Monday, March 17, 2025
HomeCyber AttackOngoing Cyber Attack Mimic Booking.com to Spread Password-Stealing Malware

Ongoing Cyber Attack Mimic Booking.com to Spread Password-Stealing Malware

Published on

SIEM as a Service

Follow Us on Google News

Microsoft Threat Intelligence has identified an ongoing phishing campaign that began in December 2024, targeting organizations in the hospitality industry by impersonating the online travel agency Booking.com.

The campaign, tracked as Storm-1865, employs a sophisticated social engineering technique called ClickFix to deliver credential-stealing malware designed to conduct financial fraud and theft.

A sample phishing email, purporting to be from a prospective guest.

This attack specifically targets hospitality organizations across North America, Oceania, South and Southeast Asia, and various European regions, focusing on individuals likely to work directly with Booking.com.

As of February 2025, the campaign remains active and continues to evolve its tactics to bypass conventional security measures.

Another sample phishing email, purportedly requiring the recipient to address negative feedback about a hotel.
Another sample phishing email, purportedly requiring the recipient to verify their Booking.com account.

Deceptive Tactics Target Hospitality Staff Through Fraudulent Communications

The Storm-1865 threat actors have developed a methodical approach to infiltrating hospitality organizations by first identifying potential targets within these businesses who are likely to interact with Booking.com as part of their regular duties.

The attackers then craft malicious emails that impersonate the travel platform, with message content varying widely to increase the chances of engagement.

These fraudulent communications reference scenarios that would concern hospitality staff, including negative guest reviews, requests from prospective guests, online promotion opportunities, and account verification notifications.

Each email contains either a malicious link or a PDF attachment with an embedded link, purportedly directing recipients to the legitimate Booking.com website.

When users click on these links, they are directed to a convincing fake webpage that displays a counterfeit CAPTCHA overlay against a background designed to mimic the authentic Booking.com interface.

This deceptive design creates the illusion that Booking.com has implemented additional verification checks, which may give targeted users a false sense of security and increase the likelihood of compromise.

The attack methodology demonstrates a sophisticated understanding of the hospitality industry’s operations and effectively exploits the trusted relationship between hotels and the popular booking platform to deliver malicious payloads.

ClickFix Social Engineering Technique Enables Delivery of Multiple Malware Families

At the core of this campaign is the ClickFix social engineering technique, which represents an evolution in the threat actor’s approach to bypassing security measures.

This technique takes advantage of human problem-solving tendencies by displaying fake error messages or prompts that instruct users to perform specific actions to resolve supposed issues.

In this specific implementation, the fake CAPTCHA overlay instructs users to use a keyboard shortcut to open a Windows Run window, then paste and execute a command that the phishing page has surreptitiously added to the user’s clipboard.

A screenshot of the fake Booking.com webpage, with the fake CAPTCHA overlay outlining the ClickFix process.

This requirement for direct user interaction helps the attack evade automated security features that might otherwise detect and block malicious scripts.

The command executed through this method typically leverages mshta.exe to download and launch malicious code, which varies depending on the specific payload being delivered.

An example of the mshta.exe command that the targeted user launches.

Microsoft has identified multiple families of commodity malware being distributed through this campaign, including XWorm, Lumma stealer, VenomRAT, AsyncRAT, Danabot, and NetSupport RAT.

Each of these malware variants possesses capabilities designed to steal financial data and credentials for fraudulent use, which aligns with the historical patterns observed in Storm-1865 activity.

The adoption of the ClickFix technique represents a significant evolution in the threat actor’s tactics, techniques, and procedures (TTPs), demonstrating their ongoing efforts to circumvent conventional security measures targeting phishing and malware distribution.

Diagram illustrating the stages of the infection process in this campaign.

Protective Measures and Organizational Defenses Against Sophisticated Phishing Threats

Organizations can implement several strategies to protect themselves against this sophisticated phishing campaign and similar threats.

Education remains a critical component of defense, with staff training focused on identifying suspicious emails by checking sender addresses, being wary of urgent calls to action, hovering over links before clicking, and watching for typographical errors that often indicate phishing attempts.

Technical countermeasures also play a vital role in organizational protection against these threats.

Microsoft recommends deploying phishing-resistant authentication methods, enforcing multi-factor authentication (MFA) on all accounts, configuring Microsoft Defender for Office 365 to recheck links on click, and encouraging users to utilize web browsers that support protective features like Microsoft Defender SmartScreen.

Additional technical defenses include enabling cloud-delivered protection in antivirus products, implementing network protection to prevent access to malicious domains, enabling automated investigation and remediation capabilities, and activating Zero-hour auto purge (ZAP) in Office 365 to quarantine malicious messages.

Indicators of Compromise

IndicatorTypeDescription
92.255.57[.]155IP addressC2 server delivering XWorm
147.45.44[.]131IP addressC2 server delivering Danabot
176.113.115[.]170IP addressC2 server delivering LummaStealer
31.177.110[.]99IP addressC2 server delivering Danabot
185.7.214[.]54IP addressC2 server delivering XWorm
176.113.115[.]225IP addressC2 server delivering LummaStealer
87.121.221[.]124IP addressC2 server delivering Danabot
185.149.146[.]164IP addressC2 server delivering AsyncRAT
01ec22c3394eb1661255d2cc646db70a66934c979c2c2d03df10127595dc76a6  File hash (SHA-256)Danabot malware
f87600e4df299d51337d0751bcf9f07966282be0a43bfa3fd237bf50471a981eFile hash (SHA-256)Danabot malware
0c96efbde64693bde72f18e1f87d2e2572a334e222584a1948df82e7dcfe241d  File hash (SHA-256)Danabot malware

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...