Threat ID: 68e646267ee77265a9118015

Added to database: 10/8/2025, 11:08:22 AM

Last enriched: 10/8/2025, 11:08:35 AM

Last updated: 10/9/2025, 11:52:10 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats