Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Yes, LinkedIn banned AI agent startup Artisan, but now it’s back

OpenAI launches ChatGPT Health, says 230 million users ask health questions every week

Black Cat behind SEO-tainting malware campaign targeting popular software search

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fake reservation email redirects hotel staff to fake BSoD page delivering DCRat
Identity

Fake reservation email redirects hotel staff to fake BSoD page delivering DCRat

userBy userJanuary 6, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 6, 2026Ravi LakshmananMalware/Endpoint Security

Source: Securonics

Cybersecurity researchers have revealed details of a new campaign called PHALT#BLYX that leverages ClickFix-style lures to display fake Blue Screen of Death (BSoD) error fixes in attacks targeting European hospitality businesses.

According to cybersecurity firm Securonix, the end goal of the multi-stage campaign is to deliver a remote access Trojan known as DCRat. This activity was detected in late December 2025.

“During initial access, attackers use the lure of a fake Booking.com reservation cancellation to trick victims into running a malicious PowerShell command that silently fetches and executes remote code,” said researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee.

cyber security

The attack chain begins with a phishing email impersonating Booking.com that contains a link to a fake website (e.g. “low-house”).[.]This message alerts the recipient of the unexpected reservation cancellation and prompts them to click a link to confirm the cancellation.

The website the victim is redirected to pretends to be Booking.com, serves a fake CAPTCHA page, and directs the victim to a fake BSoD page with “recovery instructions” to download Windows.[ファイル名を指定して実行]Open the dialog, paste the command and press Enter. This actually runs the PowerShell command that ultimately deploys DCRat.

Specifically, it involves a multi-step process that begins with the PowerShell dropper downloading the MSBuild project file (‘v.proj’) from ‘2fa-bns’.[.]This file is executed using ‘MSBuild.exe’ and executes an embedded payload responsible for configuring Microsoft Defender Antivirus exclusions to avoid detection, setting persistence on the host in the startup folder, and launching the RAT malware after downloading from the same location as the MSBuild project.

You can also completely disable the security program if it is found to be running with administrator privileges. Without elevated privileges, the malware enters a loop that triggers a Windows User Account Control (UAC) prompt three times every two seconds, hoping that the victim will grant the necessary permissions out of sheer frustration.

In parallel, the PowerShell code opens a legitimate Booking.com administrative page in the default browser as a distraction mechanism and takes steps to give the victim the impression that the action is legitimate.

DCRat, also known as Dark Crystal RAT, is an off-the-shell .NET Trojan that can collect sensitive information and extend functionality through a plugin-based architecture. It has the ability to connect to external servers, profile infected systems, and listen for commands from the servers, allowing attackers to record keystrokes, execute arbitrary commands, and deliver additional payloads, much like a cryptocurrency miner.

cyber security

This campaign is an example of how attackers can leverage Living Off-The-Land (LotL) techniques, such as exploiting trusted system binaries such as ‘MSBuild.exe’, to take their attacks to the next stage, establish a deeper foothold, and maintain persistence within compromised hosts.

“The phishing emails specifically contain details of room rates in euros, suggesting that this campaign is actively targeting organizations in Europe,” Securonics said. “The use of Russian within the ‘v.proj’ MSBuild file associates this activity with Russian threat actors using DCRat.”

“Using customized MSBuild project files for proxy execution and actively tampering with Windows Defender exclusions demonstrates a deep understanding of modern endpoint protection mechanisms.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA breakthrough in PFAS removal
Next Article Amazon’s Ring doorbell comes with fire alarm, app store, and new sensors
user
  • Website

Related Posts

Black Cat behind SEO-tainting malware campaign targeting popular software search

January 7, 2026

Critical vulnerability in n8n (CVSS 10.0) allows unauthenticated attacker to gain complete control

January 7, 2026

Learn how AI-powered Zero Trust detects attacks without files or indicators

January 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Yes, LinkedIn banned AI agent startup Artisan, but now it’s back

OpenAI launches ChatGPT Health, says 230 million users ask health questions every week

Black Cat behind SEO-tainting malware campaign targeting popular software search

CES 2026: Follow live news from Caterpillar and Nvidia, and enjoy surprises from robotaxis, robots, and the show floor.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.