Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
MajorDoMo RCE Vulnerability Exposes Servers Code Execution
May 6, 2026
Taiwan HSR Hacked: Radio Spoofing Halts High Speed
May 6, 2026
Home/Threats/Hackers Hijack Hotel Booking to Scam Guests with Workflows Fake
Threats

Hackers Hijack Hotel Booking to Scam Guests with Workflows Fake

Travelers worldwide are falling victim to a sophisticated fraud scheme that weaponizes their own hotel reservations. Cybercriminals are hijacking trusted hotel booking workflows, leveraging...

Emy Elsamnoudy
Emy Elsamnoudy
April 1, 2026 4 Min Read
2 0

Travelers worldwide are falling victim to a sophisticated fraud scheme that weaponizes their own hotel reservations. Cybercriminals are hijacking trusted hotel booking workflows, leveraging legitimate communication channels to deliver highly convincing fake payment requests to guests. This tactic often catches victims unaware, as detailed in recent research on this fraud scheme.

The fraud starts with something as simple as a WhatsApp message. It appears to come from a hotel’s Guest Relations team, references the guest’s real booking details, and asks them to verify payment before arrival.

Since the message includes accurate trip information — the property name, stay dates, and sometimes even the exact amount due — it feels like a routine pre-trip notice rather than an attack.

That sense of familiarity is precisely what makes it work. Attackers do not need polished writing or complex tools. They just need enough real context to make the fraud feel like normal customer service.

Analysts and researchers at Gen Digital identified and documented this threat in a detailed investigation published March 25, 2026.

Researchers Martin Chlumecký and Luis Corrons named it the Reservation Hijack Scam, pointing out that it is not simply a phishing message with a travel theme but a full-scale workflow attack built on stolen context and relayed trust.

The highest volume of observed activity was concentrated across the United Kingdom, France, Germany, the United States, Brazil, and Australia.

The scam operates through two main fronts. The first involves booking-platform lures, where victims receive messages through WhatsApp, SMS, email, or Booking.com messaging that appear to come from hotel staff but push them toward fake payment portals.

The second is more dangerous: attackers directly compromise hotel-side software platforms such as Cloudbeds — a widely used hospitality management system — by phishing hotel employees to steal their login credentials.

Scam message received by a victim using data from a real reservation (Source - GenDigital)
Scam message received by a victim using data from a real reservation (Source – GenDigital)

Once inside, they access real reservation data and use legitimate hotel communication tools to message guests, making the fraud nearly impossible to separate from a genuine hotel interaction.

How Attackers Compromise Hotel Systems From the Inside

The hotel software compromise path is where this scam truly escalates. After stealing staff credentials through fake login pages, attackers log into real hotel management environments and gain full visibility into future reservations — including guest names, contact details, stay windows, and payment context.

In some cases, they deployed what researchers called a Scam-Yourself Attack Tactic, tricking hotel partners into running a malicious command disguised as a mandatory security update.

That command installed a remote access trojan, giving the attacker a persistent foothold inside the system.

Phishing e-mail message posing as Booking.com security team (Source - GenDigital)
Phishing e-mail message posing as Booking.com security team (Source – GenDigital)

With that access established, the attacker could then send fraudulent payment requests directly through legitimate hotel or booking-linked accounts — channels the guest already associated with their real reservation.

Victims in documented cases received professionally styled PDF documents impersonating hotel groups, complete with payment deadlines of 24 to 48 hours.

Victim is redirected to typo-squatted domains designed to harvest card details, bank transfers or other payment information (Source - GenDigital)
Victim is redirected to typo-squatted domains designed to harvest card details, bank transfers or other payment information (Source – GenDigital)

Some of those PDFs were hosted on legitimate partner storage that had already been hijacked, adding yet another layer of false credibility before redirecting victims to typo-squatted domains — such as frontdesk-reservation[.]com, frontdesk-online[.]biz, and hotel.form842987[.]digital — built to harvest card numbers and bank transfer details.

If any message claiming to be from a hotel asks you to verify or re-enter payment details — whether through WhatsApp, SMS, email, or inside an existing booking thread — do not tap the link.

Go directly to the hotel’s official website or the original booking platform on your own. If you have already entered payment information, contact your bank immediately, cancel the card, turn on transaction alerts, and stay alert for follow-on fraud attempts in the days ahead.

Hospitality businesses must now treat their guest communication tools as part of their core security infrastructure.

Phishing-resistant authentication for all staff, tighter access controls around reservation data exports, anomaly detection within messaging workflows, and faster incident response plans are no longer optional extras.

Smaller properties, which often rely on lean teams and fast communication tools, are particularly at risk and should implement multi-factor authentication immediately to block credential theft before it reaches their guests.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerphishingSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Windows 11 Emergency Update Fixes Installation Loop Issues

Next Post

ShinyHunters Claim Alleged Cisco Source Code & Data

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Detect Phishing-to-RMM Attacks Analysts Trusted-Tool
May 6, 2026
Hackers Exploit Microsoft Teams to Steal Credentials &
May 6, 2026
Critical Fanwei E-cology10 Server Fl Vulnerability Could
May 6, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us