Fake Booking.com phish uses fake CAPTCHAs to trick hotel staff into downloading malware

3 days ago 12
BOOK THIS SPACE FOR AD
ARTICLE AD

Close up of screen showing booking.com website

A new phishing campaign that uses the fake CAPTCHA websites we reported about recently is targeting hotel staff in a likely attempt to access customer data, according to research from ThreatDown.

Here’s how it works: Cybercriminals send a fake Booking.com email to a hotel’s email address, asking them to confirm a booking.

Fake Booking email

“Dear Team,

You have received a new booking. Please find the details below:

Reservation number: 5124588434141

Guest Name: Margit Kainz

Check-in Date: 2025-03-25

Check-out Date: 2025-04-01

Room Type: Deluxe Double Room

Guests: 2 Adults

Special Requests:Early check-in requested (before 2 PM)

Payment Status: Payment at property

{link to landing page}

(Copy and paste this link in your browser to confirm booking)

Please ensure the room is prepared according to the guest’s requests.

If you have any questions or need more information, please contact the guest directly or through our platform.

Thank you for your cooperation,

The Booking.com Team”

The email is sent only a few days before the check-in-date, which is very likely to create a sense of urgency—a common tactic of scammers.

But if the hotel staff were to copy and paste the URL into the browser address bar they will be greeted by this fake CAPTCHA website.

Robot or Human?

When they check the box, they’ll then see “verification” instructions that will effectively infect their system.

Instructions that will infect your system

“Verification steps

Press Windows Key + R.

Press Ctrl + V.

Press Enter”

As we explained in more detail here, these instructions will infect their Windows system with an information stealer or Trojan.

What the hotel staff would actually be doing is copy and pasting a mshta command into the Run prompt and then executing the command, which then fetches a remote file and then runs it on their system.

We don’t know the exact plans of the criminals once they have gained control over the system, but it’s highly likely they’re after customer payment details and other personal data: Data that is very valuable to them and can be traded on the dark web.

There isn’t much you can do to protect your own data in situations like these, when cybercriminals are attacking the companies that hold your personal information. However, there are a few things you can do to lower your risk.

How to protect your data online

Don’t store your card details. Not in your browser, not on websites. Sure, it’s more convenient to get sites to remember your card details for you, but we highly recommend not storing that information. Find out what information is already out there. Our free Digital Footprint scan searches the dark web, social media, and other online sources, to tell you where your data has been exposed. Remove as much of that information as you can. You can do this manually by cleaning things up yourself, or if you’re in the US then you can use Malwarebytes Personal Data Remover to do it for you. Monitor your accounts. Check your accounts periodically for unexpected changes and notifications of suspicious login attempts. Use a different password for every online account. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you. Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished. Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after.
Read Entire Article