1

Vacation With Cyberconsequences

RevengeHotels is a cybercrime malware campaign which a group of hackers against hotels, hostels, hospitality and tourism companies. According to Kaspersky Lab, more than 20 hotels in Brazil, Argentina, Bolivia, Chile, Costa Rica, France, Italy, Mexico, Portugal, Spain, Thailand, and Turkey had already been targeted by cybercriminals. Guests’ credit card data was collected not only through the hotel systems but also through popular online travel resources such as Booking.com.

 

The main vector of the attack is e-mail. The danger lies in the attached Word, Excel or PDF documents. Phishing letters imitate official group booking requests from real people from real companies. At first glance, everything looks persuasive – the letters contain copies of official documents and a detailed explanation of the reason why this hotel was chosen. The only thing that reveals the malefactors are mistakes in spelling the company’s domain. The attackers used Trojans for remote administration and data collection. Experts found out that hackers sell all the access to hotel systems in the Darknet.

 

Several hacker groups are involved in this cyber-fraud campaign. The names of the two groups, RevengeHotels and ProCC, are known. The group has been active since 2015 but increased its attacks in 2019.

Related Posts

card__image

New information security regulation for financial institutions – DORA

On January 17, 2025, the Digital Operational Resilience Act (Regulation (EU) 2022/2554) or DORA (Digital Operational Resilience Act) entered into force. The DORA focuses on information and communications technology (ICT) risk management by introducing strict rules for ICT risk management, incident reporting, operational resilience testing, and third-party ICT risk oversight.   Prior to the adoption […]

card__image

Secure by Design: From Concept to Cybersecurity Imperative in 2025

In a rapidly evolving digital landscape, the Secure by Design (SbD) philosophy is proving strategically essential and measurably effective. A report from Secure Code Warrior, analyzing data from 600 enterprise customers over nine years, found that large organizations that train developers in secure-by-design practices can reduce software vulnerabilities by over 50%. Companies with more than […]

card__image

Zero-Day Vulnerabilities: Unseen Threats and Their Impact

The ultimate guide to zero-day vulnerabilities and their effects in 2025 starts with a clear truth: zero-day vulnerabilities rank among the most severe dangers in the modern digital landscape.   A zero-day vulnerability  — flaws exploited before patches are available. This makes them incredibly challenging to detect and counter, leaving businesses exposed to substantial operational […]

Leave a Reply

Your email address will not be published. Required fields are marked *