Are Booking.com Users Safe from Advanced Phishing Attacks?

In recent developments concerning cybersecurity, a sophisticated phishing attack has started targeting users of Booking.com, a popular travel and accommodation booking platform. Cybersecurity researchers at OSINTMATTER have identified a series of highly organized phishing campaigns that compromise hotel managers’ accounts to deceive and scam customers. These attackers have employed a fake domain, extraknet-booking[.]com, which closely mimics the legitimate Booking.com domain, extranet-booking.com. The subtlety of this imitation is designed to trick both hotel staff and travelers into thinking they are interacting with the real website. A distinguishing feature of this malicious campaign is the use of JavaScript obfuscation techniques, including parseInt encoding, and even Cyrillic text, suggesting the possibility of Russian-speaking origins. To make matters worse, the attackers leverage SEO poisoning to boost the visibility of their malicious sites within search results, making it easier for unsuspecting users to fall into their trap.

The Anatomy of the Attack

What makes this phishing campaign notably dangerous is its technical sophistication. One of the more notable elements includes “238 STUN” binding requests, which use non-standard high ports to facilitate data exfiltration and maintain communication with compromised systems. Traditional security measures may not sufficiently detect these specialized methods, making the attacks harder to thwart. The infrastructure supporting this phishing campaign employs dynamic cloaking techniques, which enable the attackers to present different content based on the user’s IP address and browser settings. Depending on these factors, the user may see a fake Booking.com portal, the genuine website, or even an error page. Such adaptability increases the likelihood that the phishers can remain under the radar, continuously evolving their methods to evade detection.

A particularly alarming technical component is the use of UDP hole punching, a networking method that allows attackers to breach NAT firewalls and compromise internal networks effectively. UDP hole punching is primarily used to maintain connections between two parties behind firewalls, but in this context, it’s repurposed for malicious ends. Moreover, the attack also employs iFrames linked to numerous other phishing pages, functioning as centralized hubs for distributing malicious content. By pointing to specific URLs, these iFrames enable centralized control and broad reach, making the phishing operation highly efficient. The varied behaviors of these phishing pages, including timeouts and 404 errors, suggest the use of sophisticated mechanisms like RST injection to further complicate detection and mitigation efforts.

Impact and Implications

The operational methodologies employed by these attackers are not just technically advanced but also strategically multifaceted. Research indicates that this phishing scheme is associated with the “Ninja” Trojan malware, which mainly aims to infect the devices of hotel managers. This infection likely serves as a precursor to exploiting Booking.com’s chat system in subsequent attack phases. Once the malware is in place, it enables attackers to send malicious links directly to customers via the platform’s communication system, increasing the potential for widespread infection and data theft.

Overall, this highly advanced phishing attack combines multiple technical elements — dynamic cloaking, JavaScript obfuscation, and techniques like UDP hole punching. All these methods create a robust and evolving threat ecosystem focused on compromising hotel management systems as a first step. Once those systems are compromised, the attackers then exploit the platform to target unsuspecting customers directly. The primary goal here is not only to extract financial information or personal data but to establish a sustainable method of ongoing exploitation. This complex threat underscores the critical importance of heightened cybersecurity measures and the continuous education of users about potential risks.

How to Stay Safe

A recent cybersecurity development has revealed a sophisticated phishing attack targeting users of Booking.com, the well-known travel and accommodation booking site. Cybersecurity experts at OSINTMATTER have uncovered a series of organized phishing campaigns aimed at compromising hotel managers’ accounts to scam customers. These criminals are using a fake domain, extraknet-booking[.]com, which closely resembles the authentic Booking.com domain, extranet-booking.com. This subtle mimicry is designed to fool both hotel staff and travelers into believing they are on the legitimate website. A standout aspect of this phishing campaign is the use of advanced JavaScript obfuscation techniques, such as parseInt encoding, and even the incorporation of Cyrillic text, hinting at possible Russian origins. To add to the threat, the attackers use SEO poisoning to enhance the visibility of their malicious sites in search results, making it easier for unsuspecting users to be deceived. This complex strategy highlights the urgent need for heightened vigilance and robust cybersecurity measures.

Explore more

Raedbots Launches Egypt’s First Homegrown Industrial Robots

The metallic clang of traditional assembly lines is finally being replaced by the precise, rhythmic hum of domestic innovation as Raedbots unveils a suite of industrial machines that redefine local manufacturing. For decades, the Egyptian industrial sector remained shackled to the high costs of European and Asian imports, making the dream of a fully automated factory floor an expensive luxury

Trend Analysis: Sustainable E-Commerce Packaging Regulations

The ubiquitous sight of a tiny electronic component rattling inside a massive cardboard box is rapidly becoming a relic of the past as global regulators target the hidden environmental costs of e-commerce logistics. For years, the digital retail sector operated under a “speed at any cost” mentality, often prioritizing packing convenience over spatial efficiency. However, as of 2026, the legislative

How Are AI Chatbots Reshaping the Future of E-commerce?

The modern digital marketplace operates at a velocity where a three-second delay in response time can result in a permanent loss of consumer interest and substantial revenue. While traditional storefronts relied on human intuition to guide shoppers through aisles, the current e-commerce landscape uses sophisticated artificial intelligence to simulate and surpass that personalized touch across millions of simultaneous interactions. This

Stop Strategic Whiplash Through Consistent Leadership

Every time a leadership team decides to pivot without a clear explanation or warning, a shockwave travels through the entire organizational chart, leaving the workforce disoriented, frustrated, and increasingly cynical about the future. This phenomenon, frequently described as strategic whiplash, transforms the excitement of a new executive direction into a heavy burden of wasted effort for the staff. Instead of

Most Employees Learn AI by Osmosis as Training Lags

Corporate boardrooms across the country are echoing with the same relentless command to integrate artificial intelligence immediately, yet the vast majority of people expected to use these tools have never received a single hour of formal instruction. While two-thirds of organizations now demand AI implementation as a standard operating procedure, the workforce has been left to navigate this technological frontier