Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/20/2018
12:50 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Real Estate Industry Remains Rich Target for Cybercrime

Trojans, file downloaders, stolen credentials, and BEC scams, hitting the real estate sector.

The real estate industry has been a fertile sector for online fraudsters for a decade or more – and recent research says the scams have increased exponentially. 

In a public service announcement released on July 12, the FBI Internet Crime Complaint Center (IC3) reported that the real estate industry has become especially susceptible to business email compromises (BECs) and email account compromises (EACs).

The attacks impact all levels of the industry, including title companies, law firms, real estate agents, and home buyers and sellers. In the past year, the highest victim losses reported in one month came in September 2017 at $18 million.

Meanwhile, new research from Proofpoint underscores the threats to the real estate industry. "The fraudsters prey on people's good nature and desire to get business done," says Sherrod DeGrippo, director, emerging threats at Proofpoint, which published a blog last week that outlines the major security threats facing the real estate industry.

DeGrippo adds that real estate transactions typically include electronic signatures, countless exchanges of documents via email, and a variety of interactions with potentially unfamiliar contacts. And, of course, there's also a lot of money involved.

"When a real estate person holds a 20% down payment, that can be thousands, possibly millions of dollars," DeGrippo points out.

Jessica Edgerton, executive vice president of operations and corporate counsel at Leading Real Estate Companies of the World, says the real estate industry has been fighting these battles for many years.

"Part of the problem is that the modern real-estate deal is a complex transaction involving a large number of number of parties, all of whom are sending sensitive information via electronic means," Edgerton says. "More players and more electronic communications mean more potential holes for the fraudsters to sneak in. And the stakes are high. A home is the biggest purchase of most people’' lives.

"Down payments are significant chunks of money, so real estate-targeted wire fraud is a lucrative business, there's no doubt about it," she says.

Proofpoint's DeGrippo says the five top threats the real estate industry and potential home buyers face are:

  • Banking trojans: Malware that gets in between the user and an online banking session. Once they have the user's credentials they can potentially steal the total amount of the transaction.
  • File downloaders: Threat actors will send an email with an attachment or link and as soon as the user clicks on it the criminal gains access to the user’s machine. From there they can either steal valuable files from a machine or infect the computer with additional malware or ransomware. One of the most common methods: via an attachment that requires the user to enable macros or content within Microsoft Word, which allows the downloader malware to pull other kinds of malware onto the machine.
  • Information stealers: The criminal gains access to the victim’s machine via installed stealer malware. Once that gets installed on a victim's machine, the attacker can steal passwords stored in a browser or sensitive documents stored on the machine, including documents such as W2s or other tax files.
  • Corporate credential phishing: Here the hackers leverage a corporate brand to lure the user into clicking on a phish. In the real estate industry, bad threat actors often use the DocuSign logo fraudulently to get unwitting users to click on what seems to be a legitimate transaction.
  • Consumer credential phishing: Attackers will use common home buying and consumer brands that frequently send notification-style emails, including Amazon and Facebook, to lure homebuyers into making fraudulent transactions.   

Gad Naveh, advanced threat prevention evangelist at CheckPoint Software Technologies, says real estate companies should start by keeping their business employees aware of the fraud problem in the real estate industry.

"Companies also need to have protection at their endpoints," Naveh says. "There are ways today to recognize if people are reusing their passwords. Companies can use tools to set policies for their business users not to reuse the passwords."

Brokerages should consider educating sales agents and office managers about cybersecurity best practices, Edgerton says, and that agents should educate home buyers about the potential for transaction-based fraud. And home buyers should always pick up the phone and call the real estate office before wiring money to verify that the instructions are correct.

"Legitimate businesses are not going to send home buyers a link to verify their credentials," she says.

As for the ongoing DocuSign scam in which home buyers are being lured to click on websites with fake DocuSign logos, she says unless users are absolutely sure of the sender, "don't click on anything in a notification email. Instead, go to the DocuSign website and click on the 'access documents' link in the top right corner. You can enter the code you received there without risk."

Related Content:

Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
CourseworkCamp
50%
50%
CourseworkCamp,
User Rank: Apprentice
8/21/2018 | 7:04:30 AM
Anna
Illustrious Bank of Canada machine learning analyst and Terbium Labs boss researcher examine how they utilize insight about the checking business sector to foresee the Coursework Writing Services UK following installment card misrepresentation casualties. Google's most recent cloud security rollouts incorporate early arrivals of its cloud-facilitated security module and a holder security instrument to check marked pictures.
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16531
PUBLISHED: 2019-09-20
LayerBB before 1.1.4 has multiple CSRF issues, as demonstrated by changing the System Settings via admin/general.php.
CVE-2019-9717
PUBLISHED: 2019-09-19
In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf.
CVE-2019-9719
PUBLISHED: 2019-09-19
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
CVE-2019-9720
PUBLISHED: 2019-09-19
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
CVE-2019-16525
PUBLISHED: 2019-09-19
An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code.