<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[⚠️ 🎣 We’re seeing an ongoing phishing campaign targeting hotels and hosts, impersonating messages from &#x27;Booking.com&#x27; - see sample image below.]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/26a0.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--warning" style="height:23px;width:auto;vertical-align:middle" title="⚠" alt="⚠" />️ <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f3a3.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--fishing_pole_and_fish" style="height:23px;width:auto;vertical-align:middle" title="🎣" alt="🎣" /> We’re seeing an ongoing phishing campaign targeting hotels and hosts, impersonating messages from 'Booking.com' - see sample image below.</p><p>Here’s what we know so far: </p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/27a1.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--arrow_right" style="height:23px;width:auto;vertical-align:middle" title="➡" alt="➡" />️ Emails appear to target actual 'Booking.com' host email addresses, which may indicate that recipient data was obtained from a previous breach - the timing is particularly relevant given the 'Booking.com' data breach last month (see article - <a href="https://www.bbc.co.uk/news/articles/cly00jnnxypo" rel="nofollow noopener"><span>https://www.</span><span>bbc.co.uk/news/articles/cly00j</span><span>nnxypo</span></a>).<br />   <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/27a1.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--arrow_right" style="height:23px;width:auto;vertical-align:middle" title="➡" alt="➡" />️ While the emails appear to come from 'Booking.com', they are actually sent via compromised accounts.<br />   <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/27a1.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--arrow_right" style="height:23px;width:auto;vertical-align:middle" title="➡" alt="➡" />️ Messages typically reference a “complaint” or “special request” requiring urgent action.<br />   <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/27a1.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--arrow_right" style="height:23px;width:auto;vertical-align:middle" title="➡" alt="➡" />️ Links often use URL shorteners or services like 'share.google' to hide phishing pages<br />   <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/27a1.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--arrow_right" style="height:23px;width:auto;vertical-align:middle" title="➡" alt="➡" />️ Goal is to steal login credentials or payment details through fake portals</p><p>These phishing emails are very convincing, so extra caution is prudent - here are some steps you can take to reduce risk: </p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2705.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--white_check_mark" style="height:23px;width:auto;vertical-align:middle" title="✅" alt="✅" /> Be cautious of urgency or pressure in booking-related emails<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2705.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--white_check_mark" style="height:23px;width:auto;vertical-align:middle" title="✅" alt="✅" /> Avoid clicking shortened or unfamiliar links<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2705.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--white_check_mark" style="height:23px;width:auto;vertical-align:middle" title="✅" alt="✅" /> Verify requests by logging into the platform directly<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2705.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--white_check_mark" style="height:23px;width:auto;vertical-align:middle" title="✅" alt="✅" /> Report suspicious emails internally or to the platform provider</p><p><a href="https://infosec.exchange/tags/CyberSecurity" rel="tag">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Phishing" rel="tag">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/InfoSec" rel="tag">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/BookingCom" rel="tag">#<span>BookingCom</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/532/834/646/227/739/original/4d37f1da99083e2e.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/5bb82879-dfe9-4fb0-ba05-4410da906fe5/we-re-seeing-an-ongoing-phishing-campaign-targeting-hotels-and-hosts-impersonating-messages-from-booking.com-see-sample-image-below.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 05:57:45 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/5bb82879-dfe9-4fb0-ba05-4410da906fe5.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 07 May 2026 10:33:00 GMT</pubDate><ttl>60</ttl></channel></rss>