➤Summary
Most phishing training programs drill three key lessons into users:
These rules work — until they don’t. In May 2025, a sophisticated phishing scam targeting an elderly guest turned these “lessons” into liabilities. The scam used real booking data, came from Booking.com’s own mail server, and appeared in a format indistinguishable from legitimate hotel messages. The victim? An 83-year-old woman. The mistake? Trusting Booking.com.
Most security awareness programs are still stuck in the past. Users are taught to:
Some advanced users even check email headers for SPF/DKIM records.
But what if:
At that point, there are no red flags. And that’s exactly what happened.
This phishing email didn’t spoof Booking.com. It was Booking.com — just weaponized. The message was delivered from Booking’s own infrastructure (mailout-108-r3.booking.com), authenticated via SPF and DKIM, and came from a trusted subdomain: @property.booking.com.
That’s because it wasn’t sent by an outsider — it was sent by someone who had legitimate access to the Booking.com Partner Portal: the hotel’s interface to manage reservations, message guests, and handle payments. In other words, this wasn’t an email “pretending” to be from Booking.com. It was a Booking.com email — just sent by a malicious actor inside the platform.
The Booking.com Partner Portal is the platform that hotels and property managers use to:
Each hotel gets access credentials (username and password) for this system. It’s essentially the backend interface for suppliers — like a CRM for hospitality. But here’s the problem: Booking.com doesn’t require multi-factor authentication (2FA) for access. If a hotel employee’s password is phished or guessed — that’s it. The attacker has full access.
In this incident, the most probable root cause is that the hotel’s partner account was compromised. How?
Hotels — especially small, independent ones — are usually not equipped to handle this kind of threat. Their staff often reuse credentials, click on suspicious links, or log in from insecure networks. Booking.com gives them powerful access without enforcing proper controls. And in the end, it’s the guests who pay the price — not the hotel, not Booking.com.
Booking.com is:
This trust model is ripe for abuse. Once a partner account is compromised:
This kind of phishing cannot be stopped by “user awareness training.” It must be stopped by platform responsibility.
Booking.com:
The result? A multi-billion-euro travel platform becomes a delivery mechanism for fraud — and users are left defenseless.
When digital fraud happens, the default response from every involved party is to point elsewhere. “Sure, it’s unfortunate — but not our fault.” This is what happened here, step by step.
The hotel — whose Booking.com account was almost certainly compromised — has no idea what really happened. When informed of the incident, their response was along the lines of:
“That’s strange, the guest must have clicked on a weird link.”
To them, it’s just another confused customer who “did something wrong.” But what they don’t realize — or deliberately ignore — is that their compromised partner login was used to:
Under GDPR and Swiss/French/German privacy laws, this is not a minor issue. It’s a data breach — one that legally requires:
Yet, in practice, most small hotels have no DPO (data protection officer), no awareness of these duties, and no interest in finding out.
Then there’s the bank. Their reaction is blunt:
“She entered her card number. She confirmed the SMS code. The transaction is her responsibility.”
In other words: You gave the thief the keys — not our problem. But that analysis only makes sense if the victim had clicked on something obviously suspicious. This wasn’t “Click here to win a billion dollars.” This was:
If this isn’t covered by fraud insurance, what is? Expecting an 83-year-old to perform forensic email analysis or doubt the legitimacy of Booking.com is absurd.
Then there’s Booking.com — the actual enabler of this entire attack. Try reporting the incident?
They treat every report as a support ticket, not a security incident. They don’t even provide for guests a channel to report platform abuse or compromised partner accounts. The result? No accountability.
Finally, the ones who actually make the fraud irreversible: Services like WorldRemit, where the stolen money gets sent. These companies handle legitimate remittances — but they’re also frequent destinations for phishing money. And when you try to report fraud? Nowhere – just call deal with our call center agent! Meanwhile, the money is picked up in cash or transferred abroad — gone forever. No preventive logic, no transaction anomaly detection, no human in the loop. They are the final enabler — the bridge between a phishing page and a stolen pension.
This is not just a Booking.com problem. It’s happening on Airbnb, Meta, Amazon, and many others. As long as platforms allow third parties to message users — and don’t vet that access properly — they will continue to be weaponized. Phishing is no longer about typos, shady URLs, and Nigerian princes. It’s about perfectly crafted, perfectly legitimate messages, sent from trusted systems, using data users have no reason to doubt. And that’s the real danger: when trust becomes the weapon. Traditional phishing attacks often rely on poorly crafted emails with obvious red flags, such as misspellings or suspicious sender addresses. However, recent incidents demonstrate a more insidious approach: attackers compromising legitimate platforms to send fraudulent messages. For instance, cybercriminals have been targeting Booking.com’s partner hotels through phishing campaigns. By sending fake emails that mimic Booking.com communications, attackers trick hotel staff into revealing their login credentials or installing malware. Once they gain access to the hotel’s Booking.com account, they can send messages to guests through the platform’s official channels, making the fraudulent communications appear authentic (Dark Reading).
Detecting these sophisticated phishing attacks is challenging for both users and security systems. Since the fraudulent messages originate from legitimate platforms and contain accurate information, traditional indicators of phishing are absent. Moreover, the use of official communication channels makes it difficult for users to discern the legitimacy of the messages. Booking.com has acknowledged these incidents and stated that their core systems have not been breached. However, they emphasize that some accommodation partners have been targeted by phishing emails, leading to unauthorized access to their accounts.
The consequences of these platform-based phishing attacks are significant. Victims may suffer financial losses, and the reputation of the platforms involved can be damaged. Furthermore, these incidents highlight the need for improved security measures, such as mandatory two-factor authentication for partner accounts and better user education on recognizing and reporting suspicious activities.
Current laws like GDPR protect privacy — but offer no clear protection against financial harm when that data is abused through platform negligence.
We need:
Hotels and other platform partners are often:
And yet, they are handed direct access to thousands of guest records and messaging systems that can reach those guests directly. If their Booking.com credentials are stolen, the attacker has everything.
These partners need to be:
Booking.com and similar platforms should fund or enforce this — not the guests.
Booking.com has:
This is security theater. It protects their workload, not the user. In a real security incident:
This isn’t just a technical gap — it’s a liability shell game.
We don’t need:
We need:
Because if a platform lets someone impersonate your hotel, use their email domain, and steal your money — then the user didn’t “fail.”
The system did.
Most companies only discover leaks once it's too late. Be one step ahead.
Ask for a demo NOW →