Here’s how it works: Cybercriminals send a fake Booking.com email to a hotel’s email address, asking them to confirm a booking.
The email is sent only a few days before the check-in-date, which is very likely to create a sense of urgency—a common tactic of scammers.
But if the hotel staff were to copy and paste the URL into the browser address bar they will be greeted by this fake CAPTCHA website.
When they check the box, they’ll then see “verification” instructions that will effectively infect their system.
As we explained in more detail here, these instructions will infect their Windows system with an information stealer or Trojan.
What the hotel staff would actually be doing is copy and pasting a mshta command into the Run prompt and then executing the command, which then fetches a remote file and then runs it on their system.
We don’t know the exact plans of the criminals once they have gained control over the system, but it’s highly likely they’re after customer payment details and other personal data: Data that is very valuable to them and can be traded on the dark web.