By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
Tech News

Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat

By Viral Trending Content 4 Min Read
Share
SHARE

Jan 06, 2026Ravie LakshmananMalware / Endpoint Security

Source: Securonix

Cybersecurity researchers have disclosed details of a new campaign dubbed PHALT#BLYX that has leveraged ClickFix-style lures to display fixes for fake blue screen of death (BSoD) errors in attacks targeting the European hospitality sector.

The end goal of the multi-stage campaign is to deliver a remote access trojan known as DCRat, according to cybersecurity company Securonix. The activity was detected in late December 2025.

“For initial access, the threat actors utilize a fake Booking.com reservation cancellation lure to trick victims into executing malicious PowerShell commands, which silently fetch and execute remote code,” researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee said.

Cybersecurity

The starting point of the attack chain is a phishing email impersonating Booking.com that contains a link to a fake website (e.g., “low-house[.]com”). The messages warn recipients of unexpected reservation cancellations, urging them to click the link to confirm the cancellation.

The website to which the victim is redirected masquerades as Booking.com, and serves a fake CAPTCHA page that leads them to a bogus BSoD page with “recovery instructions” to open the Windows Run dialog, paste a command, and press the Enter key. In reality, this results in the execution of a PowerShell command that ultimately deploys DCRat.

Specifically, this entails a multi-step process that commences with the PowerShell dropper downloading an MSBuild project file (“v.proj”) from “2fa-bns[.]com”, which is then executed using “MSBuild.exe” to run an embedded payload responsible for configuring Microsoft Defender Antivirus exclusions to evade detection, setting up persistence on the host in the Startup folder, and launching the RAT malware after downloads it from the same location as the MSBuild project.

It’s also capable of disabling the security program altogether if found to be running with administrator privileges. If it doesn’t have elevated rights, the malware enters a loop that triggers a Windows User Account Control (UAC) prompt every two seconds for three times in hopes that the victim will grant it the necessary permissions out of sheer frustration.

In tandem, the PowerShell code takes steps to open the legitimate Booking.com admin page in the default browser as a distraction mechanism and to give an impression to the victim that the action was legitimate.

DCRat, also called Dark Crystal RAT, is an off-the-shell .NET trojan that can harvest sensitive information and expand its functionality by means of a plugin-based architecture. It’s equipped to connect to an external server, profile the infected system, and await incoming commands from the server, enabling the attackers to log keystrokes, run arbitrary commands, and deliver additional payloads like a cryptocurrency miner.

Cybersecurity

The campaign is an example of how threat actors are leveraging living-off-the-land (LotL) techniques, such as abusing trusted system binaries like “MSBuild.exe,” to move the attack to the next stage, establish a deeper foothold, and maintain persistence within compromised hosts.

“The phishing emails notably feature room charge details in Euros, suggesting the campaign is actively targeting European organizations,” Securonix said. “The use of the Russian language within the ‘v.proj’ MSBuild file links this activity to Russian threat factors using DCRat.”

“The use of a customized MSBuild project file to proxy execution, coupled with aggressive tampering of Windows Defender exclusions, demonstrates a deep understanding of modern endpoint protection mechanisms.”

You Might Also Like

Samsung Galaxy S26 FE Seen Running One UI 9

Can OpenAI’s ‘Master of Disaster’ Fix AI’s Reputation Crisis?

Trinity College Dublin student wins 2026 Mary Mulvihill Award

Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

Samsung Galaxy Z Fold 8 vs Z Fold 8 Wide: Which to Buy?

TAGGED: Cyber Security, Cybersecurity, endpoint security, Internet, Living-Off-The-Land, Malware, phishing, Remote Access Trojan, social engineering, Threat Intelligence, windows security
Share This Article
Facebook Twitter Copy Link
Previous Article Favorite 'Dogs: Back Chargers, Ducks to Pull Off Potential Upsets
Next Article Phantom Blade Zero, 007: First Light to Launch With Support for Nvidia’s RTX and DLSS 4
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Man Utd officials now in position to sign £87m Real Madrid star with contact made
Sports
You wouldn’t put your entire 401(k) in one stock. Why are you doing it with your credit card points?
Business
REAL Finance inks $100M tokenization deal with EU broker Factori AD
Crypto
Podcast | How is Brussels taking all this Brexit banter?
World News
US Strategic Bitcoin Reserve Plan Takes Shape As The American Reserve Modernization Act Lands
Crypto
GTA 6’s Marketing Will Have a “Very Significant, Broad-Based Marketing Campaign”, Per Take-Two CEO
Gaming News
Rahul Shah bullish on pharma, sees Sun Pharma and Aurobindo as key large-cap plays
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

Brussels unveils plans for a European Degree but struggles to explain why

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
CISA urges software devs to weed out SQL injection vulnerabilities
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?