News: 1767709147

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Fake Windows BSODs check in at Europe's hotels to con staff into running malware

(2026/01/06)


Russia-linked hackers are sneaking malware into European hotels and other hospitality outfits by tricking staff into installing it themselves through fake Windows Blue Screen of Death (BSOD) crashes.

In [1]a report published this week , Securonix threat researchers said they have been tracking a stealthy infection campaign they're calling PHALT#BLYX, centered around a social engineering variant of the infamous ClickFix attack that begins with phishing emails mimicking Booking.com reservation cancellations.

The setup is straightforward: a hotel worker receives an email that appears to be from Booking.com, usually warning about an eye-watering charge in euros. When they follow the "See details" link, they're taken to what looks like a real Booking.com page – except instead of a reservation, they're met with a fake verification screen that quickly gives way to a full-screen Windows BSOD scare.

[2]

The bogus BSOD is designed to panic the user into "fixing" the non-existent error by performing a series of steps that ultimately have them paste and execute a malicious PowerShell command, the classic hallmark of a ClickFix attack. Because the victim manually runs the code themselves, it sidesteps many automated security controls that would block traditional drive-by malware download methods.

[3]Cybercrook claims to be selling infrastructure info about three major US utilities

[4]Finnish cops grill crew of ship suspected of undersea cable sabotage

[5]Ministers confirm breach at UK Foreign Office but details remain murky

[6]Russian hackers debut simple ransomware service, but store keys in plain text

Once the command is executed, the system quietly downloads additional files and uses a legitimate Windows component to execute the attackers' code, helping the malware blend in with regular activity and slip past security tools. The end result is the installation of a remote access trojan that gives the intruders ongoing control of the compromised machine, allowing them to spy on activity and deliver further malicious software, according to Securonix.

The security firm notes that the attackers have evolved their infection chain over several months, moving away from earlier, simpler HTML Application techniques to the more sophisticated MSBuild-based execution. That shift makes the malicious activity harder to detect with conventional antivirus tools.

[7]

The emphasis on euro-denominated charges and the targeting of hospitality organizations during a busy holiday season suggests a campaign squarely aimed at European companies, the researchers said. There are additional artifacts in the MSBuild project file that indicate Russian-language usage, and the DCRat family itself is widely traded on Russian underground forums, strengthening suspicions that miscreants linked to Russia may be responsible. ®

Get our [8]Tech Resources



[1] https://www.securonix.com/blog/analyzing-phaltblyx-how-fake-bsods-and-trusted-build-tools-are-used-to-construct-a-malware-infection/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aV1ADX_y7R55PK-AJ0ZJrwAAANY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://www.theregister.com/2026/01/02/critical_utility_files_for_sale/

[4] https://www.theregister.com/2026/01/02/finnish_cops_interviewing_fitburg_crew/

[5] https://www.theregister.com/2025/12/19/uk_foreign_office_hack/

[6] https://www.theregister.com/2025/12/11/cybervolk_ransomware_is_back/

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aV1ADX_y7R55PK-AJ0ZJrwAAANY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[8] https://whitepapers.theregister.com/



Fire into the frying pan

lotus49

As an ex-customer of booking.com, I'd prefer a malware infection to visiting the booking.com website.

Other approach

Rafael #872397

I made some reservations on booking.com for my old in-laws, and yesterday I got a WhatsApp message from a phone in India, with an ID of a clothing company, with a link to "confirm my data". The "confirmation" website was a cheap rip-off of booking.com, with the correct reservation information, asking for confirmation of paymen,t but with a pop-up saying that I had only one chance to enter the credit card data, and could not go back or reload the page, and had only five minutes to comply before they cancelled the reservation (read that with an ED-209 voice). Of course, I didn't, but I am quite sure my in-laws could fall for this trick.

I've reported this attempt to booking.com and asked how the scammers were able to get my name, cell phone number, and reservation code. No replies so far.

WTF can non techies override security software ?

JimmyPage

although on the plus side, my idea for aashtrays for motorbikes looks like it's getting funding.

Brief History Of Linux (#1)
Re-Inventing the Wheel

Our journey through the history of Linux begins ca. 28000 B.C. when a
large all-powerful company called MoogaSoft monopolized the wheel-making
industry. As founder of the company, Billga Googagates (rumored to be the
distant ancestor of Bill Gates) was the wealthiest man in the known world,
owning several large rock huts, an extravagant collection of artwork (cave
paintings), and a whole army of servants and soldiers.

MoogaSoft's unfair business practices were irritating, but users were
unable to do anything about them, lest they be clubbed to death by
MoogaSoft's army. Nevertheless, one small group of hobbyists finally got
fed up and starting hacking their own wheels out of solid rock. Their
spirit of cooperation led to better and better wheels that eventually
outperformed MoogaSoft offerings.

MoogaSoft tried desperately to stop the hobbyists -- as shown by the
recently unearthed "Ooga! Document" -- but failed. Ironically, Billga
Googagates was killed shortly afterwards when one his own 900-pound wheels
crushed him.