Home ยป Russian Travel Phishing Ring Used 4,300 Fake Hotel Booking Sites

Russian Travel Phishing Ring Used 4,300 Fake Hotel Booking Sites

Fake-hotel-booking site screen with travel brand logos used for credential harvesting Visual sample of the fraudulent travel booking interface used in the 4,300-domain phishing campaign targeting hotel guests

In early 2025 a Russian-speaking adversary quietly launched an unprecedented phishing campaign that now relies on more than 4,300 fake hotel-booking and travel-reservation domains. The threat leverages familiar brands and travel-industry logos to trick hotel guests into entering their payment cards, then processes those details for fraud. This realistic spoof tactic signals a dangerous evolution in hospitality-sector cyber-fraud.

๐—–๐—ฎ๐—บ๐—ฝ๐—ฎ๐—ถ๐—ด๐—ป ๐—ฆ๐—ฐ๐—ผ๐—ฝ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป

Security researchers at Netcraft identified the actor had registered 4,344 domains to date. Among them: 685 domains contain the brand โ€œBooking,โ€ 18 include โ€œExpedia,โ€ 13 โ€œAgodaโ€ and 12 โ€œAirbnb.โ€ The campaign kicked off around February and aimed broadly at hotel-guest bookings worldwide. The size and speed suggest a phishing-as-a-service (PhaaS) business model, enabling scale and rotation across thousands of domains.

๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—š๐—ฎ๐—บ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—•๐—ฟ๐—ฎ๐—ป๐—ฑ ๐—œ๐—บ๐—ฝ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐—ฎ๐˜๐—ถ๐—ผ๐—ป

The domains follow consistent patterns: terms like confirmation, booking, guestverify, cardverify, or reservation appear alongside major hotel-brand names. Many domains reference boutique hotels by name to enhance legitimacy. The TLDs span generic extensions such as .world, .help, .sale and regional variants. Beyond naming, the pages dynamically swap logos for Booking, Airbnb, Agoda and others depending on a unique URL string (AD_CODE). This enables the same infrastructure to impersonate multiple brands.

๐—Ÿ๐˜‚๐—ฟ๐—ฒ ๐— ๐—ฒ๐˜๐—ต๐—ผ๐—ฑ๐˜€

Victims receive fake โ€œbooking confirmationโ€ emails that urge immediate card verification to avoid cancellation. The email links funnel through a redirection chain often via an aged domain or blog platform before arriving at the phishing site. The chain obscures detection and exploits trust in legitimate platforms. Once on the page, users face a fake CAPTCHA prompt, styled like Google / Cloudflare, intended to lower suspicion. Then the payment screen pops requesting full card details. The pages are available in 43 languages, expanding reach worldwide.

๐—ฃ๐—ฎ๐˜†๐—บ๐—ฒ๐—ป๐˜ ๐—–๐—ฎ๐—ฟ๐—ฑ ๐——๐—ฎ๐˜๐—ฎ ๐—–๐—ฎ๐—ฝ๐˜๐˜‚๐—ฟ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—˜๐˜…๐—ณ๐—ถ๐—น๐˜๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป

Once victims enter cardholder name, PAN, expiry and CVV, the script performs Luhn-validation before sending the data live to attacker infrastructure. Meanwhile a fake chat panel claims โ€œ3D Secure verificationโ€ while actual card penetration occurs in the background. Stolen cards likely feed into card-not-present fraud, resale on carding forums, and broader identity-theft campaigns.

๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—–๐—น๐˜‚๐—ฒ๐˜€ & ๐—ง๐—ง๐—ฃ๐˜€

For defenders, several trade-craft indicators stand out:

  • Domain names include brands + phrases like โ€œguestverifyโ€ or โ€œcardverifyโ€.

  • Hosting through rotating registrars and high-volume registrations.

  • URL parameter AD_CODE modifying the brand and landing page at runtime.

  • Multi-language templates, phishing-kit reuse and uniform resource paths.

  • Emails claiming โ€œverify your bookingโ€ pointing to links with multiple redirects via blog or legacy domains.
    Mapping these to the MITRE ATT&CK framework: TA0001 (Initial Access via Phishing), TA0009 (Collection), T1585 (Domain Fronting) and T1566 (Phishing). These details help SOC teams and travel-industry firms tune detection.

๐—›๐—ผ๐˜„ ๐—›๐—ผ๐˜๐—ฒ๐—น๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—•๐—ฟ๐—ฎ๐—ป๐—ฑ๐˜€ ๐—ฆ๐—ต๐—ผ๐˜‚๐—น๐—ฑ ๐—ฅ๐—ฒ๐˜€๐—ฝ๐—ผ๐—ป๐—ฑ

Hotels and travel brands must treat this as more than a marketing nuisance it is a brand-abuse threat with direct financial implications. Recommended steps:

  • Implement and monitor SPF/DKIM/DMARC for email channels.

  • Maintain look-alike domain monitoring and takedown agreements with registrars.

  • Train front-desk and customer-service teams to flag guest reports of suspicious โ€œconfirm your bookingโ€ communications.

  • Share threat intelligence across fraud, security & guestโ€services functions.
    [Internal link: insert your blog post on brand-abuse monitoring here]

๐—ง๐—ฟ๐—ฎ๐˜ƒ๐—ฒ๐—น๐—ฒ๐—ฟ ๐—ฎ๐—ป๐—ฑ ๐—˜๐—ป๐˜๐—ฒ๐—ฟ๐—ฝ๐—ฟ๐—ถ๐˜€๐—ฒ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐˜€๐—ฒ

For travellers and enterprise security teams supporting corporate travel:

  • Always access booking confirmations via trusted apps or official portals not through email links.

  • If asked to re-enter card data, use limited-use virtual cards or cards with tight spending caps.

  • Apply email filtering and sandboxing to block mass travel-themed campaigns.

  • Conduct user awareness sessions using real-world examples like this campaign.

This campaign demonstrates how phishing has evolved into a fully industrialised operation with more than 4,300 domains, multi-language capability, brand impersonation and realโ€time payment-card theft at scale. For the hospitality industry and guests alike, it underscores that trust in travel brands must be matched by layered cyber-defence and awareness.

๐—™๐—”๐—ค๐—ฆ

How can hotel guests verify if a booking email is legitimate?
Guests should always check their reservation through an official channel such as the hotelโ€™s verified app or website. They should avoid clicking email links and instead access their reservation via known URLs or saved bookmarks.

What should someone do after entering card details on a fake hotel booking website?
They should immediately contact their card issuer, request a block, and monitor for unauthorized transactions. They should also reset any reused passwords and consider a fraud alert depending on exposure.

How can hotels detect fake domains impersonating their brand?
Hotels can monitor for look-alike domains, track unusual domain registrations that include their brand name, and set up alerting with brand-protection services. Regular reporting pipelines with registrars accelerate takedowns.

Why do attackers target travel and hospitality phishing campaigns so often?
Travel bookings involve time pressure, card payments and strong trust in brand names. Attackers exploit these emotional triggers, making travel phishing highly effective and financially rewarding.

How can corporate security teams reduce exposure to travel-themed phishing?
They can strengthen email filtering, train users with realistic travel-phishing scenarios, enforce URL-rewriting inspection, and encourage booking confirmation only via trusted apps instead of email links.

2 thoughts on “Russian Travel Phishing Ring Used 4,300 Fake Hotel Booking Sites

Leave a Reply

Your email address will not be published. Required fields are marked *