By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails
Computing

Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails

News Room
Last updated: 2025/03/13 at 12:34 PM
News Room Published 13 March 2025
Share
SHARE

Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online travel agency Booking.com using an increasingly popular social engineering technique called ClickFix to deliver credential-stealing malware.

The activity, the tech giant said, started in December 2024 and operates with the end goal of conducting financial fraud and theft. It’s tracking the campaign under the moniker Storm-1865.

“This phishing attack specifically targets individuals in hospitality organizations in North America, Oceania, South and Southeast Asia, and Northern, Southern, Eastern, and Western Europe, that are most likely to work with Booking.com, sending fake emails purporting to be coming from the agency,” Microsoft said in a report shared with The Hacker News.

The ClickFix technique has become widespread in recent months, as it tricks users into executing malware under the guise of fixing a supposed (i.e., non-existent) error by copying, pasting, and launching deceptive instructions that activate the infection process. It was first detected in the wild in October 2023.

The attack sequence starts with Storm-1865 sending a malicious email to a targeted individual about a negative review left by a purported guest on Booking.com, and asking them for their “feedback.” The message also embeds a link, or a PDF attachment containing one that seemingly directs the recipients to the booking site.

Cybersecurity

However, in reality, clicking on it leads the victim to a fake CAPTCHA verification page that’s overlaid on a “subtly visible background designed to mimic a legitimate Booking.com page.” In doing so, the idea is to lend a false sense of security and increase the likelihood of a successful compromise.

“The fake CAPTCHA is where the webpage employs the ClickFix social engineering technique to download the malicious payload,” Microsoft said. “This technique instructs the user to use a keyboard shortcut to open a Windows Run window, then paste and launch a command that the webpage adds to the clipboard.”

The command, in a nutshell, uses the legitimate mshta.exe binary to drop the next-stage payload, which comprises various commodity malware families like XWorm, Lumma stealer, VenomRAT, AsyncRAT, Danabot, and NetSupport RAT.

Redmond said it previously observed Storm-1865 targeting buyers using e-commerce platforms with phishing messages leading to fraudulent payment web pages. The incorporation of the ClickFix technique, therefore, illustrates a tactical evolution designed to slip past conventional security measures against phishing and malware.

“The threat actor that Microsoft tracks as Storm-1865 encapsulates a cluster of activity conducting phishing campaigns, leading to payment data theft and fraudulent charges,” it added.

“These campaigns have been ongoing with increased volume since at least early 2023 and involve messages sent through vendor platforms, such as online travel agencies and e-commerce platforms, and email services, such as Gmail or iCloud Mail.”

Storm-1865 represents just one of the many campaigns that have embraced ClickFix as a vector for malware distribution. Such is the effectiveness of this technique that even Russian and Iranian nation-state groups like APT28 and MuddyWater have adopted it to lure their victims.

“Notably, the method capitalizes on human behavior: by presenting a plausible ‘solution’ to a perceived problem, attackers shift the burden of execution onto the user, effectively sidestepping many automated defenses,” Group-IB said in an independent report published today.

One such campaign documented by the Singaporean cybersecurity company involves utilizing ClickFix to drop a downloader named SMOKESABER, which then serves as a conduit for Lumma Stealer. Other campaigns have leveraged malvertising, SEO poisoning, GitHub issues, and spamming forums or social media sites with links to ClickFix pages.

“The ClickFix technique marks an evolution in adversarial social engineering strategies, leveraging user trust and browser functionality for malware deployment,” Group-IB said. “The rapid adoption of this method by both cybercriminals and APT groups underscores its effectiveness and low technical barrier.”

Some of the other ClickFix campaigns that have been documented are listed below –

The diverse infection mechanisms of Lumma Stealer is further exemplified by the discovery of another campaign that uses bogus GitHub repositories featuring artificial intelligence (AI)-content to deliver the stealer via a loader referred to as SmartLoader.

Cybersecurity

“These malicious repositories are disguised as non-malicious tools, including game cheats, cracked software, and cryptocurrency utilities,” Trend Micro said in an analysis published earlier this week. “The campaign entices victims with promises of free or illicit unauthorized functionality, prompting them to download ZIP files (e.g., Release.zip, Software.zip).”

The operation serves to highlight how threat actors are abusing the trust associated with popular platforms like GitHub for malware propagation.

The findings come as Trustwave detailed an email phishing campaign that makes use of invoice-related decoys to distribute an updated version of another stealer malware called StrelaStealer, which is assessed to be operated by a single threat actor dubbed Hive0145.

“StrelaStealers samples include custom multi-layer obfuscation and code-flow flattening to complicate its analysis,” the company said. “It has been reported that the threat actor potentially developed a specialized crypter called ‘Stellar loader,’ specifically, to be used with the StrelaStealer.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Kuo: Apple Knows Apple Intelligence is ‘Underwhelming’ and Won’t Drive iPhone Upgrades
Next Article The EU has a weapon in the war of tariffs with the US and is to direct them to Republican states
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

I’m excited about Panasonic’s Z95B OLED – could it be a contender for TV of the year? | Stuff
Gadget
The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That
Computing
When Video Games Journalism Eats Itself, We All Lose Out | Keith Stuart
Software
Manufacturers think you want thinner phones, but survey shows otherwise
News

You Might also Like

Computing

The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

9 Min Read
Computing

X Square Robot raises several hundred million yuan in Series A funding led by Meituan · TechNode

1 Min Read
Computing

Access Bank, ABC top five lenders risking CBK penalties for raising loan rates

4 Min Read
Computing

10 Best Windows Screen Recording Software in 2025 |

31 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?