Chat with us, powered by LiveChat
Header Blog - Email Security

How the Booking Phishing Campaign Works and What Defenders Should Watch For

Written by Threat Intelligence Lab / 30.04.2026 /
Home » Blog » How the Booking Phishing Campaign Works and What Defenders Should Watch For

This article examines a Booking phishing campaign that uses fake CAPTCHA pages, clipboard injection, and PowerShell abuse to deliver PureHVNC malware

The phishing attack begins with a persuasive cancellation email from Booking.com that features recognizable branding and reassuring language. Victims are then instructed through several verification steps that pressure them into performing a dangerous action. 

According to our campaign analysis, we identified more than 45K emails in the last week. 

Table of Contents

Anatomy of the Booking phishing email 

This approach exploits trust in well-known brands. If users fail to recognize the threat, they risk account compromise or malware infection. The attacker is relying on familiarity before the user has time to slow down. 

The hook appears straightforward: a reservation cancellation message that seems to be sent from Booking.com. This is where it boils down to brand impersonation. For hotel staff, travel teams, or anyone managing reservations, it is regarded as “common practice” to open it and follow the instructions. That is exactly the point.  

Booking.com phishing email impersonating a reservation cancellation notice
A reservation cancellation message that seems to be sent from Booking.com

The email uses a subtle social engineering tactic: It tells the recipient to make sure the displayed URL looks legitimate, which sounds reassuring but is really there to lower suspicion. That is one of the clearest signs of a booking phishing scam to watch for: urgency, polished branding, and “helpful” wording wrapped around a mismatched destination. 

What happens after the click 

The psychological impact of this flow is significant, as it builds an illusion of authenticity. 

Fake CAPTCHA stage 

After the click, the campaign shifts from email lure to staged interaction. The victim is taken to a fake CAPTCHA page with image selection, then to a CAPTCHA that appears to be real. Although counterintuitive, this added friction increases perceived legitimacy. 

Fake CAPTCHA page used in Booking phishing campaign
First, fake CAPTCHA page
Real CAPTCHA page
Second, real CAPTCHA

Attackers make harmful steps look routine by wrapping them in familiar verification processes.

Clipboard injection  

Next, the user encounters a “verification” prompt, while a harmful PowerShell command gets copied to the clipboard, known as PasteJacking technique. They’re then encouraged to open Windows Command Prompt and paste it there.  

Verification prompt used for clipboard injection in phishing attack.
Verification step

From social engineering to malware delivery 

Once executed, the command retrieves remote content, downloads and unpacks a payload, and ultimately leads to PureHVNC delivery. 

PureHVNC is a remote access trojan, so this is not just about a stolen password or a nuisance pop-up. It is about foothold, persistence, and control. 

The campaign analysis reveals the following behaviour: 

  • it reviews environment and antivirus checks; 
  • automatic program startups from the registry; 
  • files placed in user folders, 
  • and communication with external servers. 

The main goal of the trojan is sustained access after the first click. 

This emphasizes the need for a comprehensive security approach that includes both technology and personnel training.  

Detection clues and defensive takeaways

For booking phishing campaign detection, you need to be aware of the following: 

  • malicious sender addresses; 
  • suspicious URLs in the email body; 
  • downloader infrastructure; 
  • PureHVNC C2 indicators. 

These details matter because they point to a broader trend that defenders need to keep an eye on, rather than focusing solely on a single message.

That pattern includes impersonation emails built around reservation language, websites that ask for odd verification steps, prompts that tell users to paste commands into Command Prompt, PowerShell abuse, and payload staging from unfamiliar domains.

MalwareBazaar also indicates booking.com-themed malware tagging dating back to 2023, with related booking-themed samples still appearing in 2025, reinforcing that this lure theme has staying power. 

How to recognize and avoid booking phishing attacks

In order to be able to identify booking phishing before it turns into a compromise, start with double-checking the basics:

  • do not trust branding alone 
  • do not paste commands into Command Prompt from a web page, no matter how official the prompt looks 
  • just because a site has CAPTCHA screens doesn’t mean it’s safe 
  • verify cancellation notices directly in the official Booking platform, not through embedded links 
  • escalate suspicious messages to IT or security 

For defenders, strong email-layer filtering, link analysis, and payload detection help stop phishing websites and malware delivery before a user is pulled into the workflow.


Booking phishing prevention needs user awareness and email protection

Booking phishing prevention is no longer just about spotting a fake logo or a typo-filled email. Campaigns like this one combine impersonation, staged verification, and malware delivery to pressure users into doing the attacker’s work. 

Hornetsecurity Advanced Threat Protection helps organizations detect malicious emails, links, and payload-delivery attempts earlier, reducing the chance that a convincing Booking-themed message becomes an endpoint compromise. 

Advanced Threat Protection icon

To strengthen booking fraud protection and protect against booking phishing campaigns before they reach users, schedule a demo and see how Hornetsecurity Advanced Threat Protection fits into your email security stack. 


IoCs (Indicators of Compromise)

TypeValueDescription
Email [email protected] Email address used to send campaign 
Email [email protected] Email address used to send campaign 
IP 51.182.118.100 IP address used to send campaign 
IP 162.255.87.188 IP address used to send campaign 
IP 212.48.84.192 IP address used to send campaign 
URL https://qdfljwx.com/ Malicious URL used in email body 
URL https://hotel-equatorial.com Malicious URL used in email body 
URL https://spzhucheng.com Malicious URL used in email body 
URL https://xiananhotel.com Malicious URL used in email body 
Domain gskqf.com Domain reached by PowerShell script 
URL https://halfmillion-iq.com/halfmillion-iq.zip Url hosting malicious payload 
Hash db8629568b96354675fb4891490829b0314de94c86200cb653308d9f80b26e10 Hash of malicious payload / halfmillion-iq.zip 
Domain nisuwyyyqsafdas.com PureHVNC C2 
IP 94.26.90.216 PureHVNC C2 

You might also be interested in: