Monday, May 19, 2025
Homecyber securityCybercriminals Trick Tenants into Sending Rent to Fraudulent Accounts

Cybercriminals Trick Tenants into Sending Rent to Fraudulent Accounts

Published on

SIEM as a Service

Follow Us on Google News

Proofpoint, a leading cybersecurity firm, has identified and named a new financially motivated Business Email Compromise (BEC) threat actor, dubbed TA2900, actively targeting individuals in France and occasionally Canada.

This actor employs sophisticated social engineering tactics, sending French-language emails centered around rental payment scams to deceive victims into transferring funds to attacker-controlled accounts.

These campaigns typically involve messages claiming that a rental installment for the recipient’s property has not been received, urging immediate payment to a new bank account provided via International Bank Account Number (IBAN) details.

- Advertisement - Google News

According to the Report, Proofpoint researchers have tracked nearly two dozen unique IBANs across more than 50 campaigns, noting that the actor frequently switches accounts after two to three uses to evade detection.

Sophisticated Tactics and Social Engineering Exploits

TA2900’s emails often originate from compromised mailboxes, primarily from educational institutions worldwide, adding a veneer of legitimacy to their fraudulent communications.

Fraudulent Accounts

Subject lines such as “Loyer” (Rent) or “Nouveau RIB” (New Bank Identity Statement) are commonly used to prompt urgency.

The messages either include IBAN details directly in the email body or attachments, or instruct victims to reply for updated banking information, thus initiating direct communication with the attacker via freemail services like Gmail or Outlook.

Fraudulent Accounts
TA2900 Message examples including IBAN and BIC numbers. 

Early campaigns featured PDF attachments with branding like “Gestion locative de bien immobilier” (Rental Property Management) to mimic legitimate correspondence, though their use has decreased since late 2024.

The bank accounts tied to these scams are often associated with low-cost branches of major French financial institutions, further enhancing the illusion of authenticity.

Proofpoint suggests that the unusual phrasing in some emails may indicate the use of generative AI or translation tools, hinting that the actor might not be fluent in French or based in a French-speaking region.

The core of TA2900’s strategy lies in exploiting human emotion through social engineering, crafting messages that induce anxiety over unpaid rent to provoke hasty responses.

This tactic often leads recipients to overlook red flags, such as verifying the sender’s identity or the legitimacy of the provided bank details.

Proofpoint assesses with high confidence that TA2900’s primary goal is financial theft, leveraging knowledge of France’s rental payment processes and possibly specific property details to target victims effectively.

This underscores the importance of pausing to evaluate any urgent financial request received via email or other messaging platforms, as emotional manipulation remains a cornerstone of BEC fraud.

Below is a table of Indicators of Compromise (IOCs) associated with TA2900’s reply-to email addresses, providing critical data for organizations to bolster their defenses against this emerging threat.

Indicators of Compromise (IOCs)

IndicatorDescriptionFirst Seen
bureaugestionetcomptabilite@outlook[.]frTA2900 Reply-to Email2024-07-20
compta[.]gestionimmo@yahoo[.]comTA2900 Reply-to Email2025-01-17
comptable[.]gestion[.]locative3@gmail[.]comTA2900 Reply-to Email2024-07-20
comptable[.]gestion58@yahoo[.]comTA2900 Reply-to Email2025-03-18
gestion[.]locative[.]immo@outlook[.]frTA2900 Reply-to Email2024-07-29
gestion[.]locative310@gmail[.]comTA2900 Reply-to Email2024-10-12
gestionimmo@mail[.]frTA2900 Reply-to Email2024-11-20
gestionimmobilier060@gmail[.]comTA2900 Reply-to Email2025-01-24
gestionimmolocative862@gmail[.]comTA2900 Reply-to Email2025-03-12
gestionimolocative@gmail[.]comTA2900 Reply-to Email2024-09-25
infogestionlocative897@gmail[.]comTA2900 Reply-to Email2024-11-20
kaufmanbroad278@gmail[.]comTA2900 Reply-to Email2025-01-24
lgestion283@googlemail[.]comTA2900 Reply-to Email2024-09-24
Gestion_immo_loyer.@hotmail.comTA2900 Reply-to Email2025-03-25

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known...

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known...

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...