Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

November 9, 2025

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

November 9, 2025

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

November 9, 2025
Facebook X (Twitter) Instagram
Sunday, November 9
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»“I Paid Twice” Phishing Campaign Targets Booking.com
News

“I Paid Twice” Phishing Campaign Targets Booking.com

Team-CWDBy Team-CWDNovember 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A large-scale phishing operation exploiting Booking.com partner accounts has been uncovered by cybersecurity experts

The latest Sekoia.io report, published today, detailed how cybercriminals compromised hotel systems and customer data through a sophisticated malware campaign active since at least April 2025.

The intrusion began when attackers sent malicious emails from legitimate hotel accounts or impersonated Booking.com. Each message contained a link leading victims through a redirection chain before launching the so-called ClickFix social engineering tactic.

Victims were prompted to execute a PowerShell command that downloaded malware, ultimately infecting systems with the PureRAT remote access Trojan.

PureRAT allows attackers to remotely control infected machines, steal credentials, capture screenshots and exfiltrate sensitive data. Its modular design enables the addition of plugins for expanded capabilities.

Analysts believe the malware initially targeted hotel staff to steal login credentials for booking platforms such as Booking.com, Airbnb and Expedia. These credentials were then either sold on cybercrime forums or used directly in fraudulent schemes.

Read more on phishing campaigns targeting the hospitality industry: Data on Half a Million Hotel Guests Exposed After Otelier Breach

Once in possession of partner credentials, threat actors contacted hotel guests via email or WhatsApp, claiming issues with banking verification.

Messages included authentic booking details, increasing their credibility. Victims were directed to fake Booking.com pages designed to harvest payment information. These sites, hosted behind Cloudflare protection and linked to Russian infrastructure, mimicked legitimate layouts to avoid detection.

Sekoia.io analysts also observed an active trade in Booking.com credentials on Russian-language forums. Access details for these accounts (sold as authentication cookies or login pairs) ranged from $5 to $5,000, depending on value.

One user, “moderator_booking,” allegedly claimed over $20m in profits. Attackers have since expanded operations to include Agoda accounts.

The campaign demonstrates the growing professionalization of cybercrime targeting hospitality businesses.

“We assess with high confidence that the client who fell victim to this fraudulent scheme paid twice for his reservation: once at the hotel and once to the cybercriminal,” Sekoia.io wrote.

“Unveiling the adversary infrastructure revealed hundreds of malicious domains active for several months as of October 2025, demonstrating a resilient and likely profitable campaign.” 

The firm added it continues to monitor adversary infrastructure and improve detection methods to help protect booking platforms and their customers.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRussian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics
Next Article Ghost Identities, Poisoned Accounts, & AI Agent Havoc
Team-CWD
  • Website

Related Posts

News

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

November 9, 2025
News

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

November 9, 2025
News

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

November 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Why you should never pay to get paid

September 15, 2025

How chatbots can help spread scams

October 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.