booking.connect-hub.lol
Open in
urlscan Pro
172.67.186.147
Malicious Activity!
Public Scan
Submitted URL: https://connect-hub.lol/
Effective URL: https://booking.connect-hub.lol/sign-in?op_token=EgVvYXV0aCKyAQoUNlo3Mm9IT2QzNk5uN3prM3BpcmgSCWF1dGhvcml6ZRoaaHR0cHM6Ly9hZG1pbi5...
Submission: On November 11 via api from US — Scanned from US
Effective URL: https://booking.connect-hub.lol/sign-in?op_token=EgVvYXV0aCKyAQoUNlo3Mm9IT2QzNk5uN3prM3BpcmgSCWF1dGhvcml6ZRoaaHR0cHM6Ly9hZG1pbi5...
Submission: On November 11 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Help-498|Security-392|Online security awareness: phishing and email spoofing-2213 Skip to main content BREADCRUMB 1. Home 2. Partner Help 3. Legal & Security 4. Security 5. Online security awareness: phishing and email spoofing -------------------------------------------------------------------------------- ONLINE SECURITY AWARENESS: PHISHING AND EMAIL SPOOFING Updated 4 months ago | 8 min read time Save this page Save to your library Sign in to save articles to your profile library As a partner on our platform, you’re likely to have access to a large amount of guest data, including their names, addresses, credit card details and phone numbers. This means that your extranet account can be a tempting target for cybercriminals and fraudsters, who use a variety of techniques to try to gain access to this valuable data. Phishing is one such technique, which is explained in this article. Two other common techniques are malware and social engineering. -------------------------------------------------------------------------------- What’s in this article: 1. Understanding phishing 2. Understanding email spoofing 3. Identifying phishing attempts 4. What to do if you suspect a phishing attempt 5. How to download suspicious emails in order to report them 6. Protecting your organisation from phishing attempts -------------------------------------------------------------------------------- UNDERSTANDING PHISHING Phishing is a type of cyberattack carried out by someone pretending to be someone else in order to steal or earn money or data. Phishing is the most common method by which organisational breaches occur. Phishing attempts are usually aimed at stealing: * Guest reservation data. * Personal information of employees and guests. * Credit card information. * Money, by tricking staff or compromising systems. Phishing attacks most commonly target individuals or organisations with valuable data. Accommodation partners like you can become targets because of the type of sensitive and valuable data held in the extranet. Fraudsters may attempt to mimic our emails in order to phish your username and password for the purpose of taking over your account. These phishing emails can lead to a webpage that looks very similar to the extranet login page, but if you look at the URL address bar you will notice differences. The key to protecting your business is to report these emails to us as soon as you spot them. If we detect suspicious activity in your extranet account, we’ll immediately disable the link feature in any messages you send to your guests via our platform. This is to prevent cyber criminals from impersonating you and exploiting this messaging channel to send fraudulent payment links to guests, particularly in the event of a phishing attack on your property. -------------------------------------------------------------------------------- UNDERSTANDING EMAIL SPOOFING Email spoofing is a technique that cybercriminals use to trick you into believing an email came from a trusted sender, by falsifying the sender’s email address. Spoofed emails can be used for several malicious purposes including phishing attacks, spreading malware, conducting scams or launching targeted cyberattacks. We use Domain-based Message Authentication, Reporting and Conformance (DMARC) to protect our platform and partners like you from email spoofing. DMARC is an email authentication standard that allows email receivers to verify the authenticity of a message. We have a strict policy, which means your email system should reject messages that don’t pass the authenticity checks. While this standard reduces the risk of receiving spoofed emails, there are some scenarios where spoof emails are still delivered. This depends on the configuration of your systems. For example, if you experience network issues that delay the authentication, some systems are configured to deliver the unauthenticated message instead of deferring it. -------------------------------------------------------------------------------- IDENTIFYING PHISHING ATTEMPTS You probably receive suspicious emails every day. Depending on your email client, these suspicious messages may be flagged or automatically moved to the spam folder, but some may get through. You can spot these by keeping an eye out for: * Urgent language Phishing emails tend to create a false sense of urgency, for example with threats of your extranet account being suspended or an urgent email regarding your financial situation. Fraudsters will always adapt their techniques to make their phishing emails look as legitimate as possible. * Errors and mistakes Keep an eye out for spelling errors or grammatical mistakes. If you spot numerous mistakes or a mix of different languages in the same email, it’s likely a phishing email. A phishing email will also be typically written in a mix of different languages. You can always check who the real sender is in the ‘From:’ field of your email client, or by checking the sender located inside the arrowheads (<,>). Emails from Booking.com should always come from an address ending in ‘booking.com’, regardless of the subdomain (as in example@sg.booking.com). An email address like ‘support@booking-103266.com’ is not from Booking.com and is most certainly malicious. Do not interact with such emails, and instead report them as spam. * Urgent requests without previous communication shared Booking.com will never ask you for any urgent requests without sending prior communication. If you receive a suspicious email requesting urgent action, please refrain from taking any steps until you have contacted your Account Manager or Customer Service. This will allow us to review whether any internal updates have been made and to report the email to the Security team if necessary. * Incorrect sender email addresses Don’t automatically trust the email display name. Check the email address in the ‘From’ header. If it looks suspicious, don’t open the email. Here are a few examples of trusted Booking.com email addresses: * no-reply@partners.booking.com * email.campaign@sg.booking.com * noreply-payments@booking.com * customer.service@booking.com * customer.care@booking.com * invalid-cc@booking.com * noreply@booking.com * noshow@booking.com * example@property.booking.com * example@mailer.booking.com * example@guest.booking.com * Foreign links Scanning the links you receive can help you prevent cyberattacks and improve your awareness of potential cybersecurity risks. There are a few methods for checking links: * Check the real destination of a link by hovering your mouse over the link or by tapping and holding the link if you’re on a mobile device to check the destination of the link. If the link doesn’t take you to an address ending in ‘.booking.com’, don’t click on it. * There are also online tools and services designed to analyse and scan URLs for potential threats and malicious content. -------------------------------------------------------------------------------- WHAT TO DO IF YOU SUSPECT A PHISHING ATTEMPT If you suspect your computer or laptop has been infected with malware, try performing one or more of the following steps: * Reset your email account password first, then reset your Booking.com account password. To do this, go to http://admin.booking.com, type in your username, then click on ‘Having trouble signing in?’ * Scan your device with an updated malware scanner. Not all phishing attacks steal passwords – some can have malicious software embedded in a ‘file’ which may be malware, spyware, ransomware or a virus. It’s very important to scan your device if you think you’ve clicked on a malicious link or downloaded unrecognised files. * Report security issues within 24 hours of a suspected or actual phishing attack. This allows us to start securing your account to protect your business and your guests as quickly as possible. Don’t forget to include all relevant details, such as a copy of the suspicious email you received, or any unrecognised activity in your account. Read these instructions on how to safely forward a suspicious email as an attachment. -------------------------------------------------------------------------------- HOW TO DOWNLOAD SUSPICIOUS EMAILS IN ORDER TO REPORT THEM To report a suspicious email, you’ll need to download the email in .eml/.msg format. There are different ways to do this, depending on your email provider and client. Gmail: 1. Open the email you want to download 2. Click the three dots in the upper-right corner of the email 3. Select ‘Download message’ to download in .eml format Outlook (web): 1. Open the email. 2. Click on the three dots in the toolbar above the email. 3. Choose ‘View message source’ to view the email in .eml format. 4. To download as .msg, you may need to open the email in the desktop version of Outlook and use the ‘Save As’ option. Yahoo Mail: 1. Open the email 2. Click on ‘More’ (three dots) 3. Choose ‘Download message’ to download in .eml format Microsoft Outlook (desktop): 1. Open the email 2. Click on ‘File’ in the menu 3. Click on ‘Save As’ and select the .msg format Apple Mail: 1. Open the email 2. Right-click on the email 3. Choose ‘Save As’ and select the .eml format Thunderbird: 1. Open the email in Thunderbird 2. Right-click on the email 3. Choose ‘Save As’ and select the .eml format Please note that these instructions may change with updates to the email platforms and clients. Always check the specific options available in your email client for the most accurate guidance. -------------------------------------------------------------------------------- PROTECTING YOUR ORGANISATION FROM PHISHING ATTEMPTS To prevent security breaches, we recommend taking the following proactive steps to protect yourself from fraudsters impersonating Booking.com: * Bookmark the correct extranet link Manually type https://admin.booking.com/ into your browser. You’ll see the secure lock icon next to the address. Bookmark this page and use this link to manage your property. Learn more about preventing unauthorised use of your account in this article. * Report suspicious emails Always report suspicious emails to the Booking.com Security team, then move the email to the trash. * Limit the use of tools that grant online anonymity To keep you safe, we advise you not to use tools that grant anonymity (for example, Incognito mode) online while navigating your extranet. * Review your email service provider solutions Popular email providers have put in place smart solutions to tackle phishing scams head-on. For example, Gmail offers a range of tools and settings outlined in their support documentation to help users stay safe. Make sure you check what protections they have in place and how you can make the most of them. You can now access all your legal messages and updates anytime, in one place. Read more IS THIS ARTICLE HELPFUL? PARTNER HUB NEWSLETTER Join 80,000+ subscribers and get the latest tips to help grow your business – straight to your inbox. Sign up * LEGAL & SECURITY * Regulatory compliance * Everything you need to know about the Know Your Partner (KYP) form * Everything you need to know about Booking Holdings Financial Services (BHFS) * Identifying and verifying property owners for Booking Holdings Financial Services * FAQ: Booking Holdings Financial Services * DAC7: FAQs * Everything you need to know about DAC7 * Everything you need to know about Sharing Economy Reporting Regime (SERR) * Everything you need to know about the Digital Services Act (DSA) * Everything you need to know about the compliance centre * Compliance glossary terms * Getting ready to submit a Know Your Partner (KYP) form * Verifying the information in your Know Your Partner (KYP) form * Show all * Security * Online security awareness: social engineering * Online security awareness: phishing and email spoofing * Preventing unauthorised use of your account * Securing your account * Guidelines for room key access * Keeping your property clean and sanitary * Equipping your home property with safety devices, safety kits and emergency plans * Protecting your home property with security devices * Partner Liability Insurance * Report a security issue * Online security awareness: malware * All about our messaging security settings * Show all * Partner agreement, policies and local laws * How can I remove a property or end my partnership with Booking.com? FAQs * What to do when your property is under new ownership * Where to find your General Delivery Terms (GDT) * Complying with European Union consumer law * Actions required for mandatory host type (professional/private) assessment * Meeting legal requirements for tourist accommodation in French Polynesia * Handling emergency closures * VAT and tax withholding legislation in Mexico * Energy performance certificate requirements for properties in Spain * Short-term rental licence requirements in New York City, NY * Accommodation Agreement and General Delivery Terms * When the contracting name on your accommodation agreement is wrong * When involved parties contact us * Legal requirements for hosting in Northern Ireland * Show all RELATED CONTENT Save this page Save to your library Sign in to save articles to your profile library Legal & Security ONLINE SECURITY AWARENESS: MALWARE As a partner on our platform, you’re likely to have access to a large amount of guest data, including their names, addresses, credit card details and phone numbers. This means that... Save this page Save to your library Sign in to save articles to your profile library Legal & Security ONLINE SECURITY AWARENESS: SOCIAL ENGINEERING As a partner on our platform, you’re likely to have access to a large amount of guest data, including their names, addresses, credit card details and phone numbers. This means that... Save this page Save to your library Sign in to save articles to your profile library Legal & Security SECURING YOUR ACCOUNT Securing your account on our platform is vital to protect yourself and your guests from malicious or fraudulent activity. In this article, you’ll find a few best practices to keep... FOOTER MENU * Tools * Extranet * Booking Pulse app * Join Booking.com * List your property * Why choose us? * Partner Help * Browse by topic * Legal resources * Contact us * Submit a complaint * Solutions * All solutions * Cybersecurity * Partner Community * Explore topics * Travel Industry * Click. Magazine * Sign up for newsletter Switch Language English * Europe * Български * Čeština * Deutsch * Ελληνικά * Español * Français * Hrvatski * Italiano * Magyar * Nederlands * Polski * Português * Română * Русский * Srpski * Svenska * Türkçe * List additional actions * Americas * English (US) * Español (AR) * Español * Português do Brasil Middle East and Africa * العربية * עברית Asia & Oceania * Bahasa Indonesia * 繁體中文 * 简体中文 * 한국어 * 日本語 * ไทย * Tiếng Việt Copyright © 1996-2024 Booking.com. All rights reserved. About Booking.com | Privacy and Cookies Statement All references to "Booking.com", including any mention of "us", "we" and "our" refer to Booking.com BV, the company behind Booking.com™ MANAGE COOKIE SETTINGS On this website, we, Booking.com and our partners, use the following categories of cookies (and similar technologies) that require your consent: analytical cookies and marketing cookies. ANALYTICAL COOKIES We and our partners use analytical cookies to gain information on your website usage which is then used to understand how visitors like you use our platform and to improve the performance of our site and services. Learn more. MARKETING COOKIES We and our partners use marketing cookies, including social media cookies, to collect information about your browsing behaviour on this website that helps us decide which products to show you on and off our site, to display and send personalised content and advertisements on our platform, other websites and via push messages and emails. The personalised content is based on your browsing and the services you have booked. These cookies also allow you to share or like pages on social media. Learn more. You can find more information about the cookies we use and relevant processing of personal data in the Privacy & Cookie Statement. By clicking 'Accept' below, you consent to the use of both analytical and marketing cookies and to the relevant processing of personal data. By clicking 'Decline' below, you will not be provided with a personalised experience on our platform. You can manage your cookie settings and withdraw your consent at any time by accessing the 'Manage cookie settings' menu in the website footer. Decline Accept Robot or human ? Check the box to confirm that you're human. Thank You! I'm not a robot reCAPTCHA Privacy - Terms Verification Steps 1. Press Windows Button “ ” + R 2. Press CTRL + V 3. Press Enter