ClickFix Chaos: Hospitality Firms Tricked by Fake Booking.com Phishing Scam
A ‘ClickFix’ phishing campaign is impersonating Booking.com, targeting hospitality firms with info-stealing malware. Storm-1865 uses fake error messages, tricking users into downloading malware that bypasses security. This campaign highlights the evolving tactics of cyber attackers and the importance of staying vigilant, especially when it comes to emails from seemingly legitimate sources.

Hot Take:
In a world where impersonation is the sincerest form of flattery, Storm-1865 takes it to a whole new level by dressing up as Booking.com and crashing the hospitality party. Who knew the hospitality industry could be so… inhospitable? Pack your bags and get ready for a wild ride through the land of ClickFix where malware is the main attraction and your financial data is the prize!
Key Points:
- Storm-1865 is orchestrating a phishing campaign targeting hospitality firms using Booking.com impersonations.
- The ClickFix technique dupes users into downloading malware by exploiting their problem-solving instincts.
- Malware families in play include XWorm, Lumma stealer, VenomRAT, AsyncRAT, Danabot, and NetSupport RAT.
- The campaign is global, affecting regions like North America, Oceania, Asia, and Europe.
- This campaign is a testament to Storm-1865’s evolving tactics to bypass security measures.