Hackers are escalating their assaults on Booking.com customers by advertising on dark web forums asking for assistance in locating targets.
Cyber-criminals are offering up to $2,000 (£1,600) per person for login details of hotels, as they persist in targeting those who are lodged in them.
At least since March, customers have been deceived into handing money over to cyber-felons.
Studies have revealed the strategies utilized by the mysterious intruders.
Booking.com has come under fire from customers in the UK, Indonesia, Singapore, Greece, Italy, Portugal, the US and Netherlands, as they have posted numerous reports of fraud taking place through the website, which is one of the most popular holiday destinations.
Cyber-security specialists assert that Booking.com has not been breached; however, the ingenuity of criminals has enabled them to access the administrative portals of individual hotels that employ the service.
A representative from Booking.com reported that the firm has knowledge of some of its lodging partners experiencing problems caused by cyber criminals that have applied various familiar cyber-scams.
Secureworks researchers have discovered that hackers are making use of Vidar Infostealer, a malicious piece of software, by duping hotel personnel into downloading it.
They do this by sending an email to the hotel, pretending to be a prior guest who has inadvertently forgotten their passport in their room.
After the criminals have delivered the ruse, they send a Google Drive link to the staff, claiming it holds an image of the passport. However, in actuality, when the link is clicked, malware downloads on to the staff computers and searches the hotel computers for Booking.com access.
The hackers access the Booking.com platform, giving them sight of all customers who have booked a room or a vacation. Through the official app, the hackers then communicate with the customers and manage to deceive them into parting with money, with the money going to the hackers instead of the hotel.
It appears hackers are profiting so much from their assaults that they are now willing to provide thousands of dollars to wrongdoers who grant them way into hotel gateways.
Rafe Pilling, the director of threat intelligence for Secureworks Counter Threat Unit, has declared that the scam is yielding significant returns.
He suggested that the high rate of success of credentials is likely to have resulted in its popularity, as emails have been shown to target authenticate individuals and appear as if they were sent from a reliable source. He termed it as an exemplary example of social engineering.
Lucy Buckley was approached via the Booking.com app in September by hackers who communicated in poor English and persuaded her to send them £200. They purported to be employees of the Paris hotel that she had made her reservation for, indicating that if she failed to pay the money, her reservation would be cancelled.
After transmitting the funds, she was informed by the bona fide hotel personnel that they had no cognizance of the remittance. Acting swiftly, she was able to reclaim her money from her bank, which showed the payment had been sent to an account in Moldova.
A Booking.com representative declared: "Although this incident did not occur on Booking.com, we understand how significant it is for those impacted. For this reason, our team is working hard to help our partners secure their systems quickly and assist any affected customers, including those who have lost funds."
Graham Cluley, an expert in cyber-security and podcast host, was almost duped into sending money to hackers.
He proposed that hotels on Booking.com should employ multi-factor authentication, so as to make it more difficult for criminals to gain unauthorized access.
Booking.com has begun displaying a cautionary alert at the bottom of chat windows, however, they may be able to take further action. For example, by prohibiting any links that redirect to sites less than a few days old, they would be able to protect customers from being deceived by recently created fraudulent sites.
top of page
bottom of page
Comments