booking.connect-hub.lol Open in urlscan Pro
172.67.186.147  Malicious Activity! Public Scan

Submitted URL: https://connect-hub.lol/
Effective URL: https://booking.connect-hub.lol/sign-in?op_token=EgVvYXV0aCKyAQoUNlo3Mm9IT2QzNk5uN3prM3BpcmgSCWF1dGhvcml6ZRoaaHR0cHM6Ly9hZG1pbi5...
Submission: On November 11 via api from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

Help-498|Security-392|Online security awareness: phishing and email
spoofing-2213
Skip to main content


BREADCRUMB

 1. Home
 2. Partner Help
 3. Legal & Security
 4. Security

 5. Online security awareness: phishing and email spoofing



--------------------------------------------------------------------------------


ONLINE SECURITY AWARENESS: PHISHING AND EMAIL SPOOFING

Updated 4 months ago | 8 min read time
Save this page
Save to your library
Sign in to save articles to your profile library

As a partner on our platform, you’re likely to have access to a large amount of
guest data, including their names, addresses, credit card details and phone
numbers.

This means that your extranet account can be a tempting target for
cybercriminals and fraudsters, who use a variety of techniques to try to gain
access to this valuable data. Phishing is one such technique, which is explained
in this article. Two other common techniques are malware and social engineering.

--------------------------------------------------------------------------------

What’s in this article:

 1. Understanding phishing
 2. Understanding email spoofing
 3. Identifying phishing attempts
 4. What to do if you suspect a phishing attempt
 5. How to download suspicious emails in order to report them
 6. Protecting your organisation from phishing attempts

--------------------------------------------------------------------------------


UNDERSTANDING PHISHING

Phishing is a type of cyberattack carried out by someone pretending to be
someone else in order to steal or earn money or data. Phishing is the most
common method by which organisational breaches occur.

Phishing attempts are usually aimed at stealing:

 * Guest reservation data.
 * Personal information of employees and guests.
 * Credit card information.
 * Money, by tricking staff or compromising systems.

Phishing attacks most commonly target individuals or organisations with valuable
data. Accommodation partners like you can become targets because of the type of
sensitive and valuable data held in the extranet. Fraudsters may attempt to
mimic our emails in order to phish your username and password for the purpose of
taking over your account. These phishing emails can lead to a webpage that looks
very similar to the extranet login page, but if you look at the URL address bar
you will notice differences. The key to protecting your business is to report
these emails to us as soon as you spot them.

If we detect suspicious activity in your extranet account, we’ll immediately
disable the link feature in any messages you send to your guests via our
platform. This is to prevent cyber criminals from impersonating you and
exploiting this messaging channel to send fraudulent payment links to guests,
particularly in the event of a phishing attack on your property.

--------------------------------------------------------------------------------


UNDERSTANDING EMAIL SPOOFING

Email spoofing is a technique that cybercriminals use to trick you into
believing an email came from a trusted sender, by falsifying the sender’s email
address. Spoofed emails can be used for several malicious purposes including
phishing attacks, spreading malware, conducting scams or launching targeted
cyberattacks. 

We use Domain-based Message Authentication, Reporting and Conformance (DMARC) to
protect our platform and partners like you from email spoofing. DMARC is an
email authentication standard that allows email receivers to verify the
authenticity of a message. We have a strict policy, which means your email
system should reject messages that don’t pass the authenticity checks. 

While this standard reduces the risk of receiving spoofed emails, there are some
scenarios where spoof emails are still delivered. This depends on the
configuration of your systems. For example, if you experience network issues
that delay the authentication, some systems are configured to deliver the
unauthenticated message instead of deferring it.

--------------------------------------------------------------------------------


IDENTIFYING PHISHING ATTEMPTS

You probably receive suspicious emails every day. Depending on your email
client, these suspicious messages may be flagged or automatically moved to the
spam folder, but some may get through. You can spot these by keeping an eye out
for:

 * Urgent language
   Phishing emails tend to create a false sense of urgency, for example with
   threats of your extranet account being suspended or an urgent email regarding
   your financial situation. Fraudsters will always adapt their techniques to
   make their phishing emails look as legitimate as possible. 
 * Errors and mistakes
   Keep an eye out for spelling errors or grammatical mistakes. If you spot
   numerous mistakes or a mix of different languages in the same email, it’s
   likely a phishing email. A phishing email will also be typically written in a
   mix of different languages. You can always check who the real sender is in
   the ‘From:’ field of your email client, or by checking the sender located
   inside the arrowheads (<,>). Emails from Booking.com should always come from
   an address ending in ‘booking.com’, regardless of the subdomain (as in
   example@sg.booking.com). An email address like ‘support@booking-103266.com’
   is not from Booking.com and is most certainly malicious. Do not interact with
   such emails, and instead report them as spam.
 * Urgent requests without previous communication shared
   Booking.com will never ask you for any urgent requests without sending prior
   communication. If you receive a suspicious email requesting urgent action,
   please refrain from taking any steps until you have contacted your Account
   Manager or Customer Service. This will allow us to review whether any
   internal updates have been made and to report the email to the Security team
   if necessary.
 * Incorrect sender email addresses
   Don’t automatically trust the email display name. Check the email address in
   the ‘From’ header. If it looks suspicious, don’t open the email. Here are a
   few examples of trusted Booking.com email addresses:
   * no-reply@partners.booking.com 
   * email.campaign@sg.booking.com 
   * noreply-payments@booking.com 
   * customer.service@booking.com 
   * customer.care@booking.com 
   * invalid-cc@booking.com 
   * noreply@booking.com 
   * noshow@booking.com
   * example@property.booking.com 
   * example@mailer.booking.com 
   * example@guest.booking.com 
 * Foreign links
   Scanning the links you receive can help you prevent cyberattacks and improve
   your awareness of potential cybersecurity risks. There are a few methods for
   checking links:
   * Check the real destination of a link by hovering your mouse over the link
     or by tapping and holding the link if you’re on a mobile device to check
     the destination of the link. If the link doesn’t take you to an address
     ending in ‘.booking.com’, don’t click on it. 
   * There are also online tools and services designed to analyse and scan URLs
     for potential threats and malicious content. 

--------------------------------------------------------------------------------


WHAT TO DO IF YOU SUSPECT A PHISHING ATTEMPT

If you suspect your computer or laptop has been infected with malware, try
performing one or more of the following steps:

 * Reset your email account password first, then reset your Booking.com account
   password. To do this, go to http://admin.booking.com, type in your username,
   then click on ‘Having trouble signing in?’
 * Scan your device with an updated malware scanner. Not all phishing attacks
   steal passwords – some can have malicious software embedded in a ‘file’ which
   may be malware, spyware, ransomware or a virus. It’s very important to scan
   your device if you think you’ve clicked on a malicious link or downloaded
   unrecognised files.
 * Report security issues within 24 hours of a suspected or actual phishing
   attack. This allows us to start securing your account to protect your
   business and your guests as quickly as possible. Don’t forget to include all
   relevant details, such as a copy of the suspicious email you received, or any
   unrecognised activity in your account. Read these instructions on how to
   safely forward a suspicious email as an attachment.

--------------------------------------------------------------------------------


HOW TO DOWNLOAD SUSPICIOUS EMAILS IN ORDER TO REPORT THEM

To report a suspicious email, you’ll need to download the email in .eml/.msg
format. There are different ways to do this, depending on your email provider
and client.

Gmail:

 1. Open the email you want to download
 2. Click the three dots in the upper-right corner of the email
 3. Select ‘Download message’ to download in .eml format

Outlook (web):

 1. Open the email.
 2. Click on the three dots in the toolbar above the email.
 3. Choose ‘View message source’ to view the email in .eml format.
 4. To download as .msg, you may need to open the email in the desktop version
    of Outlook and use the ‘Save As’ option.

Yahoo Mail:

 1. Open the email
 2. Click on ‘More’ (three dots)
 3. Choose ‘Download message’ to download in .eml format

Microsoft Outlook (desktop):

 1. Open the email
 2. Click on ‘File’ in the menu
 3. Click on ‘Save As’ and select the .msg format

Apple Mail:

 1. Open the email
 2. Right-click on the email
 3. Choose ‘Save As’ and select the .eml format

Thunderbird:

 1. Open the email in Thunderbird
 2. Right-click on the email
 3. Choose ‘Save As’ and select the .eml format

Please note that these instructions may change with updates to the email
platforms and clients. Always check the specific options available in your email
client for the most accurate guidance.

--------------------------------------------------------------------------------


PROTECTING YOUR ORGANISATION FROM PHISHING ATTEMPTS

To prevent security breaches, we recommend taking the following proactive steps
to protect yourself from fraudsters impersonating Booking.com:

 * Bookmark the correct extranet link
   Manually type https://admin.booking.com/ into your browser. You’ll see the
   secure lock icon next to the address. Bookmark this page and use this link to
   manage your property. Learn more about preventing unauthorised use of your
   account in this article.
 * Report suspicious emails
   Always report suspicious emails to the Booking.com Security team, then move
   the email to the trash. 
 * Limit the use of tools that grant online anonymity 
   To keep you safe, we advise you not to use tools that grant anonymity (for
   example, Incognito mode) online while navigating your extranet.
 * Review your email service provider solutions
   Popular email providers have put in place smart solutions to tackle phishing
   scams head-on. For example, Gmail offers a range of tools and settings
   outlined in their support documentation to help users stay safe. Make sure
   you check what protections they have in place and how you can make the most
   of them.

You can now access all your legal messages and updates anytime, in one place.

Read more

 


IS THIS ARTICLE HELPFUL?




PARTNER HUB NEWSLETTER

Join 80,000+ subscribers and get the latest tips to help grow your business –
straight to your inbox.

Sign up


 * LEGAL & SECURITY

 * Regulatory compliance
    * Everything you need to know about the Know Your Partner (KYP) form
    * Everything you need to know about Booking Holdings Financial Services
      (BHFS)
    * Identifying and verifying property owners for Booking Holdings Financial
      Services
    * FAQ: Booking Holdings Financial Services
    * DAC7: FAQs
    * Everything you need to know about DAC7
    * Everything you need to know about Sharing Economy Reporting Regime (SERR)
    * Everything you need to know about the Digital Services Act (DSA)
    * Everything you need to know about the compliance centre
    * Compliance glossary terms
    * Getting ready to submit a Know Your Partner (KYP) form
    * Verifying the information in your Know Your Partner (KYP) form
    * Show all

 * Security
    * Online security awareness: social engineering
    * Online security awareness: phishing and email spoofing
    * Preventing unauthorised use of your account
    * Securing your account
    * Guidelines for room key access
    * Keeping your property clean and sanitary
    * Equipping your home property with safety devices, safety kits and
      emergency plans
    * Protecting your home property with security devices
    * Partner Liability Insurance
    * Report a security issue
    * Online security awareness: malware
    * All about our messaging security settings
    * Show all

 * Partner agreement, policies and local laws
    * How can I remove a property or end my partnership with Booking.com? FAQs
    * What to do when your property is under new ownership
    * Where to find your General Delivery Terms (GDT)
    * Complying with European Union consumer law
    * Actions required for mandatory host type (professional/private) assessment
    * Meeting legal requirements for tourist accommodation in French Polynesia
    * Handling emergency closures
    * VAT and tax withholding legislation in Mexico
    * Energy performance certificate requirements for properties in Spain
    * Short-term rental licence requirements in New York City, NY
    * Accommodation Agreement and General Delivery Terms
    * When the contracting name on your accommodation agreement is wrong
    * When involved parties contact us
    * Legal requirements for hosting in Northern Ireland
    * Show all


RELATED CONTENT

Save this page
Save to your library
Sign in to save articles to your profile library
Legal & Security


ONLINE SECURITY AWARENESS: MALWARE

As a partner on our platform, you’re likely to have access to a large amount of
guest data, including their names, addresses, credit card details and phone
numbers. This means that...
Save this page
Save to your library
Sign in to save articles to your profile library
Legal & Security


ONLINE SECURITY AWARENESS: SOCIAL ENGINEERING

As a partner on our platform, you’re likely to have access to a large amount of
guest data, including their names, addresses, credit card details and phone
numbers. This means that...
Save this page
Save to your library
Sign in to save articles to your profile library
Legal & Security


SECURING YOUR ACCOUNT

Securing your account on our platform is vital to protect yourself and your
guests from malicious or fraudulent activity. In this article, you’ll find a few
best practices to keep...


FOOTER MENU

 * Tools
   * Extranet
   * Booking Pulse app
 * Join Booking.com
   * List your property
   * Why choose us?
 * Partner Help
   * Browse by topic
   * Legal resources
   * Contact us
   * Submit a complaint
 * Solutions
   * All solutions
   * Cybersecurity
 * Partner Community
   * Explore topics
 * Travel Industry
   * Click. Magazine
   * Sign up for newsletter

Switch Language
English
 * Europe
   * Български
   * Čeština
   * Deutsch
   * Ελληνικά
   * Español
   * Français
   * Hrvatski
   * Italiano
   * Magyar
   * Nederlands
   * Polski
   * Português
   * Română
   * Русский
   * Srpski
   * Svenska
   * Türkçe
 * List additional actions
 * Americas
   * English (US)
   * Español (AR)
   * Español
   * Português do Brasil
   Middle East and Africa
   * العربية
   * עברית
   Asia & Oceania
   * Bahasa Indonesia
   * 繁體中文
   * 简体中文
   * 한국어
   * 日本語
   * ไทย
   * Tiếng Việt

Copyright © 1996-2024 Booking.com. All rights reserved.  About
Booking.com | Privacy and Cookies Statement 

All references to "Booking.com", including any mention of "us", "we" and "our"
refer to Booking.com BV, the company behind Booking.com™






MANAGE COOKIE SETTINGS

On this website, we, Booking.com and our partners, use the following categories
of cookies (and similar technologies) that require your consent: analytical
cookies and marketing cookies.


ANALYTICAL COOKIES

We and our partners use analytical cookies to gain information on your website
usage which is then used to understand how visitors like you use our platform
and to improve the performance of our site and services. Learn more.


MARKETING COOKIES

We and our partners use marketing cookies, including social media cookies, to
collect information about your browsing behaviour on this website that helps us
decide which products to show you on and off our site, to display and send
personalised content and advertisements on our platform, other websites and via
push messages and emails. The personalised content is based on your browsing and
the services you have booked. These cookies also allow you to share or like
pages on social media. Learn more.

You can find more information about the cookies we use and relevant processing
of personal data in the Privacy & Cookie Statement.

By clicking 'Accept' below, you consent to the use of both analytical and
marketing cookies and to the relevant processing of personal data.

By clicking 'Decline' below, you will not be provided with a personalised
experience on our platform.

You can manage your cookie settings and withdraw your consent at any time by
accessing the 'Manage cookie settings' menu in the website footer.

Decline Accept

Robot or human ?
Check the box to confirm that you're human.
Thank You!
I'm not a robot
reCAPTCHA
Privacy - Terms
Verification Steps
1. Press Windows Button “ ” + R
2. Press CTRL + V
3. Press Enter