Massive 'I Paid Twice' Phishing Scheme Defrauds Booking.com Hotels and Guests

Global 'I Paid Twice' Phishing Campaign Uses Compromised Hotel Accounts on Booking.com to Defraud Travelers

HIGH
November 7, 2025
5m read
PhishingMalwareCyberattack

Related Entities

Organizations

Sekoia.ioCloudflare

Products & Tech

Other

Booking.comExpediaPureRAT OPTIMA LLCPureCoder

Full Report

Executive Summary

Cybersecurity researchers at Sekoia.io have uncovered a large-scale, ongoing phishing operation dubbed "I Paid Twice" that targets both hotel partners and customers of major travel platforms, including Booking.com and Expedia. Active since at least April 2025, the campaign uses a multi-stage attack to compromise hotel administrative systems with the PureRAT malware. After gaining access to a hotel's Booking.com extranet account, the threat actors leverage legitimate reservation details to send highly convincing fraudulent payment requests to guests. These messages trick travelers into submitting their payment details to a fake portal, resulting in double-charging and significant financial loss. The campaign's infrastructure is resilient, leveraging hundreds of malicious domains and a suspected bulletproof hosting provider in Russia, indicating a well-organized and profitable criminal enterprise.


Threat Overview

The "I Paid Twice" campaign is a classic adversary-in-the-middle attack applied to the hospitality sector. The attack chain begins with a spearphishing email sent to hotel staff, often disguised as an official notification from Booking.com. The email contains a link that leads to a page employing a social engineering tactic called "ClickFix." This technique tricks the user into copying and executing a PowerShell command, believing it's a CAPTCHA verification step. This command downloads and executes the PureRAT malware, a Remote Access Trojan (RAT) also known as PureHVNC.

Once PureRAT is active, the attackers gain control over the hotel's computer systems. Their primary goal is to steal credentials for the hotel's Booking.com extranet portal. With these credentials, they log in, impersonate hotel staff, and access the list of upcoming guest reservations. They then contact these guests directly via email or WhatsApp, using authentic booking details (names, dates, room types) to build credibility. The message typically claims a "bank verification issue" or similar problem requires the guest to re-submit their payment information through a provided link. This link leads to a professionally designed phishing page that mimics the Booking.com payment interface, where the victim's credit card details are harvested.

Technical Analysis

  • Malware: The core of the operation is PureRAT (aka PureHVNC), a RAT-as-a-Service sold by a developer named "PureCoder" since 2021. It provides attackers with remote access, keylogging, credential theft, and file system access capabilities.
  • Delivery: The initial infection vector is a social engineering lure named "ClickFix," which abuses user trust to execute a malicious PowerShell script. This is a clear example of T1204.002 - Malicious File where the user is tricked into running the code themselves.
  • Command and Control: The phishing infrastructure is protected by Cloudflare to mask the true origin of the servers. The backend hosting is provided by OPTIMA LLC (AS216341), a Russian provider suspected of offering bulletproof hosting services.

MITRE ATT&CK TTPs

  • Initial Access: T1566.002 - Spearphishing Link: Emails with malicious links are sent to hotel staff.
  • Execution: T1059.001 - PowerShell: The "ClickFix" lure tricks users into running a PowerShell download cradle.
  • Persistence & Defense Evasion: PureRAT likely establishes persistence through common methods like Registry Run Keys (T1547.001).
  • Credential Access: T1555.003 - Credentials from Web Browsers: PureRAT is used to steal saved credentials for the Booking.com extranet from the hotel's browser.
  • Collection: T1114.001 - Email Collection: Local Email Collection: Attackers access guest reservation data from the compromised extranet account.
  • Impersonation: The attackers use the stolen access and data to impersonate hotel staff in communications with guests, a form of Masquerading (T1036).

Impact Assessment

The financial and reputational impact of this campaign is significant. Guests who fall victim lose money directly. Hotels suffer severe reputational damage, negative reviews, and potential liability for the breach of their systems. The trust between customers and booking platforms like Booking.com is eroded. Given the global nature of the campaign and the hundreds of malicious domains involved, the total financial losses are likely substantial. The operational disruption for a hotel dealing with a system compromise and angry customers can be immense, requiring costly incident response and customer remediation efforts.

Cyber Observables for Detection

  • PowerShell Monitoring: Monitor for PowerShell execution with suspicious arguments, especially those involving IEX (New-Object Net.WebClient).DownloadString. D3FEND Technique: D3-PA: Process Analysis.
  • Network Traffic: Look for outbound network connections from hotel administrative workstations to known malicious domains or IP ranges, such as those associated with AS216341 (OPTIMA LLC). D3FEND Technique: D3-NTA: Network Traffic Analysis.
  • Endpoint Detection: EDR solutions should be configured to detect and block the execution of PureRAT/PureHVNC and its associated droppers.

Mitigation and Recommendations

For Hotels:

  1. User Training: Train staff to be suspicious of unsolicited emails, especially those that ask for urgent action or involve unusual steps like copying code. Specifically educate them on the "ClickFix" tactic. D3FEND Technique: D3-UT: User Training.
  2. MFA on All Accounts: Enforce Multi-Factor Authentication (MFA) on all administrative accounts, especially for booking platform extranets. This is the single most effective control to prevent account takeover even if credentials are stolen. D3FEND Technique: D3-MFA: Multi-factor Authentication.
  3. Endpoint Security: Deploy and maintain a reputable Endpoint Detection and Response (EDR) solution to detect and block malware like PureRAT.
  4. Restrict PowerShell: Use application control policies to restrict or heavily monitor the use of PowerShell on workstations that do not require it for administrative tasks. D3FEND Technique: D3-EAL: Executable Allowlisting.

For Travelers:

  • Verify Payment Requests: Be extremely wary of any message asking for payment outside of the official booking platform's website or app. Never click links in emails or messages to enter payment details. Instead, log in to your Booking.com account directly to check reservation status.
  • Check the URL: Before entering payment information, always double-check the URL to ensure it is the legitimate booking.com domain.

Timeline of Events

1
March 1, 2021
PureRAT malware first offered for sale by developer 'PureCoder'.
2
April 1, 2025
The 'I Paid Twice' phishing campaign is observed to be active.
3
November 7, 2025
This article was published

MITRE ATT&CK Mitigations

Enforcing MFA on Booking.com extranet accounts would prevent takeover even if credentials are stolen.

Mapped D3FEND Techniques:

Train hotel staff to recognize phishing attempts and social engineering tactics like 'ClickFix'.

Use EDR/AV solutions to detect and block the PureRAT malware.

Mapped D3FEND Techniques:

Restrict the execution of PowerShell on non-administrative workstations to prevent the initial infection.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Hotel administrators must immediately enable multi-factor authentication (MFA) on their Booking.com and Expedia extranet accounts. This is the most critical defense against this attack. Even if an attacker successfully steals credentials using PureRAT malware, they will be unable to log into the extranet without the second factor (e.g., a code from an authenticator app or SMS). This single control breaks the attack chain at the most crucial point, preventing the attackers from accessing guest data and impersonating the hotel. This should be implemented as a mandatory policy for all accounts with access to sensitive customer or financial data.

Deploy an Endpoint Detection and Response (EDR) solution capable of deep process analysis on all hotel administrative workstations. Specifically, configure it to monitor for suspicious PowerShell execution. Create alerts for PowerShell commands that contain encoded payloads (-enc) or download strings from the internet (Net.WebClient.DownloadString). Furthermore, monitor for legitimate Windows processes like RegAsm.exe or explorer.exe making unusual network connections or spawning child processes, as this is a common injection technique used by PureRAT. This allows for the detection of the initial compromise before credentials can be stolen.

Conduct targeted security awareness training for all hotel staff, focusing on the specific tactics of this campaign. Use examples of the fake Booking.com emails and the 'ClickFix' social engineering lure. Emphasize a 'zero trust' policy for emails requesting actions, especially those involving running commands or bypassing security warnings. Train staff to always verify such requests through a separate, trusted communication channel. For travelers, booking platforms should launch awareness campaigns advising users to only ever make payments or enter card details through the official app or by logging into the website directly, and to treat any payment requests via email or WhatsApp as fraudulent.

Sources & References

Phishing Campaign “I Paid Twice” Targets Booking.com Hotels and Guests
GBHackers on Security (gbhackers.com) November 7, 2025
“I Paid Twice” Phishing Campaign Targets Booking.com
Infosecurity Magazine (infosecurity-magazine.com) November 6, 2025
Hotel’s Compromised Booking.com Account Sparks Phishing Campaign Against Travelers
Cybersecurity News (cybersecuritynews.com) November 7, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingMalwarePureRATBooking.comHospitalitySocial Engineering

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading