Hotels on Booking.com at Risk as Fraudsters Continue to Exploit Security Lapses

Hotels that use the popular online travel site, Booking.com, are being targeted by fraudsters due to not enabling two-factor authentication. This concerning trend has resulted in a rise in compromised accounts and fraudulent activities, leaving both hotels and their customers susceptible to cybercrime.

Malware and Monetization

Fraudsters employ various tactics to target properties, and once successful, they proceed to monetize the stolen information. The illicit trade in stolen data involves the sale of “bots” – batches of information stolen from compromised systems. These bots are conveniently sold through dedicated marketplaces and secretive Telegram channels, providing a lucrative business opportunity for criminals looking to exploit the vulnerabilities of hotels relying on Booking.com.

The Scale of the Issue

The extent of the problem is staggering, with over 185,000 accounts associated with Booking.com being offered for sale on illicit markets this year alone, according to Kela, a darknet intelligence firm. This alarming figure showcases the magnitude of compromised accounts, underscoring the urgent need for enhanced security measures for hotels relying on Booking.com.

Hotels as Frequent Targets

Hotels and their booking software have become prime targets for malicious hackers seeking to obtain payment card data. The hospitality industry’s dependency on technology for bookings and reservations makes it an attractive target. Cybercriminals see hotels as vulnerable points of entry, aiming to exploit any security weaknesses to gain access to sensitive customer information.

Ransomware and RAM-Scraping Malware

According to the latest Data Breach Investigations Report (DBIR), one-third of attacks in the hospitality sector involve ransomware. However, in many cases, attackers opt for RAM-scraping malware, which allows them to extract payment card data from a computer’s memory during transactions. This method has proven to be effective for attackers, highlighting the need for robust security protocols and constant monitoring within the industry.

Attack Techniques

Fraudsters employ cunning techniques to exploit the trust and empathy of hotel staff and customers. Typically, they make a legitimate booking, followed by a carefully crafted email to customer service designed to evoke urgency and sympathy. To further deceive the victim, the fraudsters manipulate them into accessing a password-protected website to retrieve seemingly harmless information, such as dietary preferences or printing requirements.

Secureworks Case Study

Secureworks, a leading cybersecurity firm, investigated a case where a threat actor deployed Vidar, a credential-stealing malware, to gain unauthorized access to a hotel’s Booking.com account. This case highlights the sophistication and determination of cybercriminals, as they go to great lengths to exploit security vulnerabilities for financial gain.

Difficulty in Repelling Attacks

Fighting against social engineering attacks remains a significant challenge faced by the hospitality industry. According to social engineering expert Sharon Conheady, the customer-centric approach of the industry makes it susceptible to manipulation. Employees prioritize accommodating customer requests, often putting security concerns on the backburner. Addressing this issue necessitates a comprehensive security mindset and ongoing training to educate hotel staff about potential threats and the importance of stringent security measures.

Hotels relying on Booking.com must prioritize cybersecurity measures to protect themselves and their guests from the growing threat of fraudsters and cybercriminals. Implementing two-factor authentication, conducting regular security audits, and providing robust employee training are essential steps to minimize the risks associated with compromised accounts. As the hospitality industry continues to embrace digital transformations, bolstering security measures becomes increasingly crucial in safeguarding both reputation and customer trust. Vigilance, proactive measures, and collaboration within the industry will ultimately help fortify defenses against these pervasive cyber threats.

Explore more

The Future of Data Engineering: Key Trends and Challenges for 2026

The contemporary digital landscape has fundamentally rewritten the operational handbook for data professionals, shifting the focus from peripheral maintenance to the very core of organizational survival and innovation. Data engineering has underwent a radical transformation, maturing from a traditional back-end support function into a central pillar of corporate strategy and technological progress. In the current environment, the landscape is defined

Trend Analysis: Immersive E-commerce Solutions

The tactile world of home decor is undergoing a profound metamorphosis as high-definition digital interfaces replace the traditional showroom experience with startling precision. This shift signifies more than a mere move to online sales; it represents a fundamental merging of artisanal craftsmanship with the immediate accessibility of the digital age. By analyzing recent market shifts and the technological overhaul at

Trend Analysis: AI-Native 6G Network Innovation

The global telecommunications landscape is currently undergoing a radical metamorphosis as the industry pivots from the raw throughput of 5G toward the cognitive depth of an intelligent 6G fabric. This transition represents a departure from viewing connectivity as a mere utility, moving instead toward a sophisticated paradigm where the network itself acts as a sentient product. As the digital economy

Data Science Jobs Set to Surge as AI Redefines the Field

The contemporary labor market is witnessing a remarkable transformation as data science professionals secure their positions as the primary architects of the modern digital economy while commanding significant wage increases. Recent payroll analysis reveals that the median age within this specialized field sits at thirty-nine years, contrasting with the broader national workforce median of forty-two. This demographic reality indicates a

Can a New $1 Billion Organization Save Ethereum?

The global decentralized finance landscape has reached a point of maturity where the original governance structures of early blockchain pioneers are facing unprecedented scrutiny from their own founders and contributors. As we move through 2026, the Ethereum ecosystem finds itself navigating a period of significant internal friction, sparked by a radical proposal to establish a new, independent organization dedicated to