- La colaboración entre Seguridad y FinOps puede generar beneficios ocultos en la nube
- El papel del CIO en 2024: una retrospectiva del año en clave TI
- How control rooms help organizations and security management
- ITDM 2025 전망 | “효율경영 시대의 핵심 동력 ‘데이터 조직’··· 내년도 활약 무대 더 커진다” 쏘카 김상우 본부장
- 세일포인트 기고 | 2025년을 맞이하며… 머신 아이덴티티의 부상이 울리는 경종
Booking.com Customers Targeted in Major Phishing Campaign
Booking.com users have become the focus of a new, large-scale phishing campaign. Discovered by Perception Point and discussed in an advisory published on Wednesday, the campaign follows a methodical four-step process.
To initiate their scheme, the attackers gain unauthorized access to hotel systems, effectively taking control of the hotel’s Booking.com account. This initial breach sets the stage for their subsequent actions.
Once in control of the Booking.com account, the attackers extract the personal data of hotel guests. This includes names, booking dates, hotel details and partial payment methods.
In the third phase, the attackers utilize the stolen data to craft messages designed to play on the fears and urgency of potential victims. Guests are alerted that their bookings are at risk of cancellation within 24 hours unless they promptly provide their credit card details under the guise of a verification “test.”
In the final step, the attackers lead their victims to a phishing page that mimics Booking.com, Perception Point explained. This fraudulent page comes pre-filled with victims’ personal information, and the deceptive URL further adds to the confusion. Here, victims are prompted to re-enter their credit card or bank information, unknowingly providing it to the attackers.
Research conducted by the security firm highlighted the extensive reach of this issue, affecting hotels and resorts on a global scale. The financial losses stemming from these attacks can be substantial, and concerns regarding trust breaches and potential data misuse remain prevalent.
The security team warned that the Booking.com phishing attack may be part of a larger pattern, as observed in a previous InfoStealer campaign that targeted hotels and travel agencies.
Recommendations for users include thorough scrutiny of URLs, caution regarding urgent requests, contacting service providers directly, sharing knowledge about phishing and vigilant monitoring of accounts for any unauthorized transactions.
Editorial image credit: Burdun Iliya / Shutterstock.com