Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. ClickFix Campaign Targets European Hotels with Fake
ClickFix Campaign Targets European Hotels with Fake
NEWS

ClickFix Campaign Targets European Hotels with Fake

A sophisticated phishing campaign dubbed PHALT#BLYX is targeting European hospitality organizations with fake Booking.com cancellation emails that display...

Dylan H.

News Desk

February 13, 2026
3 min read

European Hotels Under Attack

A phishing campaign dubbed PHALT#BLYX is targeting the European hospitality sector with fake Booking.com cancellation emails that use a ClickFix technique combined with a fake Blue Screen of Death (BSoD) to trick hotel staff into executing malicious PowerShell commands deploying DCRat (Dark Crystal RAT).

Security researchers attribute the campaign to likely Russian-origin threat actors.


Attack Overview

AttributeDetails
Campaign NamePHALT#BLYX
Target SectorEuropean hospitality (hotels, resorts, booking agencies)
Attack VectorFake Booking.com cancellation emails
Social EngineeringClickFix + Fake Blue Screen of Death
MalwareDCRat (Dark Crystal RAT)
AttributionLikely Russian-origin

Attack Chain

Step 1: Victim receives fake Booking.com cancellation email
         |
Step 2: Email link opens page displaying fake Blue Screen of Death
         |
Step 3: BSoD instructs victim to press Win+R and paste a "recovery command"
         |
Step 4: Victim executes PowerShell command
         |
Step 5: DCRat loader downloaded and executed
         |
Step 6: Attacker gains full remote access

Why Hospitality Is Targeted

  1. High email volume — Staff process dozens of booking emails daily
  2. Urgency culture — Hospitality demands rapid response to guest issues
  3. Platform dependency — Hotels rely heavily on Booking.com, making impersonation effective
  4. Seasonal staff — High turnover means less security training
  5. Shared workstations — Front desk computers used by multiple staff
  6. Valuable data — Guest PII, payment cards, and passport scans

DCRat Capabilities

CapabilityDescription
KeyloggingRecords all keystrokes including credentials
Screen captureScreenshots and video recording
File exfiltrationSteals files from infected systems
Credential theftHarvests saved browser passwords
Command executionRuns arbitrary commands
PersistenceSurvives reboots via registry and scheduled tasks

Hotel systems contain guest PII, booking platform credentials, payment systems, and Wi-Fi management — giving attackers broad access from a single infection.


Protection Recommendations

For Staff

  1. Never paste commands from any website into PowerShell or the Run dialog
  2. Verify Booking.com communications by logging directly into the Extranet
  3. Recognize that BSoD does not appear in web browsers — A real crash would not show in Chrome

For IT Teams

  1. Restrict PowerShell execution via AppLocker or WDAC on front desk workstations
  2. Disable the Run dialog via Group Policy for non-admin users
  3. Segment the network — Isolate front desk from payment and guest data systems
  4. Deploy EDR with behavioral detection for ClickFix patterns
  5. Implement DMARC, DKIM, SPF to reduce email spoofing
  6. Add external email banners warning when emails come from outside the organization

Sources

  • SecurityWeek — ClickFix Campaign Targets European Hotels
  • Dark Reading — Fake Booking.com Emails Deploy DCRat via BSoD Trick

Related Reading

  • AI-Powered Phishing Achieves 54% Click-Through Rate
  • FBI Warns of AI-Generated Deepfake Phishing Targeting
  • Claude AI Artifacts Abused to Distribute macOS Infostealer
#Phishing#ClickFix#Hospitality#DCRat#Social Engineering#Europe

Related Articles

Apple Account Change Alerts Abused to Send Phishing Emails

Threat actors are exploiting Apple's legitimate account change notification system to embed fake iPhone purchase scams inside genuine Apple emails,...

4 min read

Cybercriminals Target Accountants to Drain Russian Firms' Bank Accounts

Cybercriminals are stealing millions from Russian companies by compromising accountants' computers and disguising fraudulent transfers as routine salary...

5 min read

Traffic Violation Scams Switch to QR Codes in New Phishing Texts

Scammers are sending fake "Notice of Default" traffic violation SMS messages impersonating state courts across the U.S., pressuring recipients to scan a...

4 min read
Back to all News