Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/20/2018
12:50 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Real Estate Industry Remains Rich Target for Cybercrime

Trojans, file downloaders, stolen credentials, and BEC scams, hitting the real estate sector.

The real estate industry has been a fertile sector for online fraudsters for a decade or more – and recent research says the scams have increased exponentially. 

In a public service announcement released on July 12, the FBI Internet Crime Complaint Center (IC3) reported that the real estate industry has become especially susceptible to business email compromises (BECs) and email account compromises (EACs).

The attacks impact all levels of the industry, including title companies, law firms, real estate agents, and home buyers and sellers. In the past year, the highest victim losses reported in one month came in September 2017 at $18 million.

Meanwhile, new research from Proofpoint underscores the threats to the real estate industry. "The fraudsters prey on people's good nature and desire to get business done," says Sherrod DeGrippo, director, emerging threats at Proofpoint, which published a blog last week that outlines the major security threats facing the real estate industry.

DeGrippo adds that real estate transactions typically include electronic signatures, countless exchanges of documents via email, and a variety of interactions with potentially unfamiliar contacts. And, of course, there's also a lot of money involved.

"When a real estate person holds a 20% down payment, that can be thousands, possibly millions of dollars," DeGrippo points out.

Jessica Edgerton, executive vice president of operations and corporate counsel at Leading Real Estate Companies of the World, says the real estate industry has been fighting these battles for many years.

"Part of the problem is that the modern real-estate deal is a complex transaction involving a large number of number of parties, all of whom are sending sensitive information via electronic means," Edgerton says. "More players and more electronic communications mean more potential holes for the fraudsters to sneak in. And the stakes are high. A home is the biggest purchase of most people’' lives.

"Down payments are significant chunks of money, so real estate-targeted wire fraud is a lucrative business, there's no doubt about it," she says.

Proofpoint's DeGrippo says the five top threats the real estate industry and potential home buyers face are:

  • Banking trojans: Malware that gets in between the user and an online banking session. Once they have the user's credentials they can potentially steal the total amount of the transaction.
  • File downloaders: Threat actors will send an email with an attachment or link and as soon as the user clicks on it the criminal gains access to the user’s machine. From there they can either steal valuable files from a machine or infect the computer with additional malware or ransomware. One of the most common methods: via an attachment that requires the user to enable macros or content within Microsoft Word, which allows the downloader malware to pull other kinds of malware onto the machine.
  • Information stealers: The criminal gains access to the victim’s machine via installed stealer malware. Once that gets installed on a victim's machine, the attacker can steal passwords stored in a browser or sensitive documents stored on the machine, including documents such as W2s or other tax files.
  • Corporate credential phishing: Here the hackers leverage a corporate brand to lure the user into clicking on a phish. In the real estate industry, bad threat actors often use the DocuSign logo fraudulently to get unwitting users to click on what seems to be a legitimate transaction.
  • Consumer credential phishing: Attackers will use common home buying and consumer brands that frequently send notification-style emails, including Amazon and Facebook, to lure homebuyers into making fraudulent transactions.   

Gad Naveh, advanced threat prevention evangelist at CheckPoint Software Technologies, says real estate companies should start by keeping their business employees aware of the fraud problem in the real estate industry.

"Companies also need to have protection at their endpoints," Naveh says. "There are ways today to recognize if people are reusing their passwords. Companies can use tools to set policies for their business users not to reuse the passwords."

Brokerages should consider educating sales agents and office managers about cybersecurity best practices, Edgerton says, and that agents should educate home buyers about the potential for transaction-based fraud. And home buyers should always pick up the phone and call the real estate office before wiring money to verify that the instructions are correct.

"Legitimate businesses are not going to send home buyers a link to verify their credentials," she says.

As for the ongoing DocuSign scam in which home buyers are being lured to click on websites with fake DocuSign logos, she says unless users are absolutely sure of the sender, "don't click on anything in a notification email. Instead, go to the DocuSign website and click on the 'access documents' link in the top right corner. You can enter the code you received there without risk."

Related Content:

Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
CourseworkCamp
50%
50%
CourseworkCamp,
User Rank: Apprentice
8/21/2018 | 7:04:30 AM
Anna
Illustrious Bank of Canada machine learning analyst and Terbium Labs boss researcher examine how they utilize insight about the checking business sector to foresee the Coursework Writing Services UK following installment card misrepresentation casualties. Google's most recent cloud security rollouts incorporate early arrivals of its cloud-facilitated security module and a holder security instrument to check marked pictures.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4019
PUBLISHED: 2020-06-01
The file editing functionality in the Atlassian Companion App before version 1.0.0 allows local attackers to have the app run a different executable in place of the app's cmd.exe via a untrusted search path vulnerability.
CVE-2020-4020
PUBLISHED: 2020-06-01
The file downloading functionality in the Atlassian Companion App before version 1.0.0 allows remote attackers, who control a Confluence Server instance that the Companion App is connected to, execute arbitrary .exe files via a Protection Mechanism Failure.
CVE-2020-4021
PUBLISHED: 2020-06-01
Affected versions are: Before 8.5.5, and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the XML export view.
CVE-2020-4023
PUBLISHED: 2020-06-01
The review coverage resource in Atlassian Fisheye and Crucible before version 4.8.2 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the committerFilter parameter.
CVE-2020-4013
PUBLISHED: 2020-06-01
The review resource in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the review objectives.