Are Booking.com Users Safe from Advanced Phishing Attacks?

In recent developments concerning cybersecurity, a sophisticated phishing attack has started targeting users of Booking.com, a popular travel and accommodation booking platform. Cybersecurity researchers at OSINTMATTER have identified a series of highly organized phishing campaigns that compromise hotel managers’ accounts to deceive and scam customers. These attackers have employed a fake domain, extraknet-booking[.]com, which closely mimics the legitimate Booking.com domain, extranet-booking.com. The subtlety of this imitation is designed to trick both hotel staff and travelers into thinking they are interacting with the real website. A distinguishing feature of this malicious campaign is the use of JavaScript obfuscation techniques, including parseInt encoding, and even Cyrillic text, suggesting the possibility of Russian-speaking origins. To make matters worse, the attackers leverage SEO poisoning to boost the visibility of their malicious sites within search results, making it easier for unsuspecting users to fall into their trap.

The Anatomy of the Attack

What makes this phishing campaign notably dangerous is its technical sophistication. One of the more notable elements includes “238 STUN” binding requests, which use non-standard high ports to facilitate data exfiltration and maintain communication with compromised systems. Traditional security measures may not sufficiently detect these specialized methods, making the attacks harder to thwart. The infrastructure supporting this phishing campaign employs dynamic cloaking techniques, which enable the attackers to present different content based on the user’s IP address and browser settings. Depending on these factors, the user may see a fake Booking.com portal, the genuine website, or even an error page. Such adaptability increases the likelihood that the phishers can remain under the radar, continuously evolving their methods to evade detection.

A particularly alarming technical component is the use of UDP hole punching, a networking method that allows attackers to breach NAT firewalls and compromise internal networks effectively. UDP hole punching is primarily used to maintain connections between two parties behind firewalls, but in this context, it’s repurposed for malicious ends. Moreover, the attack also employs iFrames linked to numerous other phishing pages, functioning as centralized hubs for distributing malicious content. By pointing to specific URLs, these iFrames enable centralized control and broad reach, making the phishing operation highly efficient. The varied behaviors of these phishing pages, including timeouts and 404 errors, suggest the use of sophisticated mechanisms like RST injection to further complicate detection and mitigation efforts.

Impact and Implications

The operational methodologies employed by these attackers are not just technically advanced but also strategically multifaceted. Research indicates that this phishing scheme is associated with the “Ninja” Trojan malware, which mainly aims to infect the devices of hotel managers. This infection likely serves as a precursor to exploiting Booking.com’s chat system in subsequent attack phases. Once the malware is in place, it enables attackers to send malicious links directly to customers via the platform’s communication system, increasing the potential for widespread infection and data theft.

Overall, this highly advanced phishing attack combines multiple technical elements — dynamic cloaking, JavaScript obfuscation, and techniques like UDP hole punching. All these methods create a robust and evolving threat ecosystem focused on compromising hotel management systems as a first step. Once those systems are compromised, the attackers then exploit the platform to target unsuspecting customers directly. The primary goal here is not only to extract financial information or personal data but to establish a sustainable method of ongoing exploitation. This complex threat underscores the critical importance of heightened cybersecurity measures and the continuous education of users about potential risks.

How to Stay Safe

A recent cybersecurity development has revealed a sophisticated phishing attack targeting users of Booking.com, the well-known travel and accommodation booking site. Cybersecurity experts at OSINTMATTER have uncovered a series of organized phishing campaigns aimed at compromising hotel managers’ accounts to scam customers. These criminals are using a fake domain, extraknet-booking[.]com, which closely resembles the authentic Booking.com domain, extranet-booking.com. This subtle mimicry is designed to fool both hotel staff and travelers into believing they are on the legitimate website. A standout aspect of this phishing campaign is the use of advanced JavaScript obfuscation techniques, such as parseInt encoding, and even the incorporation of Cyrillic text, hinting at possible Russian origins. To add to the threat, the attackers use SEO poisoning to enhance the visibility of their malicious sites in search results, making it easier for unsuspecting users to be deceived. This complex strategy highlights the urgent need for heightened vigilance and robust cybersecurity measures.

Explore more

ShinyHunters Targets Cisco in Massive Cloud Data Breach

The digital silence of the networking giant was shattered when a notorious hacking collective announced they had bypassed the defenses of one of the world’s most influential technology firms. In late March, the group known as ShinyHunters issued a chilling “final warning” to Cisco Systems, Inc., claiming they had successfully exfiltrated a massive trove of sensitive data. By setting an

Critical Citrix NetScaler Flaws Under Active Exploitation

The High-Stakes Landscape of NetScaler Security Vulnerabilities The rapid exploitation of enterprise networking equipment has become a hallmark of modern cyber warfare, and the latest crisis surrounding Citrix NetScaler ADC and Gateway is no exception. At the center of this emergency is a high-severity flaw that permits memory overread, creating a direct path for threat actors to steal sensitive session

Trend Analysis: Graduate Job Security Priorities

The aggressive pursuit of prestigious titles and rapid corporate climbing has suddenly been replaced by a widespread desire for professional safety and long-term predictable outcomes. Today, new entrants to the workforce are rewriting the professional playbook by treating employment not as a platform for self-expression, but as a crucial defense against economic uncertainty. This shift marks a significant departure from

Can Your Note-Taking App Change Based on Your Active Window?

The constant friction of manual task switching often disrupts cognitive flow when users must search through thousands of disorganized lines just to find relevant project documentation. While standard productivity software centralizes information into a single database, this approach frequently creates a bottleneck that slows down development or creative workflows. To solve this problem, a new open-source utility called MyParticularNotes has

How Will Azure Copilot Revolutionize Cloud Migration?

Transitioning an entire data center to the cloud has historically felt like trying to rebuild a flying airplane mid-flight without a blueprint, but Azure Copilot has fundamentally changed the physics of this complex maneuver. For years, IT leaders viewed migration as a binary choice between the speed of a “lift-and-shift” and the quality of a full refactor. This dilemma often