PHALT#BLYX: Booking Phish Fakes BSoD, Installs DCRat -Hotels

PHALT#BLYX phishing campaign uses fake Booking.com BSoD pages and MSBuild-based loaders to disable Defender and deploy DCRat against European hospitality organizations.

  • A campaign called PHALT#BLYX used fake ClickFix-style pages to show bogus blue screen of death errors and trick victims into running commands.
  • Phishing emails impersonated Booking.com and redirected targets to a site that prompted a Run-dialog PowerShell command, which fetched a multi-stage loader.
  • The loader used a custom MSBuild project to run payloads via MSBuild.exe, disable or evade Microsoft Defender Antivirus, and install the DCRat remote access trojan.
  • Indicators include domains like 2fa-bns[.]com and room charges in Euros, suggesting a focus on European hospitality organizations and links to Russian-language components.

Researchers at Securonix disclosed a late-December 2025 campaign named PHALT#BLYX that targeted European hospitality organizations to deliver the remote access trojan DCRat. The attack used fake ClickFix-style pages showing a bogus blue screen of death to trick victims into running commands.

- Advertisement -

“For initial access, the threat actors utilize a fake Booking.com reservation cancellation lure to trick victims into executing malicious PowerShell commands, which silently fetch and execute remote code,” researchers noted in their report linked to Securonix (Malware-infection/”>read more).

The attack begins with a phishing email impersonating Booking.com, warning of a reservation cancellation and linking to a fake site. The site serves a CAPTCHA and then a fake BSoD page with “recovery instructions” that ask users to open the Run dialog and paste a command. That command runs a PowerShell dropper.

The PowerShell dropper downloads a custom MSBuild project file named “v.proj” from 2fa-bns[.]com and executes it with MSBuild.exe. The embedded payload adjusts Microsoft Defender Antivirus exclusions, establishes persistence in the Startup folder, and downloads and launches DCRat.

If run with administrator privileges, the malware can disable Defender; otherwise it triggers a User Account Control prompt repeatedly to try to gain elevation. The code also opens the real Booking.com admin page as a distraction.

- Advertisement -

DCRat is a .NET RAT that can profile systems, log keystrokes, execute commands, and load plugins such as cryptocurrency miners. “The phishing emails notably feature room charge details in Euros, suggesting the campaign is actively targeting European organizations,” and “The use of a customized MSBuild project file to proxy execution, coupled with aggressive tampering of Windows Defender exclusions, demonstrates a deep understanding of modern endpoint protection mechanisms,” Securonix added.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Caterpillar, NVIDIA Team Up to Add AI to Machines, Factories

Caterpillar Inc. expanded a partnership with NVIDIA to add AI across its machines, factories,...

Premier League crypto sponsors drop to 13 amid FCA warnings.

Thirteen of 20 Premier League clubs have crypto-related sponsors in the 2025/26 season.Socios is...

JPM Coin Moves to Canton Network for Near-Instant Use Today!

JPMorgan’s Kinexys will bring its JPM Coin to the privacy-enabled Canton Network in a...

Radix Consultation Live: Vote on Season 1 End & Vesting ASAP

Radix has opened a formal consultation to set the Season 1 end date and...

Prosecutors Appeal Judge’s Acquittal of Mango Exploiter Case

Prosecutors have appealed the judge’s decision that overturned the conviction of Avraham Eisenberg for...
- Advertisement -

Must Read

Ethereum Hosting: TOP 10 Companies to Buy Hosting With Ethereum

If you are looking for Ethereum Hosting, you've hit the jackpot. In this article, we will present the 10 Best companies to buy hosting...
Bitcoin (BTC) $ 90,903.00 1.16%
Ethereum (ETH) $ 3,147.81 2.17%
XRP (XRP) $ 2.19 2.58%
Bittensor (TAO) $ 272.72 2.86%
Polkadot (DOT) $ 2.15 0.22%
Cardano (ADA) $ 0.403104 1.19%
Chainlink (LINK) $ 13.38 2.02%
Hyperliquid (HYPE) $ 26.79 0.39%
Monero (XMR) $ 436.41 0.91%
Hedera (HBAR) $ 0.123558 2.23%
Toncoin (TON) $ 1.86 0.68%