Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. ClickFix Campaign Targets European Hotels with Fake
ClickFix Campaign Targets European Hotels with Fake
NEWS

ClickFix Campaign Targets European Hotels with Fake

A sophisticated phishing campaign dubbed PHALT#BLYX is targeting European hospitality organizations with fake Booking.com cancellation emails that display...

Dylan H.

News Desk

February 13, 2026
3 min read

European Hotels Under Attack

A phishing campaign dubbed PHALT#BLYX is targeting the European hospitality sector with fake Booking.com cancellation emails that use a ClickFix technique combined with a fake Blue Screen of Death (BSoD) to trick hotel staff into executing malicious PowerShell commands deploying DCRat (Dark Crystal RAT).

Security researchers attribute the campaign to likely Russian-origin threat actors.


Attack Overview

AttributeDetails
Campaign NamePHALT#BLYX
Target SectorEuropean hospitality (hotels, resorts, booking agencies)
Attack VectorFake Booking.com cancellation emails
Social EngineeringClickFix + Fake Blue Screen of Death
MalwareDCRat (Dark Crystal RAT)
AttributionLikely Russian-origin

Attack Chain

Step 1: Victim receives fake Booking.com cancellation email
         |
Step 2: Email link opens page displaying fake Blue Screen of Death
         |
Step 3: BSoD instructs victim to press Win+R and paste a "recovery command"
         |
Step 4: Victim executes PowerShell command
         |
Step 5: DCRat loader downloaded and executed
         |
Step 6: Attacker gains full remote access

Why Hospitality Is Targeted

  1. High email volume — Staff process dozens of booking emails daily
  2. Urgency culture — Hospitality demands rapid response to guest issues
  3. Platform dependency — Hotels rely heavily on Booking.com, making impersonation effective
  4. Seasonal staff — High turnover means less security training
  5. Shared workstations — Front desk computers used by multiple staff
  6. Valuable data — Guest PII, payment cards, and passport scans

DCRat Capabilities

CapabilityDescription
KeyloggingRecords all keystrokes including credentials
Screen captureScreenshots and video recording
File exfiltrationSteals files from infected systems
Credential theftHarvests saved browser passwords
Command executionRuns arbitrary commands
PersistenceSurvives reboots via registry and scheduled tasks

Hotel systems contain guest PII, booking platform credentials, payment systems, and Wi-Fi management — giving attackers broad access from a single infection.


Protection Recommendations

For Staff

  1. Never paste commands from any website into PowerShell or the Run dialog
  2. Verify Booking.com communications by logging directly into the Extranet
  3. Recognize that BSoD does not appear in web browsers — A real crash would not show in Chrome

For IT Teams

  1. Restrict PowerShell execution via AppLocker or WDAC on front desk workstations
  2. Disable the Run dialog via Group Policy for non-admin users
  3. Segment the network — Isolate front desk from payment and guest data systems
  4. Deploy EDR with behavioral detection for ClickFix patterns
  5. Implement DMARC, DKIM, SPF to reduce email spoofing
  6. Add external email banners warning when emails come from outside the organization

Sources

  • SecurityWeek — ClickFix Campaign Targets European Hotels
  • Dark Reading — Fake Booking.com Emails Deploy DCRat via BSoD Trick

Related Reading

  • AI-Powered Phishing Achieves 54% Click-Through Rate
  • FBI Warns of AI-Generated Deepfake Phishing Targeting
  • Claude AI Artifacts Abused to Distribute macOS Infostealer
#Phishing#ClickFix#Hospitality#DCRat#Social Engineering#Europe

Related Articles

New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures

A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka compiler, delivered through deceptive ClickFix browser-fix lure campaigns.

5 min read

ClickFix Attacks Evolve — Now Abusing DNS nslookup for

Microsoft discloses a new ClickFix variant that uses DNS nslookup commands to retrieve and execute malicious PowerShell payloads, marking the first known...

4 min read

Claude AI Artifacts Abused to Distribute macOS Infostealer

Threat actors are abusing publicly shared Claude AI artifacts and Google Ads to deliver the MacSync infostealer to macOS users through ClickFix social...

3 min read
Back to all News