Fake Windows BSODs check in at Europe’s hotels to con staff into running malware

Fake Windows BSODs check in at Europe’s hotels to con staff into running malware

Summary

Security researchers at Securonix have been tracking PHALT#BLYX, a social-engineering campaign that targets hotels and other hospitality organisations across Europe. Attackers send Booking.com-themed phishing emails about unexpected euro charges; the link leads to a believable Booking.com page that then displays a full-screen fake Windows Blue Screen of Death (BSOD).

The fake crash panics staff into following instructions that require them to paste and run a PowerShell command. Because the victim executes the command manually, the infection bypasses many automated defences. The payload is delivered via legitimate Windows tooling (now using MSBuild-based execution) and installs a remote-access trojan from the DCRat family, giving attackers persistent access to compromised machines.

Key Points

  • Campaign labelled PHALT#BLYX targets hospitality workers with Booking.com-style phishing about euro charges.
  • Attack uses a convincing fake full-screen Windows BSOD to induce panic and trick staff into running commands.
  • Manual execution by staff (ClickFix variant) lets the attack sidestep many automated security controls.
  • Adversaries moved to MSBuild-based execution and living-off-the-land techniques to evade antivirus detection.
  • The final payload is a remote access trojan (DCRat family) that enables spying and further malware delivery.
  • Artefacts in the attack chain show Russian-language indicators and tooling commonly traded on Russian underground forums.

Context and Relevance

This is important for anyone responsible for hospitality IT or front-of-house systems: reception and booking workstations are attractive targets because staff handle reservations, payments and guest data. The campaign exemplifies a wider trend of socially engineered attacks that combine panic-inducing lures with living-off-the-land techniques to bypass defences. Organisations should update staff training, restrict capability to run unsigned scripts, and monitor for unusual MSBuild or PowerShell activity.

Why should I read this?

Short and blunt: because your receptionist might be tricked into launching a RAT by what looks like a Booking.com error. It’s a neat, panic-first trick that lets attackers piggyback on everyday Windows tools — so if you care about guest data, bookings or payments, this is exactly the type of attack you want to know about now.

Author style

Punchy: this is the kind of social-hack that works because it scares people into acting. Read the detail — the technique is evolving, it bypasses standard controls, and the consequences for hospitality operations can be immediate.

Source

Source: https://go.theregister.com/feed/www.theregister.com/2026/01/06/russia_hackers_hotel_bsods/