By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
Computing

Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat

News Room
Last updated: 2026/01/06 at 7:58 AM
News Room Published 6 January 2026
Share
Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
SHARE

Jan 06, 2026Ravie LakshmananMalware / Endpoint Security

Source: Securonix

Cybersecurity researchers have disclosed details of a new campaign dubbed PHALT#BLYX that has leveraged ClickFix-style lures to display fixes for fake blue screen of death (BSoD) errors in attacks targeting the European hospitality sector.

The end goal of the multi-stage campaign is to deliver a remote access trojan known as DCRat, according to cybersecurity company Securonix. The activity was detected in late December 2025.

“For initial access, the threat actors utilize a fake Booking.com reservation cancellation lure to trick victims into executing malicious PowerShell commands, which silently fetch and execute remote code,” researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee said.

Cybersecurity

The starting point of the attack chain is a phishing email impersonating Booking.com that contains a link to a fake website (e.g., “low-house[.]com”). The messages warn recipients of unexpected reservation cancellations, urging them to click the link to confirm the cancellation.

The website to which the victim is redirected masquerades as Booking.com, and serves a fake CAPTCHA page that leads them to a bogus BSoD page with “recovery instructions” to open the Windows Run dialog, paste a command, and press the Enter key. In reality, this results in the execution of a PowerShell command that ultimately deploys DCRat.

Specifically, this entails a multi-step process that commences with the PowerShell dropper downloading an MSBuild project file (“v.proj”) from “2fa-bns[.]com”, which is then executed using “MSBuild.exe” to run an embedded payload responsible for configuring Microsoft Defender Antivirus exclusions to evade detection, setting up persistence on the host in the Startup folder, and launching the RAT malware after downloads it from the same location as the MSBuild project.

It’s also capable of disabling the security program altogether if found to be running with administrator privileges. If it doesn’t have elevated rights, the malware enters a loop that triggers a Windows User Account Control (UAC) prompt every two seconds for three times in hopes that the victim will grant it the necessary permissions out of sheer frustration.

In tandem, the PowerShell code takes steps to open the legitimate Booking.com admin page in the default browser as a distraction mechanism and to give an impression to the victim that the action was legitimate.

DCRat, also called Dark Crystal RAT, is an off-the-shell .NET trojan that can harvest sensitive information and expand its functionality by means of a plugin-based architecture. It’s equipped to connect to an external server, profile the infected system, and await incoming commands from the server, enabling the attackers to log keystrokes, run arbitrary commands, and deliver additional payloads like a cryptocurrency miner.

Cybersecurity

The campaign is an example of how threat actors are leveraging living-off-the-land (LotL) techniques, such as abusing trusted system binaries like “MSBuild.exe,” to move the attack to the next stage, establish a deeper foothold, and maintain persistence within compromised hosts.

“The phishing emails notably feature room charge details in Euros, suggesting the campaign is actively targeting European organizations,” Securonix said. “The use of the Russian language within the ‘v.proj’ MSBuild file links this activity to Russian threat factors using DCRat.”

“The use of a customized MSBuild project file to proxy execution, coupled with aggressive tampering of Windows Defender exclusions, demonstrates a deep understanding of modern endpoint protection mechanisms.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Asus’ dual screen gaming laptop is excessive in all the right ways Asus’ dual screen gaming laptop is excessive in all the right ways
Next Article Down 72% from all-time highs: Is this software stock a buy because it’s aggressively buying back its shares? Down 72% from all-time highs: Is this software stock a buy because it’s aggressively buying back its shares?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

BingX AI Bingo Integrates TradFi Suite to Expand Intelligent, Multi-Asset Trading | HackerNoon
BingX AI Bingo Integrates TradFi Suite to Expand Intelligent, Multi-Asset Trading | HackerNoon
Computing
The 5 Best Music Apps For Apple CarPlay – BGR
The 5 Best Music Apps For Apple CarPlay – BGR
News
What is the Arctic Frost provision at the center of Graham's funding hold?
What is the Arctic Frost provision at the center of Graham's funding hold?
News
The future of AGI should not come at the expense of our planet · TechNode
The future of AGI should not come at the expense of our planet · TechNode
Computing

You Might also Like

BingX AI Bingo Integrates TradFi Suite to Expand Intelligent, Multi-Asset Trading | HackerNoon
Computing

BingX AI Bingo Integrates TradFi Suite to Expand Intelligent, Multi-Asset Trading | HackerNoon

3 Min Read
The future of AGI should not come at the expense of our planet · TechNode
Computing

The future of AGI should not come at the expense of our planet · TechNode

9 Min Read
FIMI launches Mini 3 drone featuring Sony 48MP sensor and 249g weight · TechNode
Computing

FIMI launches Mini 3 drone featuring Sony 48MP sensor and 249g weight · TechNode

1 Min Read
TikTok says US ban would “trample free speech” as House passes updated bill · TechNode
Computing

TikTok says US ban would “trample free speech” as House passes updated bill · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?