Phishing Campaign Uses Fake Booking.com Emails to Deliver Malware


A widespread phishing campaign spoofing Booking.com has been observed targeting the hospitality industry with malicious emails that trick recipients into downloading malware, according to researchers at Cofense Intelligence.

These attacks use a deceptive CAPTCHA system known as ClickFix, which coaxes victims into running malicious scripts on their Windows devices.

Malware Surge Tied to Booking.com Spoofs

Active since November 2024, the campaign peaked in March 2025, accounting for 47% of its total activity.

Emails impersonating Booking.com were sent requesting hotel staff to respond to guest issues or confirm reservations. Embedded in these messages was a link to a counterfeit CAPTCHA page that initiated a malware download.

ClickFix pages prompt users to complete “verification steps” that involve copying and executing a script through Windows shortcuts. These scripts typically install remote access Trojans (RATs) or information stealers.

According to Cofense Intelligence, most payloads are RATs, with 53% delivering XWorm RAT. Other common malware include Pure Logs Stealer and DanaBot.

New Tactics Exploit User Trust

More recent phishing emails in this campaign included:

  • Threats of reputational damage with urgent 24-hour deadlines

  • Details about fabricated guest reservations requesting early check-in or specific amenities

  • Fake confirmations urging staff to respond via a malicious link

Some versions have even mimicked cookie consent banners, where clicking “Accept” initiates a malware download.

Additionally, Cloudflare-style CAPTCHAs have been used, though they remain less common.

Read more on cybersecurity threats targeting the hospitality industry: Hospitality Industry Faces New Password-Stealing Malware

The malware targets only Windows users. ClickFix websites detect the browser’s User-Agent and warn users accessing the link from non-Windows systems that the site is incompatible. This ensures that only vulnerable platforms are exposed to the payload.

How ClickFix Works

ClickFix represents a shift in phishing methodology. Instead of downloading a file directly, the user unknowingly runs a malicious script themselves in a three-step process:

  1. The CAPTCHA page places a hidden script in the clipboard

  2. Victims are instructed to open the Windows Run command

  3. The script is pasted and executed, launching the malware

In some cases, the scripts disguise themselves further by ending in what appears to be a verification code, concealing the script’s true purpose.

Cofense Intelligence notes that while 75% of these campaigns used Booking.com branding, variants spoofing Cloudflare and other services have been observed.

The campaign’s evolution and high success rate make it a growing concern for organizations in the accommodation and food services sector.

Image credit: AlexandraPopova / Shutterstock.com



Source link

Leave a Comment