Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (netcraft.com) Exploitation of Webflow Platform for Large-Scale Booking.com Brand Impersonation and SEO Poisoning

(netcraft.com) Exploitation of Webflow Platform for Large-Scale Booking.com Brand Impersonation and SEO Poisoning

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (netcraft.com) Exploitation of Webflow Platform for Large-Scale Booking.com Brand Impersonation and SEO Poisoning

    Threat actors are abusing Webflow’s platform to host large-scale Booking.com brand impersonation via SEO poisoning, leveraging HTTPS-enabled lookalike subdomains for credibility.

    In brief - Cybercriminals exploit Webflow’s infrastructure to deploy fraudulent Booking.com lookalikes, using keyword-stuffed subdomains (e.g., bookinggcomdubaflighttickets[.]webflow[.]io) and static image-based pages to manipulate search rankings. The campaign targets high-intent travel queries, particularly Dubai-related, during peak seasons, eroding user trust and brand integrity.

    Technically - The operation combines visual mimicry with SEO poisoning, embedding keyword-dense HTML to deceive search engines while presenting static, full-page replicas of Booking.com. Subdomains feature deliberate misspellings and travel-related terms to capture organic traffic. The abuse of Webflow’s HTTPS certificates complicates detection, while the scalable infrastructure suggests potential redirection to credential harvesting or monetization endpoints. Monitor for lookalike domains and seasonal keyword trends.

    Source: https://www.netcraft.com/blog/booking-dot-com-lookalike-pages-hosted-on-webflow-subdomains

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups