{"id":22846,"date":"2024-06-04T17:30:46","date_gmt":"2024-06-04T13:30:46","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/attacks-on-hotel-business\/22846\/"},"modified":"2024-06-04T17:31:01","modified_gmt":"2024-06-04T13:31:01","slug":"attacks-on-hotel-business","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/attacks-on-hotel-business\/22846\/","title":{"rendered":"E-mail attacks on the hotel business"},"content":{"rendered":"<p>Since last summer, both hotel owners and employees have been receiving malicious e-mails disguised as ordinary correspondence from previous or potential guests. In some cases, they appear as typical messages sent to the target hotel\u2019s public e-mail address. In others, they resemble urgent requests from Booking.com to respond to user comments the platform supposedly received. In reality, it\u2019s attackers trying to either get hold of employees\u2019 login credentials or infect hotel systems with malware.\n<\/p>\n<h2>Tricks of the trade<\/h2>\n<p>\nWhen targeting organizations, threat actors usually need a plausible pretext for their e-mails. In the case of hotels, devising such a pretext is relatively easy: responding to sudden customer inquiries is part and parcel of the job for hotel workers with publicly available e-mail addresses. The be-all-and-end-all for a hotel is reputation, so employees strive to resolve conflicts or fulfill requests as quickly as possible. This eagerness leads them to follow links or open attached files within these e-mails, falling prey to cybercriminals. In essence, this threat could be described as a \u201ccustomer focus attack\u201d.<\/p>\n<p>Adding to the challenge of identifying the threat is the fact that attackers don\u2019t need to create a specific, business-appropriate e-mail address. Hotel staff routinely receive inquiries and complaints from guests using free e-mail services. So attackers use them too \u2014 with Gmail being the most common.\n<\/p>\n<h2>E-mail content<\/h2>\n<p>\nGenerally, the correspondence follows one of two topics: complaints, or inquiries to clarify some details. In the first case, hotel employees receive a message from a \u201cdissatisfied guest\u201d. The complaint could be about unethical staff, double-charged bank cards, poor accommodation conditions, and so on. To back up their words, attackers may offer supporting evidence such as videos, photos, bank statements and the like.<\/p>\n<div id=\"attachment_51395\" style=\"width: 1845px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/06\/04173008\/attack-on-hotel-business-complaint.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51395\" class=\"wp-image-51395 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/06\/04173008\/attack-on-hotel-business-complaint.jpg\" alt=\"Example of a complaint regarding a conflict that allegedly occurred in a hotel\" width=\"1835\" height=\"369\"><\/a><p id=\"caption-attachment-51395\" class=\"wp-caption-text\">Example of a complaint regarding a conflict that allegedly occurred in a hotel<\/p><\/div>\n<p>Early this year, attackers modified their tactics. Instead of direct complaints, they started sending e-mails disguised as notifications from Booking.com \u2014 the popular online accommodation booking platform. The essence remains the same: someone supposedly left a negative review on the platform that hotel staff need to address as a matter of extreme urgency. This may seem like a different scam altogether, but the attack\u2019s goals and the e-mail technical headers (throwing light on the mailing engine) indicate that these e-mails are part of the same campaign.<\/p>\n<div id=\"attachment_51396\" style=\"width: 683px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/06\/04173019\/attack-on-hotel-business-booking-notification.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51396\" class=\"wp-image-51396 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/06\/04173019\/attack-on-hotel-business-booking-notification.jpg\" alt=\"E-mail mimicking a notification from Booking.com\" width=\"673\" height=\"970\"><\/a><p id=\"caption-attachment-51396\" class=\"wp-caption-text\">E-mail mimicking a notification from Booking.com<\/p><\/div>\n<p>In the inquiry-based e-mails, attackers pose as potential guests and request additional information about hotel services and pricing. The options are endless, with each message\u2019s subject and content almost always unique. Besides routine questions about transfers, meals, and rates, these pseudo-guests may inquire about a playroom for kids, a quiet space for remote work, or the availability of rooms with special historical or cultural significance.<\/p>\n<p>Here are some more examples of phishing e-mail subjects and content:<\/p>\n<ul>\n<li>\n<strong>Subject: <\/strong>Examining Different Payment Gateways for Amusement Park Passes.<br>\n<strong>Body: <\/strong>What are the consequences of canceling a reservation within a few weeks of the check-in date?<\/li>\n<li>\n<strong>Subject: <\/strong>Seeking clarification on making a reservation.<br>\n<strong>Body: <\/strong>Greetings! In case I misplace an item, what\u2019s the process for locating lost possessions during my stay?<\/li>\n<li>\n<strong>Subject: <\/strong>Enquiry about booking.<br>\n<strong>Body: <\/strong>Hi there! Does the room have a mini-bar, and what items are included?<\/li>\n<li>\n<strong>Subject: <\/strong>How to reserve a double room online without any hassle.<br>\n<strong>Body: <\/strong>What happens if guests arrive outside of normal check-in hours at your hotel?<\/li>\n<li>\n<strong>Subject: <\/strong>Securing exclusive hotel rooms: attention to finer details.<br>\n<strong>Body: <\/strong>Good afternoon, I\u2019m interested in staying at your hotel but I have some questions about the payment process. Can you assist me with that?<\/li>\n<li>\n<strong>Subject: <\/strong>Room Fresh Flowers and Plants.<br>\n<strong>Body: <\/strong>Are there options available to request fresh flowers or plants in the guest rooms?<\/li>\n<li>\n<strong>Subject: <\/strong>Laundry Facility Information.<br>\n<strong>Body: <\/strong>What information can you provide about the hotel\u2019s laundry facilities, including services offered and associated charges?<\/li>\n<li>\n<strong>Subject: <\/strong>Booking Request for Pet-Friendly Family Room.<br>\n<strong>Body: <\/strong>Our family and pets are looking forward to our stay. Can you provide a room that\u2019s suitable for pets? Information on pet amenities would be valuable.<\/li>\n<li>\n<strong>Subject: <\/strong>Inquiry for Rooms with Sustainable Energy Sources.<br>\n<strong>Body: <\/strong>Desire a room powered by sustainable energy sources to support eco-friendly living during my stay.<\/li>\n<li>\n<strong>Subject: <\/strong>Request for Assistance with Wine Tasting Tours.<br>\n<strong>Body: <\/strong>Can you arrange wine tasting tours at local vineyards or wineries?<\/li>\n<li>\n<strong>Subject: <\/strong>Dedicated Workspace in Rooms for Business Guests Inquiry.<br>\n<strong>Body: <\/strong>Are dedicated workspaces available in rooms for guests who need to work remotely?<\/li>\n<\/ul>\n<p>Note \u2013 these are actual verbatim examples that were used by attackers.<\/p>\n<p>As you can see, on the one hand, these are all perfectly plausible questions that real hotel customers ask. On the other, the subject and body of the e-mail are not always logically connected. It\u2019s as if, in some cases, the senders pulled them from some pre-compiled database in random order.\n<\/p>\n<h2>Multi-stage correspondence with fake clients<\/h2>\n<p>\nIn some cases, attackers adopt methods more common to targeted attacks \u2014 no malicious link is sent in the first or even the second e-mail. To lull the victim\u2019s vigilance, they initiate a conversation with one or more short, seemingly innocuous messages, asking questions about accommodation conditions at the hotel.<\/p>\n<p>For example, in the first message, an attacker posing as a potential customer claims to be planning a surprise for their wife. In the reply, the hotel employee clarifies the dates of stay and asks how the staff could assist with the surprise. Only then does the attacker send an e-mail with a link to download a malicious file, supposedly containing detailed instructions on creating a special atmosphere in the room \u2014with a promise of generous rewards for the staff\u2019s efforts, of course.<\/p>\n<div id=\"attachment_51397\" style=\"width: 1930px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/06\/04173038\/attack-on-hotel-business-multistage.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51397\" class=\"wp-image-51397 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/06\/04173038\/attack-on-hotel-business-multistage.png\" alt=\"Example of an attack involving preliminary exchange\" width=\"1920\" height=\"1080\"><\/a><p id=\"caption-attachment-51397\" class=\"wp-caption-text\">Example of an attack involving preliminary exchange<\/p><\/div>\n<h2>End goals<\/h2>\n<p>\nBy and large, the cybercriminals\u2019 objective in all these cases is to obtain credentials. These can then be used in other scams or simply sold, as databases of such usernames and passwords are in high demand on the dark web. Late last year, we wrote about how <a href=\"https:\/\/www.kaspersky.com\/blog\/booking-com-hacked-hotel-accounts-scam-customers\/50109\/\" target=\"_blank\" rel=\"noopener nofollow\">compromised hotel accounts on Booking.com<\/a> are being used to scam clients out of payment information. It\u2019s highly probable that the ultimate goal of the attackers in this case is to implement a similar scheme.<\/p>\n<p>As we wrote above, cybercriminals either lure the victim to a phishing site, or attempt to infect their computer with malware. Here\u2019s how they do it.\n<\/p>\n<h3>Malware infection<\/h3>\n<p>\nAttackers mostly use links to files with malicious content that are stored on legitimate file-sharing services. Less common are various methods of link masking \u2014 such as shortened URLs. These links can be in the e-mail body or in an attachment, for example a PDF document. In some cases, files with malicious content (such as infected Microsoft Word documents) are sent as attachments directly.<\/p>\n<p>If the victim follows the link and downloads the file or opens the attachment, a variety of malware may appear on their device, among which there is usually a password stealer. We\u2019ve encountered threats like the <a href=\"https:\/\/threats.kaspersky.com\/en\/threat\/Backdoor.MSIL.XWorm.gen\/\" target=\"_blank\" rel=\"noopener nofollow\">XWorm backdoor<\/a> and the <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2024_redline-reigns-as-most-prevalent-data-stealing-malware-kaspersky-finds\" target=\"_blank\" rel=\"noopener\">RedLine<\/a> stealer.\n<\/p>\n<h3>Phishing e-mails<\/h3>\n<p>\nIn some instances, phishing links lead to pages that mimic the Booking.com login form. Other times, the phishing page looks like a form for entering corporate credentials. If attackers manage to use these to access corporate e-mail accounts, a lot of doors open to them \u2014 such as hijacking the associated Booking.com account, or contacting customers while impersonating the hotel.<\/p>\n<div id=\"attachment_51398\" style=\"width: 1397px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/06\/04173056\/attack-on-hotel-business-pseudobooking.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51398\" class=\"wp-image-51398 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/06\/04173056\/attack-on-hotel-business-pseudobooking.jpg\" alt=\"Phishing website mimicking the Booking.com login page\" width=\"1387\" height=\"883\"><\/a><p id=\"caption-attachment-51398\" class=\"wp-caption-text\">Phishing website mimicking the Booking.com login page<\/p><\/div>\n<h2>How to defend against an attack<\/h2>\n<p>\nTo safeguard your hotel staff from falling victim to these schemes and protect your business, do the following:\n<\/p>\n<ul>\n<li>Run regular <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">security awareness training for employees<\/a>. This will equip them with the knowledge to resist social engineering techniques and spot cybercriminal tricks early. For example, in the case of the Booking.com e-mail scam, this can be done with the naked eye \u2014 just pay attention to the <em>From<\/em> A large and reputable service like Booking.com would never send notifications from a free e-mail address. Furthermore, a website mimicking the login page may hosted on a third-party domain that\u2019s completely unrelated to the travel platform.<\/li>\n<li>Implement <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">protection at the e-mail gateway level<\/a>. While employees might still receive pesky e-mails from scammers, phishing and malicious links along with dangerous attachments won\u2019t ever reach their inboxes.<\/li>\n<li>Install <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">robust security solutions<\/a> with anti-phishing technology on all devices used for work.<\/li>\n<li>Stay informed by reading our <a href=\"https:\/\/www.kaspersky.com\/blog\/\" target=\"_blank\" rel=\"noopener nofollow\">blog<\/a> to be among the first to learn about the latest e-mail threats<strong>.<\/strong>\n<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"kesb-trial\" value=\"15341\">\n","protected":false},"excerpt":{"rendered":"<p>Threat actors are targeting hotel staff with malicious and phishing e-mails.<\/p>\n","protected":false},"author":2760,"featured_media":22849,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[1815],"class_list":{"0":"post-22846","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-e-mail"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/attacks-on-hotel-business\/22846\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/attacks-on-hotel-business\/27526\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/attacks-on-hotel-business\/30198\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/attacks-on-hotel-business\/27678\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/attacks-on-hotel-business\/37592\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/attacks-on-hotel-business\/51393\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/attacks-on-hotel-business\/36530\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/attacks-on-hotel-business\/27846\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/attacks-on-hotel-business\/33671\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/attacks-on-hotel-business\/33336\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/e-mail\/","name":"e-mail"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2760"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22846"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22846\/revisions"}],"predecessor-version":[{"id":22848,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22846\/revisions\/22848"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22849"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}