Cybersecurity researchers at Sekoia.io have uncovered a large-scale, ongoing phishing operation dubbed "I Paid Twice" that targets both hotel partners and customers of major travel platforms, including Booking.com and Expedia. Active since at least April 2025, the campaign uses a multi-stage attack to compromise hotel administrative systems with the PureRAT malware. After gaining access to a hotel's Booking.com extranet account, the threat actors leverage legitimate reservation details to send highly convincing fraudulent payment requests to guests. These messages trick travelers into submitting their payment details to a fake portal, resulting in double-charging and significant financial loss. The campaign's infrastructure is resilient, leveraging hundreds of malicious domains and a suspected bulletproof hosting provider in Russia, indicating a well-organized and profitable criminal enterprise.
The "I Paid Twice" campaign is a classic adversary-in-the-middle attack applied to the hospitality sector. The attack chain begins with a spearphishing email sent to hotel staff, often disguised as an official notification from Booking.com. The email contains a link that leads to a page employing a social engineering tactic called "ClickFix." This technique tricks the user into copying and executing a PowerShell command, believing it's a CAPTCHA verification step. This command downloads and executes the PureRAT malware, a Remote Access Trojan (RAT) also known as PureHVNC.
Once PureRAT is active, the attackers gain control over the hotel's computer systems. Their primary goal is to steal credentials for the hotel's Booking.com extranet portal. With these credentials, they log in, impersonate hotel staff, and access the list of upcoming guest reservations. They then contact these guests directly via email or WhatsApp, using authentic booking details (names, dates, room types) to build credibility. The message typically claims a "bank verification issue" or similar problem requires the guest to re-submit their payment information through a provided link. This link leads to a professionally designed phishing page that mimics the Booking.com payment interface, where the victim's credit card details are harvested.
T1204.002 - Malicious File where the user is tricked into running the code themselves.T1566.002 - Spearphishing Link: Emails with malicious links are sent to hotel staff.T1059.001 - PowerShell: The "ClickFix" lure tricks users into running a PowerShell download cradle.T1547.001).T1555.003 - Credentials from Web Browsers: PureRAT is used to steal saved credentials for the Booking.com extranet from the hotel's browser.T1114.001 - Email Collection: Local Email Collection: Attackers access guest reservation data from the compromised extranet account.T1036).The financial and reputational impact of this campaign is significant. Guests who fall victim lose money directly. Hotels suffer severe reputational damage, negative reviews, and potential liability for the breach of their systems. The trust between customers and booking platforms like Booking.com is eroded. Given the global nature of the campaign and the hundreds of malicious domains involved, the total financial losses are likely substantial. The operational disruption for a hotel dealing with a system compromise and angry customers can be immense, requiring costly incident response and customer remediation efforts.
IEX (New-Object Net.WebClient).DownloadString. D3FEND Technique: D3-PA: Process Analysis.D3-NTA: Network Traffic Analysis.For Hotels:
D3-UT: User Training.D3-MFA: Multi-factor Authentication.D3-EAL: Executable Allowlisting.For Travelers:
booking.com domain.Enforcing MFA on Booking.com extranet accounts would prevent takeover even if credentials are stolen.
Mapped D3FEND Techniques:
Train hotel staff to recognize phishing attempts and social engineering tactics like 'ClickFix'.
Use EDR/AV solutions to detect and block the PureRAT malware.
Mapped D3FEND Techniques:
Restrict the execution of PowerShell on non-administrative workstations to prevent the initial infection.
Mapped D3FEND Techniques:
Hotel administrators must immediately enable multi-factor authentication (MFA) on their Booking.com and Expedia extranet accounts. This is the most critical defense against this attack. Even if an attacker successfully steals credentials using PureRAT malware, they will be unable to log into the extranet without the second factor (e.g., a code from an authenticator app or SMS). This single control breaks the attack chain at the most crucial point, preventing the attackers from accessing guest data and impersonating the hotel. This should be implemented as a mandatory policy for all accounts with access to sensitive customer or financial data.
Deploy an Endpoint Detection and Response (EDR) solution capable of deep process analysis on all hotel administrative workstations. Specifically, configure it to monitor for suspicious PowerShell execution. Create alerts for PowerShell commands that contain encoded payloads (-enc) or download strings from the internet (Net.WebClient.DownloadString). Furthermore, monitor for legitimate Windows processes like RegAsm.exe or explorer.exe making unusual network connections or spawning child processes, as this is a common injection technique used by PureRAT. This allows for the detection of the initial compromise before credentials can be stolen.
Conduct targeted security awareness training for all hotel staff, focusing on the specific tactics of this campaign. Use examples of the fake Booking.com emails and the 'ClickFix' social engineering lure. Emphasize a 'zero trust' policy for emails requesting actions, especially those involving running commands or bypassing security warnings. Train staff to always verify such requests through a separate, trusted communication channel. For travelers, booking platforms should launch awareness campaigns advising users to only ever make payments or enter card details through the official app or by logging into the website directly, and to treat any payment requests via email or WhatsApp as fraudulent.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats