Close Menu
    What's Hot

    E.U. Sanctions Russian Hackers for Cyber Attacks on Estonia’s Government

    March 30, 2025

    Stealthy Golang Malware Uses Telegram Bots for C2: Possible Russian Origin

    March 30, 2025

    Ghostwriter Cyber Attacks Use Obfuscated Excel Macros to Target Ukraine and Belarusian Opposition

    March 29, 2025
    Ambreen Chaudhary
    • News
    • Data Breach
    • Cyber Attack
    • Cyber Security
    • Expert Insights
    • Contact
    Youtube
    Trending Topics:
    • Home
    • Interviews
    • Cyber Attack
    • Buy Now
    Ambreen Chaudhary
    • Home
    • Interviews
    • Cyber Attack
    • Buy Now
    Home » Microsoft Warns of ClickFix Phishing Attack Targeting Booking(.)com Users in Hospitality Sector
    Data Breach

    Microsoft Warns of ClickFix Phishing Attack Targeting Booking(.)com Users in Hospitality Sector

    A crafty phishing campaign is abusing Booking.com branding and human trust to deploy powerful malware across the globe.
    AmbreenChaudharyBy AmbreenChaudharyMarch 28, 2025Updated:March 28, 2025No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A newly uncovered phishing campaign is targeting employees in the hospitality sector by impersonating Booking.com, one of the world’s largest online travel agencies. At the heart of the campaign is a clever trick called ClickFix—a social engineering tactic that convinces users to execute malware on their own systems.

    First detected in December 2024, the campaign has been traced to a threat actor Microsoft tracks as Storm-1865, and its impact has stretched across North America, Europe, Oceania, and Southeast Asia. The goal? Steal login credentials, plant malware, and commit financial fraud.

    A Simple Email, a Fake Review, and a Deceptive Link

    Booking.com as the Bait

    The attack begins with an email that appears to come from Booking.com, claiming a customer has posted a negative review. The target is asked to respond or provide feedback.

    Included in the message is either a link or a PDF file with a clickable link, which appears to take the recipient to the real Booking.com website. But clicking it leads elsewhere—a fake CAPTCHA page, carefully designed to mimic Booking.com’s branding in the background.

    This tactic helps lower the victim’s guard, encouraging them to follow on-screen instructions.

    ClickFix: The Technique Fooling Even Cautious Users

    Turning Victims into Unknowing Attackers

    The ClickFix method is at the core of this phishing attack. Once users reach the fake CAPTCHA screen, they’re prompted to press Windows + R, paste a command from the site, and press Enter.

    That command quietly uses a built-in Windows utility—mshta.exe—to pull in the malware payload.

    This user-driven technique works so well because it bypasses traditional security filters, which often rely on detecting malicious links or file attachments. In this case, the user unwittingly runs the code themselves, making the attack difficult to stop.

    What Happens Next?

    The malware installed varies but includes well-known threats like:

    • XWorm – A remote access trojan (RAT)
    • Lumma Stealer – Steals browser data, credentials, and more
    • VenomRAT, AsyncRAT, Danabot, NetSupport RAT – Other tools for stealing data and gaining remote control

    All of them give the attacker ongoing access to the victim’s machine and sensitive information.

    Storm-1865: A Growing and Evolving Threat Actor

    From E-commerce to Hospitality

    Microsoft previously observed Storm-1865 targeting online shoppers with fake payment pages linked to platforms like Gmail and iCloud. Their tactics continue to evolve as they now use vendor-specific lures, such as Booking.com-themed emails, to reach industry-specific employees.

    This campaign is part of a larger trend in which threat actors are refining their phishing lures to match the roles and behaviors of their targets.

    Not Just Criminals: APTs Are Now Using ClickFix Too

    Nation-State Actors Adopt the Same Technique

    Cybersecurity experts have reported that even advanced persistent threat (APT) groups linked to countries like Russia and Iran are now using ClickFix in their campaigns.

    One example is APT28 (associated with Russia), and another is MuddyWater (believed to be linked to Iran). Both have integrated ClickFix in recent social engineering attacks.

    According to Group-IB, the success of this method lies in its ability to trick users into completing the infection process themselves—a clever way to dodge detection.

    Variations on the ClickFix Theme

    ClickFix Is Versatile—and It’s Spreading Fast

    Security firms have observed several variations of ClickFix-based attacks, including:

    • Fake CAPTCHA challenges that launch PowerShell scripts delivering Lumma and Vidar Stealers
    • Google reCAPTCHA-themed lures deployed by the Blind Eagle group
    • Booking confirmation links that redirect to malware download pages
    • Windows-themed decoy pages that prompt similar command execution steps

    Each variant uses a false problem and a misleading solution to push the user into action. And once they comply, the malware silently moves in.

    GitHub Repositories as Malware Launchpads

    AI-Generated Pages, Real-World Damage

    In one ClickFix campaign analyzed by Trend Micro, attackers uploaded fake GitHub repositories using AI-generated descriptions and fake reviews. These pages offered:

    • Game cheats
    • Cracked tools
    • Cryptocurrency utilities

    Victims downloaded ZIP files thinking they were getting something helpful, but instead received a loader program—named SmartLoader—which deployed Lumma Stealer.

    The abuse of trusted platforms like GitHub makes detection and prevention much harder, especially for individuals and small businesses.

    G DATA Reports Regional Focus

    Victims in Germany and the Philippines

    According to German security firm G DATA, one variation of this campaign has heavily targeted users in Germany and the Philippines.

    The company observed fake Booking.com messages embedded with ClickFix steps that led directly to the Lumma Stealer—a repeated choice among attackers due to its wide functionality and high success rate.

    Other Recent Stealer Campaigns and Evolution

    Beyond Lumma: The Rise of StrelaStealer and Custom Loaders

    Alongside Lumma and XWorm, other stealers are appearing more often. Trustwave recently shared findings about StrelaStealer, delivered through fake invoice emails.

    This malware uses layered obfuscation and custom crypters like Stellar Loader to hide from antivirus tools. It reflects a larger move toward highly customized delivery tools built to match specific payloads.

    Why ClickFix Works So Well

    It Uses Trust, Not Tech, to Bypass Security

    ClickFix doesn’t rely on hidden exploits or zero-day flaws. Instead, it exploits human behavior:

    • Users believe they’re solving a problem
    • They follow the instructions willingly
    • The malware avoids detection because the user starts the process

    It’s a new twist on social engineering that combines familiar-looking websites, minor tech jargon, and urgency to move quickly from click to infection.

    How to Protect Against ClickFix Campaigns

    Tips for Individuals and Organizations

    1. Never follow manual commands from unknown websites
    2. Watch for urgency or emotional manipulation in emails
    3. Train teams on emerging phishing methods, including ClickFix
    4. Block access to mshta.exe if not used internally
    5. Use email filtering to catch fake travel or invoice messages
    6. Apply behavioral monitoring tools to detect abnormal command use

    FAQs

    What is the ClickFix technique in phishing?
    ClickFix is a social engineering method where a fake webpage tells the user to run a command on their computer, usually resulting in malware installation.

    How is Booking.com used in the phishing scam?
    Attackers pretend to send negative reviews from Booking.com to hospitality workers. The email includes links or PDFs that direct users to fake sites prompting malware installation.

    What types of malware are dropped in these attacks?
    Common payloads include Lumma Stealer, XWorm, NetSupport RAT, VenomRAT, and Danabot.

    Why does ClickFix evade security tools?
    Because the victim willingly runs the command, traditional antivirus tools may not see it as suspicious.

    Who is Storm-1865?
    A threat actor tracked by Microsoft responsible for phishing and financial fraud across various industries, now using ClickFix tactics.

    Are APT groups using ClickFix?
    Yes. Nation-state actors from countries like Russia and Iran have adopted ClickFix to deliver malware like KoSpy and SMOKESABER.

    ClickFix Phishing Attack Hospitality Microsoft
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    AmbreenChaudhary
    • Website

    Related Posts

    The $1.5 Billion Bybit Cryptocurrency Heist and North Korean Hackers

    March 28, 2025

    Blind Eagle Hacks Colombian Institutions Using GitHub, RATs, and Windows NTLM Exploit

    March 28, 2025

    AC Weekly Cybersecurity News Recap – March 2025

    March 28, 2025
    Leave A Reply Cancel Reply

    Demo
    Latest Posts

    E.U. Sanctions Russian Hackers for Cyber Attacks on Estonia’s Government

    March 30, 2025

    Stealthy Golang Malware Uses Telegram Bots for C2: Possible Russian Origin

    March 30, 2025

    Ghostwriter Cyber Attacks Use Obfuscated Excel Macros to Target Ukraine and Belarusian Opposition

    March 29, 2025

    FamousSparrow Returns: New SparrowDoor Variants Target U.S., Mexico

    March 29, 2025
    Latest Posts

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    Advertisement
    Demo

    Ambreen Chaudhary is a Cyber Crime expert dedicated to cybersecurity awareness and digital safety. This is Pakistan’s #1 platform for cybersecurity news, blogs, and expert insights, helping individuals and businesses stay secure online.

    Facebook Pinterest YouTube
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Interviews
    • Cyber Attack
    • Buy Now
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.