Booking.com Breach Exposes Millions: Storm-1865 ClickFix Attack Hit 170 Hotel Partners
Booking.com has confirmed that unauthorized third parties accessed customer reservation data through a sophisticated supply-chain attack that compromised more than 170 hotel partner systems. The Booking.com data breach, confirmed April 13, 2026, exposed personal information including names, email addresses, phone numbers, and full booking details for an undisclosed number of travelers — Booking.com operates the world's largest online travel platform with more than 500 million registered accounts and processes over 1.5 million room nights daily.
The attack was not a direct breach of Booking.com's own infrastructure. Instead, threat cluster Storm-1865 deployed the ClickFix social engineering technique against hotel staff at Booking.com's partner properties across North America, Oceania, South and Southeast Asia, and Europe. ClickFix tricks employees into executing malicious commands by presenting fake CAPTCHA verification prompts — impersonating legitimate Booking.com communications about guest complaints or listing issues. Once malware installed on hotel staff systems harvested credentials to the Booking.com hotel management portal, attackers used that legitimate access to pull customer reservation records directly from the platform.
The data now circulating on dark web markets is not raw login credentials or payment card numbers — Booking.com confirmed financial information was not accessed. What was taken is operationally more dangerous: full reservation profiles that enable hyper-personalized travel scams. A fraudster with a target's upcoming hotel booking, check-in date, property name, and contact details can impersonate Booking.com support, the hotel itself, or a payment processor with a level of contextual accuracy that defeats most phishing awareness training. The breach triggered a wave of reservation hijack scams within days of confirmation, with customers reporting fraudulent calls and WhatsApp messages referencing exact booking details that could only have come from the breach.
How Storm-1865 Compromised 170 Hotel Partners to Reach Booking.com Customers
Storm-1865 is a Microsoft-tracked threat cluster that has systematically targeted the hospitality sector since at least December 2024. The group's core technique is impersonation of Booking.com internal communications — specifically, messages to hotel staff about guest complaints, review requests, or property listing issues requiring urgent action. These arrive with operational legitimacy: hotel front-desk staff receive Booking.com communications routinely, and complaint notifications trigger the guest-service instinct that attackers exploit.
The attack chain begins with a phishing email or message sent to hotel staff impersonating Booking.com's partner portal communications. The message directs the target to a page hosting a ClickFix payload — typically a fake Cloudflare verification challenge claiming the user must prove they are human before accessing the complaint details. Once the payload executes, Storm-1865's malware harvests the hotel staff's Booking.com portal credentials. Attackers then authenticate to the legitimate platform and query customer reservation records across all properties managed by that account.
Because the access uses valid credentials through Booking.com's own portal, the exfiltration generates no anomalous API behavior — it appears identical to normal hotel staff activity. This is the defining characteristic of supply-chain attacks through partner networks: the breach of the end customer's data occurs via a trusted, authenticated channel that bypasses the target platform's perimeter defences entirely. As documented in our earlier analysis of the [ShinyHunters Salesforce campaign](/blog/shinyhunters-mcgraw-hill-salesforce-breach-45-million), cloud platform partners consistently represent the softest path to high-value customer databases.
Phishing email targets hotel staff impersonating Booking.com
Storm-1865 sends tailored phishing emails to hotel front-desk staff, reservations managers, and property coordinators. Messages impersonate Booking.com complaint notifications or listing alerts requiring urgent response — high-urgency contexts hotel staff act on daily.
ClickFix page deploys fake Cloudflare CAPTCHA challenge
The link directs staff to a page impersonating Cloudflare verification. A hidden browser clipboard event listener pre-loads a malicious PowerShell command. The page instructs the user to press Win+R, Ctrl+V, and Enter to 'complete the human verification check.'
PowerShell executes — malware installs on hotel workstation
Pressing the keyboard combination opens Windows Run, pastes the malicious command from clipboard, and executes it. Deployed malware families include Lumma Stealer, XWorm, VenomRAT, AsyncRAT, Danabot, and NetSupport RAT — providing credential harvesting and persistent remote access.
Lumma Stealer harvests hotel staff Booking.com portal credentials
Lumma Stealer extracts browser-stored credentials, session cookies, and autofill data from the compromised workstation. Hotel staff Booking.com partner portal logins are exfiltrated to Storm-1865 command-and-control infrastructure.
Attackers authenticate to legitimate portal and exfiltrate reservation data
Using valid staff credentials, Storm-1865 accesses Booking.com's hotel management portal and queries customer reservation records. The access is indistinguishable from normal hotel staff activity — no anomalous API patterns, no authentication bypass required.
The ClickFix Technique: Why It Bypasses Standard Phishing Training
ClickFix exploits human problem-solving instinct rather than technical vulnerabilities. Unlike traditional malicious attachments or exploit-loaded URLs, ClickFix presents users with what appears to be a legitimate technical problem requiring their direct intervention — a CAPTCHA to prove they are human, an error message explaining a browser plugin needs updating, or a verification prompt to access restricted content.
In Storm-1865's confirmed campaign, the ClickFix prompt is deployed through a page impersonating Cloudflare's Turnstile verification widget — a context hotel staff have been conditioned to accept as routine. The fake verification page instructs users to complete the check by pressing keyboard shortcuts. What the page does not disclose is that a hidden JavaScript clipboard event listener has already copied a malicious PowerShell command to the system clipboard via document.execCommand or the Clipboard API before the user begins interacting with the CAPTCHA.
This technique defeats standard phishing awareness training on two fronts: first, no malicious link is clicked and no attachment is opened, so the core trained behavioral signal is absent; second, the keyboard action sequence — Win+R, Ctrl+V, Enter — is presented as a legitimate security verification step, not a suspicious request. The deployed malware suite spans six confirmed families: XWorm and VenomRAT for persistent remote access, Lumma Stealer and AsyncRAT for credential extraction and surveillance, Danabot for banking data theft, and NetSupport RAT for legitimate-tool-abuse remote administration. The breadth of the toolkit suggests Storm-1865 monetizes compromised hotel systems across multiple revenue streams, not just the Booking.com portal data theft.
“The data stolen in this breach is specifically designed to power high-conversion social engineering. Booking details are the perfect primer — you know where someone is going, when, and how to reach them. That's all you need to run a convincing scam before check-in.”
— Malwarebytes Threat Intelligence — April 2026
Booking.com Travel Data on Dark Web: What's Exposed and What It Enables
Booking.com has not disclosed the total number of customers affected. The platform's scale makes the potential exposure significant: Booking.com handles over 1.5 million room nights per day across 28 million listed accommodations in 220 countries and 220+ territories. Storm-1865's compromise of 170+ hotel partners across four global regions is a fraction of Booking.com's partner network — but even a small percentage of 500 million registered accounts represents a data set of material size.
The data profile exposed — names, email addresses, phone numbers, postal addresses, upcoming reservation check-in dates, property names, and direct communications with hotels — is classified in threat intelligence as high-context PII. Unlike credential dumps that require technical exploitation to weaponize, high-context PII can be immediately operationalized for social engineering. A threat actor with this data set can impersonate Booking.com support with exact reservation references, pose as the booked property requesting payment confirmation, time phishing messages to check-in dates for maximum urgency, and build spear-phishing campaigns against high-value targets by correlating travel patterns with corporate calendar access.
For organizations whose employees use Booking.com for business travel, the exposure extends beyond personal risk. Business travelers frequently use corporate email addresses for reservations — the same contact details that authenticate enterprise SaaS accounts, MFA enrollment, and IT helpdesk identity verification. Travel data in the hands of a threat actor with enterprise targeting intent becomes an attack surface against the employer, not only the individual.
Reservation Hijack Scams: How Stolen Travel Intelligence Is Monetized
Within days of Booking.com's breach notification reaching customers, Malwarebytes and multiple security outlets documented a surge in reservation hijack scams directly referencing stolen booking details. In these attacks, fraudsters contact breach victims via phone, WhatsApp, or email impersonating either Booking.com support or the booked hotel — using the exact reservation reference number, check-in date, and property name to establish false credibility.
The social engineering script follows a consistent pattern: the fraudster claims the target's booking has been flagged for a payment issue, that a room upgrade requires card verification, or that the property has implemented a new security deposit process. Urgency is reinforced by proximity to the actual check-in date — a traveler departing in three days is less likely to challenge a payment verification request than one whose trip is months away. Victims are directed to a spoofed payment page and prompted to re-enter payment card details that the attacker does not already have, since financial data was not exposed in the underlying breach.
This two-stage attack model — data breach enabling social engineering enabling payment fraud — is precisely why high-context PII commands premium pricing on dark web markets. The breach victim list from this campaign is not simply another credential dump; it is a curated lead list for targeted fraud, ranked by check-in date proximity and enriched with the contextual detail needed to run a convincing impersonation without any technical attack on the victim's systems.
| Artifact | Type | SHA-256 (Truncated) |
|---|---|---|
| Fake Cloudflare Turnstile verification pages | ClickFix phishing infrastructure | Infrastructure rotates per campaign — monitor for Booking.com impersonation domains |
| XWorm | Remote Access Trojan | See Microsoft Threat Intelligence and MalwareBazaar for current sample hashes |
| Lumma Stealer | Information Stealer — browser credential harvesting | See Microsoft Threat Intelligence and MalwareBazaar for current sample hashes |
| VenomRAT | Remote Access Trojan | See Microsoft Threat Intelligence and MalwareBazaar for current sample hashes |
| Danabot | Banking Trojan | See Microsoft Threat Intelligence and MalwareBazaar for current sample hashes |
Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.
Regions and Sectors at Highest Risk From Storm-1865 Targeting
Microsoft's threat intelligence on Storm-1865 confirms targeting across North America, Oceania, South and Southeast Asia, and Europe — matching Booking.com's core operating geographies. The group specifically targets individuals at hospitality organizations that work with Booking.com as a booking channel, with front-desk staff, reservations managers, and property operations coordinators as the primary social engineering targets.
The hospitality sector's security posture makes it a preferred target for supply-chain attacks of this type. Hotel properties — particularly independent and boutique properties rather than corporate chain infrastructure — often operate with limited IT security staffing, shared workstations in high-traffic environments, and minimal endpoint detection capability. Staff turnover is high, security awareness training is inconsistent, and the pace of guest-facing operations creates pressure to act quickly on communications that appear urgent and legitimate.
The Booking.com channel is particularly well-suited to Storm-1865's approach: hotel staff interact with Booking.com's partner portal daily, receive platform notifications routinely, and are accustomed to responding to guest complaints through the system. The credential theft pattern here mirrors the OAuth2 token exfiltration documented in our [malicious Chrome extensions investigation](/blog/malicious-chrome-extensions-oauth2-token-theft): in both cases, the attacker's goal is not to break authentication but to steal the authenticated session itself from the human who legitimately holds it.
How to Detect Storm-1865 Activity and Defend Your Organization
For hotel operators and hospitality technology vendors, the primary defensive priority is determining whether any staff systems have been compromised. The ClickFix attack leaves a specific behavioral signature: a Windows Run dialog executing PowerShell from clipboard content is not a pattern that occurs in legitimate hotel operations. Any EDR with process command-line logging should surface this activity if it occurred.
For corporate travel managers and security teams, the defensive focus shifts to the post-breach social engineering risk: employees who have traveled recently or have upcoming bookings via Booking.com should be briefed on reservation hijack scam indicators before their next trip. A fraudulent call referencing a specific reservation number, check-in date, and hotel name is not a random phishing attempt — it is a targeted attack using data confirmed to be in circulation.
Audit Booking.com portal access logs immediately
Review hotel management portal authentication logs for access from unusual IP addresses, geographic anomalies, or off-hours queries since December 2024. Unexplained bulk reservation export activity or access from IPs outside normal hotel operations should be investigated as a confirmed indicator of compromise.
Enable PowerShell script block logging on hospitality workstations
Enable PowerShell Script Block Logging (Event ID 4104) and Module Logging (Event ID 4103) on all hotel staff-facing workstations. ClickFix payloads execute via PowerShell or Windows Run — these event logs provide the primary forensic signal for detecting whether the initial access occurred.
Block clipboard-based payload pre-population in browsers
Browser isolation and modern EDR solutions can block clipboard event listeners that pre-load content before a user initiates a paste action. This is the critical technical enabler of ClickFix — denying clipboard manipulation via JavaScript eliminates the attack vector at the browser level without requiring user behavior change.
Train staff specifically on ClickFix — not generic phishing
Standard phishing training does not cover ClickFix, because no malicious link is clicked and no attachment is opened. Train hotel staff explicitly: legitimate CAPTCHAs and verification pages never instruct users to press keyboard shortcuts or run Windows commands. Any prompt doing so is an attack.
Rotate all Booking.com portal credentials and enable MFA
Any hotel property that received Booking.com-themed communications requiring action between December 2024 and April 2026 should rotate all portal credentials immediately. Use unique credentials for the Booking.com portal, implement multi-factor authentication where available, and audit all API tokens and third-party platform integrations.
Brief traveling employees on reservation hijack scam indicators
Issue a security advisory to all employees with upcoming Booking.com reservations. Any contact — call, WhatsApp, email — claiming to be from Booking.com, a hotel, or a payment processor and referencing an upcoming reservation while requesting payment or card verification should be treated as a confirmed social engineering attempt and reported to the security team.
The bottom line
The Booking.com data breach confirms a structural vulnerability in the hospitality sector's security supply chain: Storm-1865 did not need a zero-day or a credential stuffing campaign against Booking.com itself. They needed 170 hotel partners with insufficient endpoint security and a workforce conditioned to act quickly on platform notifications. The reservation data is now on dark web markets — high-context travel PII priced for immediate social engineering use. If you have an upcoming Booking.com stay, treat any contact referencing your specific booking details as a potential attack. If you manage hotel operations on the platform, rotate credentials and check your access logs before your next guest checks in.
Frequently asked questions
What is the Booking.com data breach?
Booking.com confirmed on April 13, 2026 that unauthorized third parties accessed customer reservation data through a supply-chain attack on its hotel partner network. Storm-1865 used ClickFix social engineering to compromise more than 170 hotel staff systems, harvesting credentials to Booking.com's hotel management portal and exfiltrating customer reservation records. Exposed data includes names, email addresses, phone numbers, and full booking details. Financial data was not compromised.
How did Storm-1865 hack Booking.com?
Storm-1865 did not breach Booking.com's own infrastructure directly. The group deployed ClickFix phishing emails impersonating Booking.com complaint notifications at hotel staff across 170+ properties. When employees followed fake CAPTCHA keyboard instructions, malware installed on their systems harvested Booking.com portal credentials. Attackers used those valid credentials to access and export customer reservation data. Six malware families were confirmed: XWorm, Lumma Stealer, VenomRAT, AsyncRAT, Danabot, and NetSupport RAT.
What is a ClickFix attack?
ClickFix is a social engineering technique that tricks users into executing malicious commands via fake CAPTCHA prompts or error messages. In Storm-1865's campaign, a fake Cloudflare verification page instructs hotel staff to press Windows key + R, Ctrl + V, and Enter — which opens Windows Run and executes a malicious PowerShell command pre-loaded into the clipboard by a hidden browser script. No malicious attachment or link click is required, bypassing most phishing filters.
What data was exposed in the Booking.com breach?
The Booking.com breach exposed customer names, email addresses, phone numbers, postal addresses, and complete booking information including check-in dates, property names, and messages sent to hotels through the platform. Financial data — payment card numbers, bank account details — was not accessed. The exposed data is high-context PII: it contains enough specific travel detail to power highly convincing reservation hijack and impersonation scams without further technical exploitation.
How many customers were affected by the Booking.com breach?
Booking.com has not disclosed the total number of affected customers. The company confirmed it notified impacted users individually and forced PIN resets for affected reservations. Booking.com processes over 1.5 million room nights daily across 220 countries with 500 million registered users. Storm-1865's confirmed compromise of 170+ hotel partners across four global regions suggests exposure may number in the hundreds of thousands at minimum.
What are reservation hijack scams and how do they work?
Reservation hijack scams use stolen Booking.com booking details to impersonate support staff, hotels, or payment processors in targeted fraud. Attackers contact victims via phone, WhatsApp, or email referencing the exact reservation number, check-in date, and property name to establish false credibility, then claim a payment issue or deposit process requires card verification. The goal is to extract payment card data not exposed in the breach. Urgency is amplified by proximity to the actual travel date.
How do I know if my Booking.com reservation data was compromised?
Booking.com notified affected users directly by email. If you received a breach notification from Booking.com in April 2026, your data was exposed. Regardless of notification, treat any upcoming reservation as potentially accessible to fraudsters. Check Have I Been Pwned (haveibeenpwned.com) for your email address and monitor for unsolicited contact referencing specific booking details — including calls or messages from apparent hotels or payment processors.
What should I do after the Booking.com data breach?
Take these steps immediately: reset your Booking.com password and enable two-factor authentication; treat any contact referencing your reservation details as a potential social engineering attempt — legitimate platforms never request payment card numbers by phone; monitor email for phishing impersonating Booking.com or your hotel; alert your bank; and if you are a corporate travel manager, notify all traveling employees of the reservation hijack scam pattern now confirmed active following the breach.
Sources & references
- BleepingComputer — New Booking.com data breach forces reservation PIN resets
- TechCrunch — Booking.com confirms hackers accessed customers' data
- Help Net Security — Booking.com data breach: Customer reservation data exposed
- Malwarebytes — Booking.com breach gives scammers what they need to target guests
- Microsoft Security Blog — Phishing campaign impersonates Booking.com, delivers credential-stealing malware
- SecurityWeek — Microsoft Warns of Hospitality Sector Attacks Involving ClickFix
- The Register — Booking.com warns of possible reservation data exposure
- SecurityAffairs — Hackers access Booking.com user data, company secures systems
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
