In early 2025 a Russian-speaking adversary quietly launched an unprecedented phishing campaign that now relies on more than 4,300 fake hotel-booking and travel-reservation domains. The threat leverages familiar brands and travel-industry logos to trick hotel guests into entering their payment cards, then processes those details for fraud. This realistic spoof tactic signals a dangerous evolution in hospitality-sector cyber-fraud.
๐๐ฎ๐บ๐ฝ๐ฎ๐ถ๐ด๐ป ๐ฆ๐ฐ๐ผ๐ฝ๐ฒ ๐ฎ๐ป๐ฑ ๐ข๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป
Security researchers at Netcraft identified the actor had registered 4,344 domains to date. Among them: 685 domains contain the brand โBooking,โ 18 include โExpedia,โ 13 โAgodaโ and 12 โAirbnb.โ The campaign kicked off around February and aimed broadly at hotel-guest bookings worldwide. The size and speed suggest a phishing-as-a-service (PhaaS) business model, enabling scale and rotation across thousands of domains.
๐๐ผ๐บ๐ฎ๐ถ๐ป ๐๐ฎ๐บ๐ฒ ๐ฎ๐ป๐ฑ ๐๐ฟ๐ฎ๐ป๐ฑ ๐๐บ๐ฝ๐ฒ๐ฟ๐๐ผ๐ป๐ฎ๐๐ถ๐ผ๐ป
The domains follow consistent patterns: terms like confirmation, booking, guestverify, cardverify, or reservation appear alongside major hotel-brand names. Many domains reference boutique hotels by name to enhance legitimacy. The TLDs span generic extensions such as .world, .help, .sale and regional variants. Beyond naming, the pages dynamically swap logos for Booking, Airbnb, Agoda and others depending on a unique URL string (AD_CODE). This enables the same infrastructure to impersonate multiple brands.
๐๐๐ฟ๐ฒ ๐ ๐ฒ๐๐ต๐ผ๐ฑ๐
Victims receive fake โbooking confirmationโ emails that urge immediate card verification to avoid cancellation. The email links funnel through a redirection chain often via an aged domain or blog platform before arriving at the phishing site. The chain obscures detection and exploits trust in legitimate platforms. Once on the page, users face a fake CAPTCHA prompt, styled like Google / Cloudflare, intended to lower suspicion. Then the payment screen pops requesting full card details. The pages are available in 43 languages, expanding reach worldwide.
๐ฃ๐ฎ๐๐บ๐ฒ๐ป๐ ๐๐ฎ๐ฟ๐ฑ ๐๐ฎ๐๐ฎ ๐๐ฎ๐ฝ๐๐๐ฟ๐ฒ ๐ฎ๐ป๐ฑ ๐๐ ๐ณ๐ถ๐น๐๐ฟ๐ฎ๐๐ถ๐ผ๐ป
Once victims enter cardholder name, PAN, expiry and CVV, the script performs Luhn-validation before sending the data live to attacker infrastructure. Meanwhile a fake chat panel claims โ3D Secure verificationโ while actual card penetration occurs in the background. Stolen cards likely feed into card-not-present fraud, resale on carding forums, and broader identity-theft campaigns.
๐๐ฒ๐๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐๐น๐๐ฒ๐ & ๐ง๐ง๐ฃ๐
For defenders, several trade-craft indicators stand out:
-
Domain names include brands + phrases like โguestverifyโ or โcardverifyโ.
-
Hosting through rotating registrars and high-volume registrations.
-
URL parameter AD_CODE modifying the brand and landing page at runtime.
-
Multi-language templates, phishing-kit reuse and uniform resource paths.
-
Emails claiming โverify your bookingโ pointing to links with multiple redirects via blog or legacy domains.
Mapping these to the MITRE ATT&CK framework: TA0001 (Initial Access via Phishing), TA0009 (Collection), T1585 (Domain Fronting) and T1566 (Phishing). These details help SOC teams and travel-industry firms tune detection.
๐๐ผ๐ ๐๐ผ๐๐ฒ๐น๐ ๐ฎ๐ป๐ฑ ๐๐ฟ๐ฎ๐ป๐ฑ๐ ๐ฆ๐ต๐ผ๐๐น๐ฑ ๐ฅ๐ฒ๐๐ฝ๐ผ๐ป๐ฑ
Hotels and travel brands must treat this as more than a marketing nuisance it is a brand-abuse threat with direct financial implications. Recommended steps:
-
Implement and monitor SPF/DKIM/DMARC for email channels.
-
Maintain look-alike domain monitoring and takedown agreements with registrars.
-
Train front-desk and customer-service teams to flag guest reports of suspicious โconfirm your bookingโ communications.
-
Share threat intelligence across fraud, security & guestโservices functions.
[Internal link: insert your blog post on brand-abuse monitoring here]
๐ง๐ฟ๐ฎ๐๐ฒ๐น๐ฒ๐ฟ ๐ฎ๐ป๐ฑ ๐๐ป๐๐ฒ๐ฟ๐ฝ๐ฟ๐ถ๐๐ฒ ๐๐ฒ๐ณ๐ฒ๐ป๐๐ฒ
For travellers and enterprise security teams supporting corporate travel:
-
Always access booking confirmations via trusted apps or official portals not through email links.
-
If asked to re-enter card data, use limited-use virtual cards or cards with tight spending caps.
-
Apply email filtering and sandboxing to block mass travel-themed campaigns.
-
Conduct user awareness sessions using real-world examples like this campaign.
This campaign demonstrates how phishing has evolved into a fully industrialised operation with more than 4,300 domains, multi-language capability, brand impersonation and realโtime payment-card theft at scale. For the hospitality industry and guests alike, it underscores that trust in travel brands must be matched by layered cyber-defence and awareness.
๐๐๐ค๐ฆ
How can hotel guests verify if a booking email is legitimate?
Guests should always check their reservation through an official channel such as the hotelโs verified app or website. They should avoid clicking email links and instead access their reservation via known URLs or saved bookmarks.
What should someone do after entering card details on a fake hotel booking website?
They should immediately contact their card issuer, request a block, and monitor for unauthorized transactions. They should also reset any reused passwords and consider a fraud alert depending on exposure.
How can hotels detect fake domains impersonating their brand?
Hotels can monitor for look-alike domains, track unusual domain registrations that include their brand name, and set up alerting with brand-protection services. Regular reporting pipelines with registrars accelerate takedowns.
Why do attackers target travel and hospitality phishing campaigns so often?
Travel bookings involve time pressure, card payments and strong trust in brand names. Attackers exploit these emotional triggers, making travel phishing highly effective and financially rewarding.
How can corporate security teams reduce exposure to travel-themed phishing?
They can strengthen email filtering, train users with realistic travel-phishing scenarios, enforce URL-rewriting inspection, and encourage booking confirmation only via trusted apps instead of email links.
2 thoughts on “Russian Travel Phishing Ring Used 4,300 Fake Hotel Booking Sites”