Hotels on Booking.com at Risk as Fraudsters Continue to Exploit Security Lapses

Hotels that use the popular online travel site, Booking.com, are being targeted by fraudsters due to not enabling two-factor authentication. This concerning trend has resulted in a rise in compromised accounts and fraudulent activities, leaving both hotels and their customers susceptible to cybercrime.

Malware and Monetization

Fraudsters employ various tactics to target properties, and once successful, they proceed to monetize the stolen information. The illicit trade in stolen data involves the sale of “bots” – batches of information stolen from compromised systems. These bots are conveniently sold through dedicated marketplaces and secretive Telegram channels, providing a lucrative business opportunity for criminals looking to exploit the vulnerabilities of hotels relying on Booking.com.

The Scale of the Issue

The extent of the problem is staggering, with over 185,000 accounts associated with Booking.com being offered for sale on illicit markets this year alone, according to Kela, a darknet intelligence firm. This alarming figure showcases the magnitude of compromised accounts, underscoring the urgent need for enhanced security measures for hotels relying on Booking.com.

Hotels as Frequent Targets

Hotels and their booking software have become prime targets for malicious hackers seeking to obtain payment card data. The hospitality industry’s dependency on technology for bookings and reservations makes it an attractive target. Cybercriminals see hotels as vulnerable points of entry, aiming to exploit any security weaknesses to gain access to sensitive customer information.

Ransomware and RAM-Scraping Malware

According to the latest Data Breach Investigations Report (DBIR), one-third of attacks in the hospitality sector involve ransomware. However, in many cases, attackers opt for RAM-scraping malware, which allows them to extract payment card data from a computer’s memory during transactions. This method has proven to be effective for attackers, highlighting the need for robust security protocols and constant monitoring within the industry.

Attack Techniques

Fraudsters employ cunning techniques to exploit the trust and empathy of hotel staff and customers. Typically, they make a legitimate booking, followed by a carefully crafted email to customer service designed to evoke urgency and sympathy. To further deceive the victim, the fraudsters manipulate them into accessing a password-protected website to retrieve seemingly harmless information, such as dietary preferences or printing requirements.

Secureworks Case Study

Secureworks, a leading cybersecurity firm, investigated a case where a threat actor deployed Vidar, a credential-stealing malware, to gain unauthorized access to a hotel’s Booking.com account. This case highlights the sophistication and determination of cybercriminals, as they go to great lengths to exploit security vulnerabilities for financial gain.

Difficulty in Repelling Attacks

Fighting against social engineering attacks remains a significant challenge faced by the hospitality industry. According to social engineering expert Sharon Conheady, the customer-centric approach of the industry makes it susceptible to manipulation. Employees prioritize accommodating customer requests, often putting security concerns on the backburner. Addressing this issue necessitates a comprehensive security mindset and ongoing training to educate hotel staff about potential threats and the importance of stringent security measures.

Hotels relying on Booking.com must prioritize cybersecurity measures to protect themselves and their guests from the growing threat of fraudsters and cybercriminals. Implementing two-factor authentication, conducting regular security audits, and providing robust employee training are essential steps to minimize the risks associated with compromised accounts. As the hospitality industry continues to embrace digital transformations, bolstering security measures becomes increasingly crucial in safeguarding both reputation and customer trust. Vigilance, proactive measures, and collaboration within the industry will ultimately help fortify defenses against these pervasive cyber threats.

Explore more

Is Fairer Car Insurance Worth Triple The Cost?

A High-Stakes Overhaul: The Push for Social Justice in Auto Insurance In Kazakhstan, a bold legislative proposal is forcing a nationwide conversation about the true cost of fairness. Lawmakers are advocating to double the financial compensation for victims of traffic accidents, a move praised as a long-overdue step toward social justice. However, this push for greater protection comes with a

Insurance Is the Key to Unlocking Climate Finance

While the global community celebrated a milestone as climate-aligned investments reached $1.9 trillion in 2023, this figure starkly contrasts with the immense financial requirements needed to address the climate crisis, particularly in the world’s most vulnerable regions. Emerging markets and developing economies (EMDEs) are on the front lines, facing the harshest impacts of climate change with the fewest financial resources

The Future of Content Is a Battle for Trust, Not Attention

In a digital landscape overflowing with algorithmically generated answers, the paradox of our time is the proliferation of information coinciding with the erosion of certainty. The foundational challenge for creators, publishers, and consumers is rapidly evolving from the frantic scramble to capture fleeting attention to the more profound and sustainable pursuit of earning and maintaining trust. As artificial intelligence becomes

Use Analytics to Prove Your Content’s ROI

In a world saturated with content, the pressure on marketers to prove their value has never been higher. It’s no longer enough to create beautiful things; you have to demonstrate their impact on the bottom line. This is where Aisha Amaira thrives. As a MarTech expert who has built a career at the intersection of customer data platforms and marketing

What Really Makes a Senior Data Scientist?

In a world where AI can write code, the true mark of a senior data scientist is no longer about syntax, but strategy. Dominic Jainy has spent his career observing the patterns that separate junior practitioners from senior architects of data-driven solutions. He argues that the most impactful work happens long before the first line of code is written and