PULSE NAME
Victims risk AsyncRAT infection after being redirected to fake Booking.com sites
WHITE AlienVault 2025-06-03 Modified: 2025-06-03
14
IOCs
MEDIUM VOLUME
Cybercriminals have launched a campaign redirecting users from gaming sites and social media to fake Booking.com websites. The scam uses fake CAPTCHA prompts to trick visitors into executing malicious commands on their devices. If successful, the attack downloads and installs AsyncRAT, a backdoor Trojan that allows remote monitoring and control of infected computers. The campaign, which began in mid-May, frequently changes its final redirect destination. The malicious actors exploit the fact that 40% of people book travel through online searches, creating ample opportunities for deception. To stay safe, users are advised to be cautious of website instructions, use anti-malware solutions, employ browser extensions that block malicious domains, and consider disabling JavaScript on unknown websites.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
AsyncRAT
Indicators of Compromise (14)
All domain hostname
TYPEINDICATORDESCRIPTIONCREATED
domain bkngnet.com 2025-06-03
domain chargesguestescenter.com 2025-06-03
domain extranet-listing.com 2025-06-03
domain guestalerthelp.com 2025-06-03
domain guestsalerts.com 2025-06-03
domain gustescharge.com 2025-06-03
domain hekpaharma.com 2025-06-03
domain kvhandelregis.com 2025-06-03
domain partnervrft.com 2025-06-03
domain patheer-moreinfo.com 2025-06-03
domain property-paids.com 2025-06-03
domain rewiewqproperty.com 2025-06-03
domain rewiewwselect.com 2025-06-03
hostname badgustrewivers.com.com 2025-06-03