Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Scam Targets Booking.com Users in Fraud Scheme

Phishing Scam Targets Booking.com Users in Fraud Scheme

Posted on February 18, 2026 By CWS

A recent phishing campaign exploiting the reputation of Booking.com has surfaced, aiming to defraud hotels and guests by capturing sensitive information. This sophisticated operation deceives users through seemingly legitimate communications, eventually leading to financial theft and data exposure.

Initial Phishing Tactics

The scheme often begins with emails sent to hotel reservation or support addresses, encouraging staff to click on links regarding a supposed ‘complaint’ or room inquiry. Despite appearing genuine, these links redirect users to attacker-controlled sites that mimic legitimate pages to harvest login credentials.

Research by Bridewell has highlighted this financially driven campaign, which has been active since January 2026. Utilizing two distinct phishing kits, the operation unfolds in three stages: initial payload delivery, credential theft from hotel staff, and subsequent fraud targeting customers using stolen booking information.

Exploring the Multi-Stage Attack

The first stage involves phishing emails designed to lure hotel employees into engaging with the fraudulent chain. The attackers employ look-alike domains and redirect techniques, including a Cyrillic character trick in ‘booking,’ to deceive users. Once victims are misled onto fake portals, their credentials are captured, enabling further access to legitimate Booking.com partner accounts.

To avoid detection, the phishing kit uses a mechanism that fingerprints visitors. If the checks are unsuccessful, a decoy site is displayed. Successful checks redirect victims to a counterfeit partner login page, utilizing a ‘bookling’ subdomain and tokenized sign-in paths.

Consequences and Protective Measures

Subsequent to gaining access, perpetrators target guests by sending convincing WhatsApp messages containing accurate booking data, prompting them through a Cloudflare CAPTCHA to a fake payment page. This stage aims to exploit guests’ trust and urgency.

Hotels can mitigate such threats by enforcing multi-factor authentication (MFA) on partner accounts, restricting portal access, and treating unexpected complaint links with suspicion. Monitoring new sign-ins and unusual redirects can help detect account takeovers early. Additionally, email filters should be updated to block look-alike domains, and any abuse should be reported to registrars.

Guests are advised against making payments via chat-app links and should verify issues through official channels. If they suspect data compromise, they should promptly change passwords, contact their bank, and confirm with the hotel if their Booking.com account has been accessed.

Stay informed with the latest updates by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for more instant updates.

Cyber Security News Tags:Booking.com, cyber attack, Cybersecurity, data breach, financial fraud, Fraud, hotel security, online security, Phishing, travel scams

Post navigation

Previous Post: CISA Alerts on Exploited Vulnerability in TeamT5 Product
Next Post: Anthropic Unveils Enhanced Claude Sonnet 4.6 Model

Related Posts

INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin Cyber Security News
Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware Cyber Security News
Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Cyber Security News
Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation Cyber Security News
Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Cyber Security News
New Malware Attack Via “I’m not a Robot Check” to Trick Users into Running Malware New Malware Attack Via “I’m not a Robot Check” to Trick Users into Running Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News