Matthew Cooper
Member
Hey everyone, I came across a report about a phishing campaign called ClickFix that has been targeting hotel systems and thought it was worth sharing. According to publicly available information, the campaign uses spear-phishing emails to trick hotel staff into clicking links that deploy malware like PureRAT. These emails often impersonate booking platforms and redirect users to fake verification pages. It seems the attackers are mainly after credentials for systems like Booking.com and Expedia, which they can potentially sell or misuse. The campaign has been active for several months, and researchers noted that it uses some sophisticated techniques, including PowerShell scripts, DLL side-loading, and even clipboard hijacking to increase the chance of success.
Interestingly, the attacks don’t only target staff. Some customers are approached through WhatsApp or email with legitimate-looking reservation details, encouraging them to verify their cards. The modular malware can capture keystrokes, webcam activity, files, and more, so the implications for privacy and security are significant.
I’m curious if anyone here has seen similar campaigns or has more insight into how these attacks evolve. The reports also mention that the malware setup has become more professional, almost like a service, making it easier for threat actors to scale the attacks. It’s a bit concerning how these campaigns keep improving over time.
Has anyone thought about ways hotels or individuals could better prepare against this type of phishing? The information I found was mostly from cybersecurity firms and public advisories, so it’s grounded in documented research rather than rumors.
Interestingly, the attacks don’t only target staff. Some customers are approached through WhatsApp or email with legitimate-looking reservation details, encouraging them to verify their cards. The modular malware can capture keystrokes, webcam activity, files, and more, so the implications for privacy and security are significant.
I’m curious if anyone here has seen similar campaigns or has more insight into how these attacks evolve. The reports also mention that the malware setup has become more professional, almost like a service, making it easier for threat actors to scale the attacks. It’s a bit concerning how these campaigns keep improving over time.
Has anyone thought about ways hotels or individuals could better prepare against this type of phishing? The information I found was mostly from cybersecurity firms and public advisories, so it’s grounded in documented research rather than rumors.