Need cloud computing? Get started now

Unmasking a Sophisticated Phishing Campaign That Targets Hotel Guests

Shiran Guez

Written by

Shiran Guez

September 21, 2023

Shiran Guez

Written by

Shiran Guez

With a career spanning more than two decades, Shiran Guez has established a solid networking and telecom industry foundation. A passion for technology and his entrepreneurial mindset have driven his success across various domains. In 2014, Shiran joined Akamai, managing information security and security operations within the Enterprise Security division. A firm believer in continuous learning, Shiran relishes new challenges that enable him to expand his expertise in the field. Outside the professional realm, Shiran is a devoted husband and father of three. He recognizes the significance of maintaining a balance between work and personal life, and his commitment to both aspects demonstrates his determination and adaptability in an ever-evolving industry.

Cybercriminals are always developing new tactics to prey on unsuspecting victims.  The best way to protect yourself is to be cautious and vigilant every time you get  an unexpected message.

Editorial and additional commentary by Tricia Howard

Executive summary

  • Akamai researchers have identified an additional step in an infostealer campaign that targets hotels, booking sites, and travel agents. This second step targets the customers of the sites themselves. 

  • The attacker, masquerading as the hotel, reaches out to the customer through the booking site, urging the customer to “re-confirm their credit card,” then steals the customer’s information.

  • This multi staged threat showcases the evolution of sophisticated phishing attacks. Malicious actors are finding new and creative ways to infiltrate unsuspecting targets with scary precision. 

  • We have included a list of indicators of compromise for blocklists and general awareness at the end of this blog post.

Introduction

Despite the widespread awareness of phishing, it is still one of the most successful and ubiquitous attack vectors in the vast landscape of cyberthreats. Phishing campaigns come in various forms and have continued to evolve as new potential mediums arise. From emails that impersonate banks to text messages that mimic delivery notifications to malicious code embedded into a photo of a kitten, phishing can affect anyone with access to a computer.

One of the most recently discovered delivery methods is the sophisticated infostealer that targets the hospitality industry through online booking services. A malicious actor makes a booking request, choosing the “pay at hotel” option, and sends the hotel a series of urgent and seemingly heartfelt emails with links to “photos” that are an executable infostealer.

Although this particular version was aimed at the hotels, our SecOps team has detected a second stage of this sophisticated phishing campaign, which then targets the legitimate customers of these sites.

As the holiday travel season approaches, there is no better time to be wary of this phishing method. In this blog post, we detail some of our observations and share recommendations for staying safe online. 

Attack chain

The attack chain consists of three steps: executing the infostealer, contacting the victim, and catching the victim.

Step 1: Executing the infostealer

After the infostealer is executed on the original target (the hotel), the attacker can access messaging with legitimate customers. It is often recommended that customers use only official and known methods of communication, such as various messaging platforms within the site, to prevent illegitimate or scam interactions. Unfortunately, this great advice becomes moot now that the attacker can access those methods.

Step 2: Contacting the victim

Now that the attacker has direct and trusted access, a message is sent to the intended victim (Figure 1). This message follows a typical phishing modus operandi: urgent, requiring immediate action, and fear-invoking. It is written professionally and modeled after genuine hotel interactions with their guests, which creates even more trust for the recipient.

It is important to remember that this message comes from within the booking site’s message platform itself. If this were an email from an unknown sender, it likely would be ignored, but since this is a direct message from within the booking site itself, it seems legitimate and trustworthy. Attackers show both persistence and spreadability across multiple campaigns (Figure 2).

Illegitimate message Fig. 1: Illegitimate message sent through booking platform to intended victim
Connection map Fig. 2: Connection map between the attacker IP and its relation to the malicious URLs

Step 3: Catching the victim

The message contains an illegitimate link claiming to be an additional card verification to ensure the booking isn’t canceled. The victim, clearly wanting to keep the reservation, complies with the terms outlined in the message and clicks the link. This link triggers an executable on the victim’s machine encoded in a complex JavaScript Base64 script (Figure 3).

 JavaScript Base64-encoded script Fig. 3: JavaScript Base64-encoded script downloaded onto the victim’s machine after clicking a malicious link

Sophisticated obfuscation techniques

This downloaded script is designed to detect the victim's information and ensure that it would be difficult to analyze or understand by security analysts.This obfuscation technique speaks to the sophistication of the attacker(s) who are behind this. 

Apparently, the script uses various techniques to gather this information, such as checking the user's browser's capabilities and attributes. It then creates a data object and appears to attempt to send this data to a server using a POST request. Let’s examine a small part of the JavaScript logic that determines the redirection path.

  • The first part is a self-invoking function that takes two parameters (_0x372138 and _0x55e2f4). This part includes a loop with complex mathematical calculations inside a try-catch block. It continues running until the condition !![] (which is always true) is met, suggesting that it runs indefinitely. This then allows the use of the self-invoking function within the first parameter. It declares several variables, including _0x178a26 and _0x4c868a, and defines a function _0x36fa19
    • This function collects various information about the browser environment, such as properties of the window and document objects, and stores this information in an object named _0x4c868a. The collected data includes information about the browser, screen, and more (Figure 3).
The collected data includes information about the browser, screen, and more (Figure 3) Fig. 4: Self-invoking function run on victim’s machine
  • The attacker added several security validations as an anti-analysis technique. If the client passes these tests, the user will be presented with a phishing site masquerading as a Booking.com payment page requesting credit card information (Figure 4).
Phishing site Fig. 5: Phishing site mimicking Booking.com
  • The attacker also implemented a smart-chat support channel to ensure the credibility of their phishing scam. 

Red flags 

  • Urgent language: Phishing messages often create a false sense of urgency, compelling recipients to act hastily. In this case, the message warns of a reservation cancellation if action isn't taken within 24 hours.

  • Suspicious URL: The provided link (https://booking.guest-approve[.]info/reservation/606667156) is not the official Booking.com domain.

Verification tips

  • Never click on unsolicited links: Regardless of how legitimate a message may appear, it's best to avoid clicking on links in unsolicited messages.

  • Contact the company directly: To confirm the authenticity of such messages, use a different official channel outside the messaging platform to contact the company, such as email or phone number provided by the original site hotel or traveling agency.

  • Beware of urgent or threatening language: Be cautious of messages that create a sense of urgency or threaten negative consequences if you don't take immediate action.

  • Double-check the URL: Always scrutinize URLs to ensure they match the legitimate website.

  • Use reputable security software and cloud services: Protect your devices with up-to-date antivirus software. Consider utilizing high-quality cloud security services that provide advanced threat intelligence. 

Conclusion

We all have to be constantly vigilant of phishing attacks. This sophisticated scam works, but so do the much simpler scams. 

Phishing campaigns of this caliber don't come around every day. But cybercriminals are always developing new tactics to prey on unsuspecting victims. The best way to protect yourself is to be cautious and vigilant every time you get an unexpected message.

Indicators of Compromise

91.215.40[.]30
91.215.40[.]22 
static[.]wakkofkznmartyxa3244[.]site
booking[.]id3410894[.]com
booking[.]id90152861[.]com
booking[.]id48088277[.]date
com-id809712[.]com
booking[.]id301628951[.]date
booking[.]com-id2435142[.]info
booking[.]id61189387[.]date
booking[.]id11853502[.]date
booking[.]transaction-accept[.]info
booking[.]id60157261[.]date
booking[.]request-reservation[.]cloud
booking[.]com[.]id8535029[.]date
booking[.]check-reservation[.]info
booking[.]reservation-approve[.]info
booking[.]com[.]id17825117[.]date
booking-confirmation[.]date
booking[.]transaction-confirmation[.]info
expedia[.]id23725813[.]top
expedia-book[.]cloud
booking[.]id19045617[.]info
booking[.]id90134267[.]com
booking[.]reserved-operation[.]info
booking[.]transaction-confirm[.]com
booking[.]guest-approve[.]info
booking[.]operation-3ds[.]one
7870512[.]ngrok[.]io
booking[.]account-guest[.]com
booking[.]transaction-secure[.]info
booking-verification[.]su
98link[.]cc
booking[.]reservation-3ds[.]info
booking[.]reservation-accept[.]info
airbnb-reservation[.]cloud
booking[.]approve-reservation[.]info
booking[.]check-request[.]info
95link[.]cc
Booking[.]request-reservation[.]info

Sha256: 

1076c3e6437cab5975064c1525c516e2b1707c1f0fdc5edbadd6610e6a13d275 - attacker javascript


Shiran Guez

Written by

Shiran Guez

September 21, 2023

Shiran Guez

Written by

Shiran Guez

With a career spanning more than two decades, Shiran Guez has established a solid networking and telecom industry foundation. A passion for technology and his entrepreneurial mindset have driven his success across various domains. In 2014, Shiran joined Akamai, managing information security and security operations within the Enterprise Security division. A firm believer in continuous learning, Shiran relishes new challenges that enable him to expand his expertise in the field. Outside the professional realm, Shiran is a devoted husband and father of three. He recognizes the significance of maintaining a balance between work and personal life, and his commitment to both aspects demonstrates his determination and adaptability in an ever-evolving industry.