Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Most Americans disapprove of Trump’s treatment of universities, a new poll finds

Beyond Vulnerability Management – Can You CVE What I CVE?

The UK and Norway accelerate clean energy opportunities

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Microsoft warns about Clickfix phishing campaigns targeting the hospitality sector via fake bookings[.]com email
Identity

Microsoft warns about Clickfix phishing campaigns targeting the hospitality sector via fake bookings[.]com email

userBy userMarch 13, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Microsoft is using an increasingly popular social engineering technique called Clickfix to use an increasingly popular social engineering technique that provides malware that earns credentials, to impersonate online travel agency Booking.com, shedding light on an ongoing phishing campaign targeting the hospitality sector.

According to the Tech giant, the activity began in December 2024 and is run with the ultimate goal of carrying out economic fraud and theft. Tracking the campaign under Monica Storm 1865.

“This phishing attack specifically targets individuals from hospitality organizations in North America, Oceania, South, Southeast Asia, and North, Southeast, Eastern and Western Europe. It sends fake emails claiming it will come from agents as it is most likely to work with Booking.com.”

The ClickFix technique involves copying, pasting and launching deceptive instructions that activate the infection process, causing users to run malware by pretending to fix expected (i.e. non-existent) errors. It was first detected in the wild in October 2023.

The attack sequence begins with Storm-1865 sending a malicious email to the target individual and asking for “feedback” about negative reviews left by a guest on Booking.com. The message also includes a link or PDF attachment that contains what appears to direct the recipient to the reservation site.

Cybersecurity

In reality, however, when you click, the victim leads to a fake Captcha verification page superimposed on “subtle visible background designed to mimic legitimate Booking.com pages.” In doing so, the idea is to provide false sense of security and increase the chances of successful compromise.

“Fake Captcha is where web pages use Clickfix social engineering techniques to download malicious payloads,” Microsoft said. “This technique tells the user to open a Windows Run window using a keyboard shortcut, then launch it by pasting the command that the web page adds to the clipboard.”

The commands use the legitimate MSHTA.EXE binary to form a variety of product malware families, including Xworm, Lumma Stealer, Venomrat, Asyncrat, Danabot, and Netsupport Rat.

Redmond said he previously observed Storm-1865, which targeted buyers using an e-commerce platform, using phishing messages that led to fraudulent payment web pages. Thus, the incorporation of the Clickfix technique illustrates a tactical evolution designed to allow past traditional security measures against phishing and malware.

“The threat actors Microsoft tracks as Storm-1865 will encapsulate clusters of activities running phishing campaigns, leading to payment data theft and fraudulent claims.”

“These campaigns have continued with an increase in volume since at least early 2023, and include messages sent via vendor platforms such as online travel agents and e-commerce platforms, as well as email services such as Gmail and iCloud Mail.”

Storm-1865 is just one of many campaigns that have accepted Clickfix as a vector of malware distribution. This is the effectiveness of this technology, which even Russian and Iranian nation-state groups like APT28 and Muddywater, have adopted it to seduce victims.

“This method in particular utilizes human behavior. By presenting a plausible ‘solution’ to perceived problems, attackers shift the burden of execution towards users, effectively avoiding many automated defenses.”

One such campaign, documented by a Singaporean cybersecurity company, uses Clickfix to drop a downloader named SmokeSaber, serving as a conduit for Lumma Stealer. Other campaigns leverage fraud, SEO addiction, GitHub issues, and spam from forums and social media sites, with links to clickfix pages.

“The Clickfix technique demonstrates the evolution of adversarial social engineering strategies, leveraging user trust and browser capabilities for malware deployment,” Group-IB said. “The rapid adoption of this method by both cybercriminals and APT groups highlights its effectiveness and low technical barriers.”

Some of the other documented ClickFix campaigns are listed below –

Lumma Stealer’s diverse infection mechanisms are further exemplified by the discovery of another campaign that uses fake GitHub repository featuring artificial intelligence (AI) content to deliver steelers through loaders called smart loaders.

Cybersecurity

“These malicious repositories are disguised as non-malicious tools, such as game cheats, crack software, and cryptocurrency utilities,” Micro said in an analysis published earlier this week. “This campaign invites victims with promises of free or illegal, unauthorized features and encourages them to download ZIP files (e.g. Release.Zip, Software.Zip).”

This operation helps to highlight how threat actors are abused trust related to popular platforms like GitHub for malware propagation.

The findings are rated as operated by a single threat actor called Hive0145, as Trustwave details an email phishing campaign in which it uses invoice-related decoys to distribute an updated version of another steeler malware called Strelasterer.

“The Strelasterers sample includes custom multi-layer obfuscation and a flattened code flow to complicate its analysis,” the company said. “It has been reported that threat actors may develop special cryptors used in “Stellar Loaders,” particularly Strelaster. ”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenai’s “Creative Writing” AI evokes that annoying child from high school fiction clubs
Next Article Democracy-led states appeal to block Trump administration layoffs in education sector
user
  • Website

Related Posts

Beyond Vulnerability Management – Can You CVE What I CVE?

May 9, 2025

Google deploys AI protection on your device to detect Chrome and Android scams

May 9, 2025

Chinese hackers exploit SAP RCE Flaw CVE-2025-31324 to deploy Golang-based SuperShell

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Most Americans disapprove of Trump’s treatment of universities, a new poll finds

Beyond Vulnerability Management – Can You CVE What I CVE?

The UK and Norway accelerate clean energy opportunities

Omoda and Jaecoo will appoint Strata as a UK launch brand experience agency

Trending Posts

Timberwolves beat Curryless Warriors evenly in Game 2 | Basketball News

May 9, 2025

The Vatican’s troubling finances: Can Pope Leo XIV clean it? |Religious News

May 9, 2025

“Sky Missile”: Panic in Indian Frontier City with War Clouds | India and Pakistan’s Tension News

May 9, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New dedicated blockchain T-Rex raises $17 million to convert the attention layer of Web3

Top tech startup funding news for today, May 8, 2025

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Did Figma kill Webflow and Framer with the release of the Figma site?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.