Booking.com Phishing Campaign Targets Partners and Guests in Multi-Stage Fraud Scheme

Related

Serbia’s Cybersecurity Leadership Spotlight

Serbia’s cybersecurity leadership is being shaped by a mix...

Latvia’s Cybersecurity Leadership Spotlight

Latvia sits on a frontline where cybersecurity is inseparable...

Bulgaria’s Cybersecurity Leadership Spotlight

Bulgaria’s cybersecurity leadership reflects a country balancing fast-growing tech...

Share

What happened

Security researchers at Bridewell identified a phishing campaign targeting Booking.com partners and customers using a multi-stage attack chain to steal credentials and conduct payment fraud. Attackers initially sent phishing emails to hotel reservation and support mailboxes containing fake complaint links that redirected staff to attacker-controlled login portals designed to harvest credentials. These stolen credentials were then used to access legitimate Booking.com partner accounts and obtain real booking information. Attackers subsequently contacted guests through convincing WhatsApp messages containing accurate reservation details and directed them to fake Booking.com payment pages hosted on look-alike domains using techniques such as IDN homograph attacks and Cloudflare CAPTCHA pages to evade detection and facilitate financial fraud. 

Who is affected

Booking.com partners, including hotel staff, and customers with active reservations are affected, as attackers use stolen partner credentials to target guests and facilitate payment fraud using compromised booking data. 

Why CISOs should care

The campaign demonstrates how credential theft from trusted partner accounts can be leveraged to conduct downstream fraud against customers using legitimate booking information, increasing the effectiveness of phishing and financial theft. 

3 practical actions

  • Enforce multi-factor authentication on Booking.com partner accounts. This reduces risk of unauthorized access using stolen credentials. 
  • Monitor for suspicious login activity. Detect unusual sign-ins, password resets, or redirects involving booking systems. 
  • Block look-alike phishing domains. Prevent access to malicious domains impersonating Booking.com infrastructure.