Phishing campaign impersonates Booking.com, delivers a suite of credential-stealing malware

April 14, 2025, 11:28 a.m.

Description

A phishing campaign targeting organizations in the hospitality industry has been identified, impersonating Booking.com and using the ClickFix social engineering technique to deliver multiple credential-stealing malware. The campaign, tracked as Storm-1865, targets individuals likely to work with Booking.com in North America, Oceania, Asia, and Europe. The attack uses fake emails and webpages to trick users into executing malicious commands, leading to the download of various malware families including XWorm, Lumma stealer, VenomRAT, AsyncRAT, Danabot, and NetSupport RAT. The campaign aims to steal financial data and credentials for fraudulent use, showing an evolution in the threat actor's tactics to bypass conventional security measures.

Date

  • Created: April 13, 2025, 10:37 a.m.
  • Published: April 13, 2025, 10:37 a.m.
  • Modified: April 14, 2025, 11:28 a.m.

Attack Patterns

  • Danabot
  • Lumma Stealer
  • VenomRAT
  • NetSupport RAT
  • XWorm
  • AsyncRAT
  • Storm-1865

Additional Informations

  • Hospitality