Fake Windows BSODs check in at Europe's hotels to con staff into running malware
- Reference: 1767709147
- News link: https://www.theregister.co.uk/2026/01/06/russia_hackers_hotel_bsods/
- Source link:
In [1]a report published this week , Securonix threat researchers said they have been tracking a stealthy infection campaign they're calling PHALT#BLYX, centered around a social engineering variant of the infamous ClickFix attack that begins with phishing emails mimicking Booking.com reservation cancellations.
The setup is straightforward: a hotel worker receives an email that appears to be from Booking.com, usually warning about an eye-watering charge in euros. When they follow the "See details" link, they're taken to what looks like a real Booking.com page – except instead of a reservation, they're met with a fake verification screen that quickly gives way to a full-screen Windows BSOD scare.
[2]
The bogus BSOD is designed to panic the user into "fixing" the non-existent error by performing a series of steps that ultimately have them paste and execute a malicious PowerShell command, the classic hallmark of a ClickFix attack. Because the victim manually runs the code themselves, it sidesteps many automated security controls that would block traditional drive-by malware download methods.
[3]Cybercrook claims to be selling infrastructure info about three major US utilities
[4]Finnish cops grill crew of ship suspected of undersea cable sabotage
[5]Ministers confirm breach at UK Foreign Office but details remain murky
[6]Russian hackers debut simple ransomware service, but store keys in plain text
Once the command is executed, the system quietly downloads additional files and uses a legitimate Windows component to execute the attackers' code, helping the malware blend in with regular activity and slip past security tools. The end result is the installation of a remote access trojan that gives the intruders ongoing control of the compromised machine, allowing them to spy on activity and deliver further malicious software, according to Securonix.
The security firm notes that the attackers have evolved their infection chain over several months, moving away from earlier, simpler HTML Application techniques to the more sophisticated MSBuild-based execution. That shift makes the malicious activity harder to detect with conventional antivirus tools.
[7]
The emphasis on euro-denominated charges and the targeting of hospitality organizations during a busy holiday season suggests a campaign squarely aimed at European companies, the researchers said. There are additional artifacts in the MSBuild project file that indicate Russian-language usage, and the DCRat family itself is widely traded on Russian underground forums, strengthening suspicions that miscreants linked to Russia may be responsible. ®
Get our [8]Tech Resources
[1] https://www.securonix.com/blog/analyzing-phaltblyx-how-fake-bsods-and-trusted-build-tools-are-used-to-construct-a-malware-infection/
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aV1ADX_y7R55PK-AJ0ZJrwAAANY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[3] https://www.theregister.com/2026/01/02/critical_utility_files_for_sale/
[4] https://www.theregister.com/2026/01/02/finnish_cops_interviewing_fitburg_crew/
[5] https://www.theregister.com/2025/12/19/uk_foreign_office_hack/
[6] https://www.theregister.com/2025/12/11/cybervolk_ransomware_is_back/
[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aV1ADX_y7R55PK-AJ0ZJrwAAANY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[8] https://whitepapers.theregister.com/
Other approach
I made some reservations on booking.com for my old in-laws, and yesterday I got a WhatsApp message from a phone in India, with an ID of a clothing company, with a link to "confirm my data". The "confirmation" website was a cheap rip-off of booking.com, with the correct reservation information, asking for confirmation of paymen,t but with a pop-up saying that I had only one chance to enter the credit card data, and could not go back or reload the page, and had only five minutes to comply before they cancelled the reservation (read that with an ED-209 voice). Of course, I didn't, but I am quite sure my in-laws could fall for this trick.
I've reported this attempt to booking.com and asked how the scammers were able to get my name, cell phone number, and reservation code. No replies so far.
WTF can non techies override security software ?
although on the plus side, my idea for aashtrays for motorbikes looks like it's getting funding.
Fire into the frying pan
As an ex-customer of booking.com, I'd prefer a malware infection to visiting the booking.com website.