{"id":50109,"date":"2023-12-22T10:13:25","date_gmt":"2023-12-22T15:13:25","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=50109"},"modified":"2023-12-22T10:13:25","modified_gmt":"2023-12-22T15:13:25","slug":"booking-com-hacked-hotel-accounts-scam-customers","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/50109\/","title":{"rendered":"Hacked hotel accounts on Booking.com"},"content":{"rendered":"<p>This season, a new attack scheme is proving very popular with cybercriminals: scamming Booking.com clients through the service\u2019s internal messaging system. To do this, they use compromised hotel accounts on admin.booking.com. Over the past few months, various companies have <a href=\"https:\/\/www.secureworks.com\/blog\/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam\" target=\"_blank\" rel=\"nofollow noopener\">released<\/a> studies on <a href=\"https:\/\/perception-point.io\/blog\/booking-com-customers-hit-by-phishing-campaign-delivered-via-compromised-hotels-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">incidents<\/a> of <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/sophisticated-phishing-campaign-targeting-hospitality\" target=\"_blank\" rel=\"nofollow noopener\">this nature<\/a>. Here\u2019s a detailed breakdown of how this attack works, and tips on how hotel owners and staff can protect themselves (and their clients).<\/p>\n<h2>Infecting hotel staff computers with a password stealer<\/h2>\n<p>What we\u2019re dealing with here is a multi-stage attack \u2014 B2B2C, if you will. It all starts with infecting hotel computers, but the immediate threat isn\u2019t to the hotel itself \u2014 it\u2019s to the clients.<\/p>\n<p>To hijack accounts on admin.booking.com, attackers use specialized malware known as password stealers. Typically, these stealers collect any passwords found on an infected computer. But in this case it seems that Booking.com accounts are what the cybercriminals are specifically interested in.<\/p>\n<p>In particular, one of the abovementioned studies <a href=\"https:\/\/www.secureworks.com\/blog\/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam\" target=\"_blank\" rel=\"nofollow noopener\">describes<\/a> a targeted email attack on hotel staff. This attack starts with an innocuous email in which someone poses as a recent guest and asks the hotel staff for help in finding lost documents.<\/p>\n<div id=\"attachment_50112\" style=\"width: 883px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22095914\/booking-com-hacked-hotel-accounts-scam-customers-1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50112\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22095914\/booking-com-hacked-hotel-accounts-scam-customers-1.png\" alt=\"Email from attackers to one of the attacked hotels\" width=\"873\" height=\"138\" class=\"size-full wp-image-50112\"><\/a><p id=\"caption-attachment-50112\" class=\"wp-caption-text\">The first email from the attackers to the targeted hotel. <a href=\"https:\/\/www.secureworks.com\/blog\/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>In the next email, the \u201cguest\u201d claims to have searched everywhere for the lost passport or whatever to no avail, suggesting the hotel is the only possible place where it might be. So, they ask the hotel staff to look for it and, to help the search, provide a link supposedly containing photos of the lost passport.<\/p>\n<div id=\"attachment_50114\" style=\"width: 945px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100014\/booking-com-hacked-hotel-accounts-scam-customers-2.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50114\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100014\/booking-com-hacked-hotel-accounts-scam-customers-2.png\" alt=\"Second email from attackers to the targeted hotel\" width=\"935\" height=\"326\" class=\"size-full wp-image-50114\"><\/a><p id=\"caption-attachment-50114\" class=\"wp-caption-text\">The next email from the attackers, containing a link to an infected archive with a password stealer. <a href=\"https:\/\/www.secureworks.com\/blog\/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>As you might suspect, this archive contains not the photos of the passport, but the password stealer. After the user clicks on the dangerous file, the stealer searches the system for saved login credentials for the hotel\u2019s account on admin.booking.com, and sends them to the attackers.<\/p>\n<div id=\"attachment_50115\" style=\"width: 2250px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100207\/booking-com-hacked-hotel-accounts-scam-customers-3.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50115\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100207\/booking-com-hacked-hotel-accounts-scam-customers-3.png\" alt=\"Cybercriminals are after hotel usernames and passwords on admin.booking.com\" width=\"2240\" height=\"1300\" class=\"size-full wp-image-50115\"><\/a><p id=\"caption-attachment-50115\" class=\"wp-caption-text\">Using a stolen login and password, the cybercriminals gain access to the hotel\u2019s account on admin.booking.com.<\/p><\/div>\n<p><a href=\"https:\/\/perception-point.io\/blog\/booking-com-customers-hit-by-phishing-campaign-delivered-via-compromised-hotels-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">Another study<\/a> on the Booking.com account theft epidemic describes an alternative method of infecting hotel staff computers. In this attack, criminals create reservations using guest accounts (in some cases, probably stolen accounts). They then contact the hotel using Booking.com\u2019s internal messaging system and, under one pretext or another, slip in a link to a malware-infected file \u2014 with the exact same outcome as in the previous case.<\/p>\n<h2>Stealing hotel accounts on Booking.com and emailing clients<\/h2>\n<p>At the next stage, the attackers proceed to directly use the accounts stolen from the infected hotel computers. Everything is made a lot simpler by the fact that Booking.com\u2019s service doesn\u2019t provide two-factor authentication, so accessing an account only requires a login and password.<\/p>\n<p>Upon entering the hotel\u2019s account on admin.booking.com, the criminals study current bookings and begin sending messages to future guests using Booking.com\u2019s internal messaging system. These messages generally revolve around an error in verifying the guest\u2019s payment card information provided during the booking. The \u201chotel\u201d thus asks the guest to re-enter their card details; otherwise, the reservation will be canceled.<\/p>\n<p>Of course, the messages include links that at first glance appear to resemble genuine links to Booking.com\u2019s booking pages. They contain the word \u201cbooking\u201d itself, something resembling a booking number, and in some cases, additional words like \u201creservation\u201d, \u201capprove\u201d, \u201cconfirmation\u201d, and so on.<\/p>\n<p>Of course, upon closer inspection, it\u2019s easy to see that these links don\u2019t lead to Booking.com at all. However, the aim here is to target hasty individuals who, unexpectedly discovering that their planned trip could be ruined, rush to rectify the situation.<\/p>\n<div id=\"attachment_50116\" style=\"width: 1215px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100332\/booking-com-hacked-hotel-accounts-scam-customers-4.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50116\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100332\/booking-com-hacked-hotel-accounts-scam-customers-4.jpg\" alt=\"Fraud in Booking.com's internal messaging system\" width=\"1205\" height=\"912\" class=\"size-full wp-image-50116\"><\/a><p id=\"caption-attachment-50116\" class=\"wp-caption-text\">] Through Booking.com\u2019s internal messaging system, scammers send hotel clients links to fake booking pages. <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/sophisticated-phishing-campaign-targeting-hospitality\" target=\"_blank\" rel=\"nofollow noopener\">Source 1<\/a>, <a href=\"https:\/\/grahamcluley.com\/fraudsters-target-booking-com-customers-claiming-hotel-stay-could-be-cancelled\/\" target=\"_blank\" rel=\"nofollow noopener\">source 2<\/a>, <a href=\"https:\/\/www.secureworks.com\/blog\/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam\" target=\"_blank\" rel=\"nofollow noopener\">source 3<\/a>, <a href=\"https:\/\/perception-point.io\/blog\/booking-com-customers-hit-by-phishing-campaign-delivered-via-compromised-hotels-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">source 4<\/a><\/p><\/div>\n<p>The messages are written in a professional tone and appear quite plausible. It should also be noted that the text of such messages varies considerably from <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/sophisticated-phishing-campaign-targeting-hospitality\" target=\"_blank\" rel=\"nofollow noopener\">one<\/a> described incident to <a href=\"https:\/\/grahamcluley.com\/fraudsters-target-booking-com-customers-claiming-hotel-stay-could-be-cancelled\/\" target=\"_blank\" rel=\"noopener nofollow\">another<\/a>. Apparently, a number of criminals are using this scheme independently of each other.<\/p>\n<h2>Fake copies of Booking.com and stealing bank card data<\/h2>\n<p>The final stage of the attack ensues. By clicking on the link in the message, the hotel\u2019s client lands on a fake page \u2014 a meticulous copy of Booking.com. These pages even display the correct guest name, information about the hotel where the victim intends to stay, dates, and price \u2014 all of which the scammers know because they have access to all the booking data.<\/p>\n<p>The only thing that gives it away is the link in the address bar. However, the scammers distract the victim from paying attention to such minor details by rushing them: the page claims that these dates are in high demand, so \u201c10 four-star hotels similar to this one are already unavailable\u201d. The implication, of course, is that if this booking fails, finding alternative accommodation won\u2019t be easy.<\/p>\n<div id=\"attachment_50117\" style=\"width: 1369px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100435\/booking-com-hacked-hotel-accounts-scam-customers-5.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50117\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100435\/booking-com-hacked-hotel-accounts-scam-customers-5.jpg\" alt=\"Fake Booking.com booking page \" width=\"1359\" height=\"1280\" class=\"size-full wp-image-50117\"><\/a><p id=\"caption-attachment-50117\" class=\"wp-caption-text\">On the fake Booking.com page, the client of the hacked hotel is asked to enter their card number to reconfirm the reservation. <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/sophisticated-phishing-campaign-targeting-hospitality\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The victims are urged once again to confirm the booking as quickly as possible. Moreover, it\u2019s easy to do: just re-enter the payment information. Obviously, the card details then fall into the hands of the criminals \u2014 mission accomplished.<\/p>\n<h2>Selling hotel logins and passwords for Booking.com<\/h2>\n<p>It\u2019s worth mentioning that here, as in almost any other cybercriminal scheme, we see a tendency for narrow specialization. Apparently, some criminals collect hacked Booking.com accounts, while others exploit these accounts to deceive hotel clients. In any case, advertisements offering substantial sums for logins and passwords from admin.booking.com accounts can be found on hacker forums.<\/p>\n<div id=\"attachment_50118\" style=\"width: 779px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100625\/booking-com-hacked-hotel-accounts-scam-customers-6.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50118\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100625\/booking-com-hacked-hotel-accounts-scam-customers-6.png\" alt=\"Offer for the purchase of hacked Booking.com accounts\" width=\"769\" height=\"296\" class=\"size-full wp-image-50118\"><\/a><p id=\"caption-attachment-50118\" class=\"wp-caption-text\">Listing on an underground forum, where the authors are willing to pay generously for hacked Booking.com hotel accounts. <a href=\"https:\/\/www.secureworks.com\/blog\/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<div id=\"attachment_50119\" style=\"width: 599px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100731\/booking-com-hacked-hotel-accounts-scam-customers-7.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50119\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100731\/booking-com-hacked-hotel-accounts-scam-customers-7.png\" alt=\"Another offer for the purchase of hacked Booking.com accounts \" width=\"589\" height=\"380\" class=\"size-full wp-image-50119\"><\/a><p id=\"caption-attachment-50119\" class=\"wp-caption-text\">Another listing offering decent money for hacked admin.booking.com accounts. <a href=\"https:\/\/www.secureworks.com\/blog\/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Yet another group of criminals, providing subscription-based services to search for stolen credentials in stealer malware databases, have recently added admin.booking.com to their list of searchable data.<\/p>\n<div id=\"attachment_50120\" style=\"width: 831px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100825\/booking-com-hacked-hotel-accounts-scam-customers-8.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50120\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/22100825\/booking-com-hacked-hotel-accounts-scam-customers-8.png\" alt=\"Announcement of the addition of admin.booking.com to the list of supported services\" width=\"821\" height=\"357\" class=\"size-full wp-image-50120\"><\/a><p id=\"caption-attachment-50120\" class=\"wp-caption-text\">One of the services offering paid searches across databases of stolen passwords has learned to function with admin.booking.com accounts. <a href=\"https:\/\/www.secureworks.com\/blog\/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>All of this suggests that the popularity of this criminal scheme is only growing; therefore, there\u2019ll likely be more hacks of hotel accounts on Booking.com and more affected clients in the future.<\/p>\n<h2>How to protect against theft of admin.booking.com accounts<\/h2>\n<p>Even though these attacks directly threaten hotel clients rather than the hotels themselves, the hotels still have to deal with the backlash and somehow compensate the affected parties to avoid any reputational damage. And in general, hotel computers getting infected is bad news \u2014 today, cybercriminals are hijacking Booking.com accounts; tomorrow they\u2019ll come up with another way to monetize this infection. Therefore, it\u2019s absolutely necessary to protect against this threat. Here\u2019s what to keep in mind:<\/p>\n<ul>\n<li>Storing passwords in your browser is not safe \u2014 that\u2019s where stealer malware always looks for them.<\/li>\n<li>To store passwords well, use a specialized application \u2014 <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">a password manager<\/a> \u2014 that will take care of their security.<\/li>\n<li>It\u2019s essential to install <a href=\"https:\/\/www.kaspersky.com\/small-business-security\/small-office-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener nofollow\">reliable protection<\/a> on all your devices used for business.<\/li>\n<li>And take particular care of the security of those computers that employees might use to communicate with strangers \u2014 they\u2019re the ones more likely to become the target of an attack.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Attackers are hijacking hotel accounts on Booking.com, and stealing their clients&#8217; banking data through its internal messaging system.<\/p>\n","protected":false},"author":2726,"featured_media":50110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2672,2930,80,899,1318,187,76,726,97,3244,422,663],"class_list":{"0":"post-50109","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-accounts","10":"tag-booking","11":"tag-fraud","12":"tag-hack","13":"tag-hotels","14":"tag-passwords","15":"tag-phishing","16":"tag-scam","17":"tag-security-2","18":"tag-stealers","19":"tag-threats","20":"tag-travel"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/50109\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/26826\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/22240\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/29585\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/27095\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/36757\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/booking-com-hacked-hotel-accounts-scam-customers\/27330\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/33111\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/32734\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/scam\/","name":"scam"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=50109"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50109\/revisions"}],"predecessor-version":[{"id":50121,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50109\/revisions\/50121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/50110"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=50109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=50109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=50109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}