Posted in

Urgent Hotel Confirmation Emails: The Latest Travel Scam

A large-scale phishing operation is targeting travelers across the globe, using over 4,300 fake domains to steal payment card information. The campaign focuses on individuals planning vacations or checking into hotels, leveraging fake booking confirmation emails that appear to come from trusted travel brands.


How the Scam Works

Attackers send emails claiming that a hotel reservation must be confirmed within 24 hours to avoid cancellation. This creates a sense of urgency, pushing victims to act quickly without verifying details. The emails include links that redirect users through multiple websites before landing on a phishing page designed to look like a legitimate hotel booking site.


Fake Pages Mimic Major Travel Brands

The phishing pages impersonate popular travel platforms such as Airbnb, Booking.com, Expedia, and Agoda, using authentic logos and professional layouts. Victims are asked to enter sensitive payment details, including card number, CVV, and expiration date.


Redirection Chain Explained

The attack uses a multi-step redirection system to avoid detection:

  1. Victims click the “Confirm Booking” button in the fake email.
  2. They are redirected to an old, unused domain registered in 2016.
  3. From there, they land on a Blogspot page (Google’s blogging platform).
  4. Finally, they reach the phishing page.

This technique makes it harder for security systems to block the malicious site and adds credibility by using legitimate platforms.


Sophisticated Phishing Kit Features

The phishing kit powering this campaign includes:

  • Fake Cloudflare CAPTCHA for false security assurance.
  • Luhn validation for card number format.
  • Real-time keystroke polling every second.
  • Support for 43 languages.
  • Dynamic branding using an AD_CODE parameter to impersonate different travel brands.

Victims even see a fake support chat urging them to confirm SMS notifications from their bank—these are actually real fraud alerts triggered by unauthorized transactions.


Scale of the Attack

The campaign began in February 2025 and continues to grow. On March 20, 2025, attackers registered 511 domains in a single day. These domains often include keywords like:

  • confirmation
  • booking
  • guestverify
  • cardverify
  • reservation

Many domains even reference specific luxury hotels, making the scam appear highly targeted.


Who Is Behind It?

Security researchers at Netcraft discovered Russian-language comments in the phishing kit’s source code, suggesting the threat actor is Russian-speaking. The attacker primarily uses four registrars:

  • WebNIC
  • Public Domain Registry
  • Atak Domain Bilgi Teknolojileri A.S.
  • MAT BAO Corporation

How to Protect Yourself

  • Verify booking emails by contacting the hotel or travel company directly.
  • Avoid clicking links in unsolicited emails.
  • Use multi-factor authentication and monitor bank alerts.
  • Report suspicious domains to security authorities.

Key Takeaway

This phishing campaign is one of the most sophisticated travel-related scams in recent years. Travelers should remain vigilant and double-check any booking confirmations before sharing payment details

Leave a Reply

Your email address will not be published. Required fields are marked *