Booking.com Phishing Scam: How Hackers Use Fake BSoD Pages to Deploy DCRat (2026)

A new cyber threat is emerging, and it's a sophisticated attack on the hospitality industry. 'PHALT#BLYX' Campaign: When Fake Booking Emails Lead to Digital Disaster

Cybersecurity experts have uncovered a malicious campaign, named PHALT#BLYX, which employs deceptive tactics to lure unsuspecting hotel staff into a trap. The attackers use fake Booking.com cancellation emails, a clever twist to gain initial access. These emails trick victims into executing malicious PowerShell commands, which covertly retrieve and run remote code.

Here's how the attack unfolds: victims receive phishing emails, seemingly from Booking.com, warning of reservation cancellations. The email link directs them to a fake website designed to mimic Booking.com. Here's where it gets tricky: the site displays a fake CAPTCHA page, followed by a bogus Blue Screen of Death (BSoD) page with 'recovery instructions.' These instructions manipulate victims into running a PowerShell command that installs the DCRat malware.

This malware deployment is intricate. The PowerShell dropper downloads an MSBuild project file, which, when executed, runs a hidden payload. This payload disables Microsoft Defender Antivirus, ensures the malware's persistence, and launches the DCRat malware. The malware is cunning; if it lacks admin rights, it spams the user with UAC prompts, hoping they'll grant access out of annoyance.

But there's more. The PowerShell code also opens the legitimate Booking.com admin page, a clever distraction to make the attack seem authentic. DCRat, a powerful .NET trojan, steals sensitive data and expands its capabilities via plugins. It connects to an external server, profiles the infected system, and awaits commands, allowing attackers to capture keystrokes, execute commands, and deploy additional threats like cryptocurrency miners.

This campaign showcases a dangerous trend: threat actors are exploiting trusted system tools like MSBuild.exe to advance their attacks, maintain persistence, and evade detection. The use of Euros in the phishing emails indicates a focus on European targets, while the Russian language in the MSBuild file suggests a connection to Russian threat actors.

And here's the controversial part: the attackers' sophisticated manipulation of Windows Defender exclusions reveals a deep knowledge of endpoint security. This raises questions about the effectiveness of current security measures and the evolving tactics of cybercriminals.

What do you think? Are we prepared for these advanced threats? Share your thoughts and let's discuss the implications of this cunning campaign.

Booking.com Phishing Scam: How Hackers Use Fake BSoD Pages to Deploy DCRat (2026)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Rueben Jacobs

Last Updated:

Views: 6501

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.