Hackers hijack hotel booking workflows to send fake payment requests to real guests


A growing fraud campaign is targeting hotel guests by abusing trusted reservation workflows instead of relying on generic phishing alone. Researchers at Gen call it the “Reservation Hijack Scam,” and say attackers use real booking details plus legitimate-looking hotel communication channels to pressure travelers into making fake payments.

The scam often starts with a message that looks routine. Victims receive a WhatsApp message, SMS, email, or even a message inside a booking thread that appears to come from hotel staff and asks them to verify or complete payment before arrival. Gen says the messages often include the real property name, trip dates, and payment context, which makes them feel credible.

This is what makes the campaign more dangerous than a basic phishing email. The attackers do not always need polished language or advanced malware at the guest side. They only need enough stolen reservation data and enough access to trusted workflows to make a fake payment request look like normal customer service.

How the scam works

Gen says the campaign operates through two main paths. In one, attackers impersonate hotel staff or booking support and send guests to fake payment pages through WhatsApp, email, SMS, or booking-platform messages. In the other, they first compromise hotel-side systems, then use legitimate access to message guests directly from trusted channels.

That second path creates the biggest risk. According to Gen, attackers phish hotel employees and partners to steal account credentials for hospitality software, then log into real environments and access reservation data such as guest names, contact details, stay dates, and payment information. Once inside, they can send fraudulent payment requests through real hotel or booking-linked workflows.

The sample you shared captures the core mechanics accurately, including the use of stolen reservation details, compromised hotel software accounts, malicious PDFs, and typo-squatted payment domains. It also correctly reflects Gen’s point that this is a workflow hijack built on trust and context rather than a simple generic travel scam.

Why guests keep falling for it

When a payment request arrives inside a real booking thread, or references a confirmed stay with the correct dates and hotel name, many travelers assume it is legitimate. Gen says the scam abuses the fact that guests already expect some kind of pre-arrival communication from hotels, especially around payment verification, late check-in, or booking confirmation.

Scam message received by a victim using data from a real reservation (Source – GenDigital)

Booking.com’s own traveler safety guidance matches that risk. The company says travelers should not send a payment that falls outside the platform’s stated policy, and warns that no legitimate transaction or reservation change should take place outside the official booking flow.

For hotel partners, Booking.com also says its messaging protections exist specifically to stop cybercriminals from impersonating properties and sending fraudulent payment links to guests. That public warning matters because it confirms the attack does not only target end users. It also targets the communication layer between hotels and guests.

How hotel-side compromise escalates the fraud

Gen says attackers do more than steal passwords. In some cases, they trick hotel staff or partners into running a malicious command disguised as a security update, which installs remote access malware and gives the attacker a more durable foothold inside the hotel’s environment.

That detail matters because it turns an account compromise into an operational breach. Instead of one stolen login, the attacker can gain ongoing access to reservation data, internal workflows, and guest communication tools. That gives them time to send professionally styled payment requests, often with deadlines of 24 to 48 hours, to push guests into paying fast.

Victim is redirected to typo-squatted domains designed to harvest card details, bank transfers or other payment information (Source – GenDigital)

The sample article also correctly notes that some PDFs and payment requests were hosted on already compromised legitimate infrastructure before sending victims to typo-squatted domains. That extra layer of trust can make the scam harder to spot, because the attack chain may begin on a real partner-linked resource before the victim reaches a fake payment page.

Main signs of the reservation hijack scam

Red flagWhy it matters
Urgent request to “verify” or “complete” paymentPressure reduces the chance the guest will verify independently
Message references a real bookingStolen reservation data makes the scam look legitimate
Link leads outside the hotel or booking platformPayment often shifts to typo-squatted or unrelated domains
Message arrives through WhatsApp or SMSAttackers use channels guests may trust for quick travel updates
PDF invoice with a short deadlineFraudsters add urgency and branding to look official
Payment request conflicts with the booking policyBooking.com says legitimate transactions should stay within official flows

The countries with the highest observed activity in Gen’s research included the UK, France, Germany, the US, Brazil, and Australia. That does not mean other regions are safe. It means the scam already has broad international reach and can easily move wherever attackers find exposed hotel accounts and active reservation data.

What travelers should do right now

  • Do not tap a payment link sent through WhatsApp, SMS, email, or a booking thread unless you independently verify it first.
  • Open the hotel’s official website or the original booking platform yourself instead of using the message link.
  • Call the property using the number listed on the official site or app if anything about the message feels unusual.
  • If you already entered card details, contact your bank immediately, freeze or replace the card, and enable transaction alerts.
  • Watch for follow-on scams after the first contact, especially refund scams or “failed payment” messages. This inference follows Gen’s description of attackers using real context and repeated trust cues to keep victims engaged.

What hotels and partners should do

  • Enforce phishing-resistant MFA for staff accounts that access reservation or guest-messaging systems. Cloudbeds says its platform uses MFA as a core protection layer, and Booking.com tells partners to report suspected account attacks immediately.
  • Train staff to recognize fake support emails, urgent login alerts, and update prompts. Cloudbeds says it is tracking an ongoing phishing campaign affecting hospitality providers across the industry.
  • Limit who can export reservation data or send payment-related guest messages. That recommendation follows directly from Gen’s finding that attackers abuse reservation visibility and trusted messaging workflows.
  • Review messaging-security settings and account access logs for unusual activity. Booking.com says messaging protections exist to reduce impersonation and fake payment-link abuse.
  • Treat guest communication systems as security-critical infrastructure, not just service tools. That conclusion follows from Gen’s findings about how attackers turned routine hospitality workflows into fraud channels.

FAQ

What is the reservation hijack scam?

It is a fraud scheme in which attackers use stolen booking details and trusted hotel or booking workflows to send fake payment requests to real guests. Gen documented the campaign on March 25, 2026.

How do attackers get real reservation details?

Researchers say they often steal hotel or partner credentials through phishing, then log into real hospitality software and access future reservation data. In some cases, they also trick staff into running malicious commands that install remote access malware.

Can fake payment messages appear inside a real booking conversation?

Yes. Gen says attackers may use legitimate hotel or booking-linked communication channels after compromising the hotel side of the workflow, which makes the fraud much harder to detect.

What should I do if a hotel asks me to pay again?

Do not use the link in the message. Open the booking platform or hotel website yourself, then verify the request through official channels. Booking.com says legitimate transactions should not happen outside official payment policies and workflows.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages