Are Booking.com Users Safe from Advanced Phishing Attacks?

In recent developments concerning cybersecurity, a sophisticated phishing attack has started targeting users of Booking.com, a popular travel and accommodation booking platform. Cybersecurity researchers at OSINTMATTER have identified a series of highly organized phishing campaigns that compromise hotel managers’ accounts to deceive and scam customers. These attackers have employed a fake domain, extraknet-booking[.]com, which closely mimics the legitimate Booking.com domain, extranet-booking.com. The subtlety of this imitation is designed to trick both hotel staff and travelers into thinking they are interacting with the real website. A distinguishing feature of this malicious campaign is the use of JavaScript obfuscation techniques, including parseInt encoding, and even Cyrillic text, suggesting the possibility of Russian-speaking origins. To make matters worse, the attackers leverage SEO poisoning to boost the visibility of their malicious sites within search results, making it easier for unsuspecting users to fall into their trap.

The Anatomy of the Attack

What makes this phishing campaign notably dangerous is its technical sophistication. One of the more notable elements includes “238 STUN” binding requests, which use non-standard high ports to facilitate data exfiltration and maintain communication with compromised systems. Traditional security measures may not sufficiently detect these specialized methods, making the attacks harder to thwart. The infrastructure supporting this phishing campaign employs dynamic cloaking techniques, which enable the attackers to present different content based on the user’s IP address and browser settings. Depending on these factors, the user may see a fake Booking.com portal, the genuine website, or even an error page. Such adaptability increases the likelihood that the phishers can remain under the radar, continuously evolving their methods to evade detection.

A particularly alarming technical component is the use of UDP hole punching, a networking method that allows attackers to breach NAT firewalls and compromise internal networks effectively. UDP hole punching is primarily used to maintain connections between two parties behind firewalls, but in this context, it’s repurposed for malicious ends. Moreover, the attack also employs iFrames linked to numerous other phishing pages, functioning as centralized hubs for distributing malicious content. By pointing to specific URLs, these iFrames enable centralized control and broad reach, making the phishing operation highly efficient. The varied behaviors of these phishing pages, including timeouts and 404 errors, suggest the use of sophisticated mechanisms like RST injection to further complicate detection and mitigation efforts.

Impact and Implications

The operational methodologies employed by these attackers are not just technically advanced but also strategically multifaceted. Research indicates that this phishing scheme is associated with the “Ninja” Trojan malware, which mainly aims to infect the devices of hotel managers. This infection likely serves as a precursor to exploiting Booking.com’s chat system in subsequent attack phases. Once the malware is in place, it enables attackers to send malicious links directly to customers via the platform’s communication system, increasing the potential for widespread infection and data theft.

Overall, this highly advanced phishing attack combines multiple technical elements — dynamic cloaking, JavaScript obfuscation, and techniques like UDP hole punching. All these methods create a robust and evolving threat ecosystem focused on compromising hotel management systems as a first step. Once those systems are compromised, the attackers then exploit the platform to target unsuspecting customers directly. The primary goal here is not only to extract financial information or personal data but to establish a sustainable method of ongoing exploitation. This complex threat underscores the critical importance of heightened cybersecurity measures and the continuous education of users about potential risks.

How to Stay Safe

A recent cybersecurity development has revealed a sophisticated phishing attack targeting users of Booking.com, the well-known travel and accommodation booking site. Cybersecurity experts at OSINTMATTER have uncovered a series of organized phishing campaigns aimed at compromising hotel managers’ accounts to scam customers. These criminals are using a fake domain, extraknet-booking[.]com, which closely resembles the authentic Booking.com domain, extranet-booking.com. This subtle mimicry is designed to fool both hotel staff and travelers into believing they are on the legitimate website. A standout aspect of this phishing campaign is the use of advanced JavaScript obfuscation techniques, such as parseInt encoding, and even the incorporation of Cyrillic text, hinting at possible Russian origins. To add to the threat, the attackers use SEO poisoning to enhance the visibility of their malicious sites in search results, making it easier for unsuspecting users to be deceived. This complex strategy highlights the urgent need for heightened vigilance and robust cybersecurity measures.

Explore more

Omantel vs. Ooredoo: A Comparative Analysis

The race for digital supremacy in Oman has intensified dramatically, pushing the nation’s leading mobile operators into a head-to-head battle for network excellence that reshapes the user experience. This competitive landscape, featuring major players Omantel, Ooredoo, and the emergent Vodafone, is at the forefront of providing essential mobile connectivity and driving technological progress across the Sultanate. The dynamic environment is

Can Robots Revolutionize Cell Therapy Manufacturing?

Breakthrough medical treatments capable of reversing once-incurable diseases are no longer science fiction, yet for most patients, they might as well be. Cell and gene therapies represent a monumental leap in medicine, offering personalized cures by re-engineering a patient’s own cells. However, their revolutionary potential is severely constrained by a manufacturing process that is both astronomically expensive and intensely complex.

RPA Market to Soar Past $28B, Fueled by AI and Cloud

An Automation Revolution on the Horizon The Robotic Process Automation (RPA) market is poised for explosive growth, transforming from a USD 8.12 billion sector in 2026 to a projected USD 28.6 billion powerhouse by 2031. This meteoric rise, underpinned by a compound annual growth rate (CAGR) of 28.66%, signals a fundamental shift in how businesses approach operational efficiency and digital

du Pay Transforms Everyday Banking in the UAE

The once-familiar rhythm of queuing at a bank or remittance center is quickly fading into a relic of the past for many UAE residents, replaced by the immediate, silent tap of a smartphone screen that sends funds across continents in mere moments. This shift is not just about convenience; it signifies a fundamental rewiring of personal finance, where accessibility and

European Banks Unite to Modernize Digital Payments

The very architecture of European finance is being redrawn as a powerhouse consortium of the continent’s largest banks moves decisively to launch a unified digital currency for wholesale markets. This strategic pivot marks a fundamental shift from a defensive reaction against technological disruption to a forward-thinking initiative designed to shape the future of digital money. The core of this transformation