Yesterday, we already reported on a concrete incident. A seemingly normal business trip, booked via Booking.com, suddenly became the starting point of a potential attack. Shortly after the booking, an email arrived. Suspicious activity. A changed access PIN. A warning that data may have been compromised. Name, email address, communication with the hotel, travel details. All information that appears harmless at first glance. In reality, it marks the entry point into an entirely new class of attacks.
But this case is not an isolated one. It is part of a pattern that is becoming increasingly visible.At Darkgate, we took this as a starting point to dig deeper. Which platforms are affected. Which attack methods are being used. And most importantly, how frequently these incidents are occurring. The result is clear. Booking.com is currently a central focal point. Not necessarily because the platform itself is insecure, but because it operates within a highly complex ecosystem. Hotels, partners, integrations, payment providers. This is where the real vulnerabilities emerge.
Over the past months, reports of compromised hotel accounts have increased significantly. Attackers take over access to hotel systems and gain visibility into real booking data. Names, travel schedules, communication histories. No simulation. No fake data. This authenticity is exactly what makes the resulting attacks so effective. Guests are contacted directly, sometimes even through official communication channels of the platform. The messages appear legitimate because they are based on real information.
At the same time, there has been a massive increase in travel-related phishing. The focus is clearly on booking platforms. Payment confirmations, supposed issues with reservations, requests for verification. Always tied to an actual booking. This is what makes these attacks so effective. They are not random. They are informed.
Another attack vector is the abuse of official messaging systems. Attackers contact guests directly through platforms like Booking.com, impersonating hotels or support teams and guiding the conversation in a controlled way. In many cases, the process ends on external pages where payment details are requested. By that point, the user is already operating within a trusted context. And that trust is exactly what is being exploited.And then there are cases that go even further.
The operators of Darkgate themselves became victims of credit card fraud in connection with Booking-related transactions. The card in question was deliberately used only in very limited scenarios. A backup credit card, not part of daily usage. The last authorized use of this card took place in spring 2025, and notably not for Booking, but for the purchase of event tickets through an external provider. After that, the card was not actively used again.
Then, in autumn 2025, multiple unauthorized Booking.com reservations suddenly appeared. Several transactions, multiple bookings, clearly not initiated by the cardholder. A straightforward case of fraud, but the handling of the situation revealed something deeper.
The initial response from the payment provider suggested a shared responsibility. There was an implicit assumption that the transactions might have been legitimate. This is a recurring pattern in such cases. However, in this scenario one key fact stood out. None of the transactions were authorized through mechanisms such as Visa Secure or Mastercard Identity Check. There was no active confirmation, no authentication step, no interaction by the cardholder.
The transactions were executed solely based on the available card credentials. In simple terms, the data itself was sufficient to trigger the bookings. No additional security layer intervened. No system flagged the anomaly.This is the critical point.
It demonstrates how modern fraud actually works. It is no longer about breaking systems. It is about using valid data within systems that are designed to accept it. The combination of card number, expiration date and associated details is often enough to initiate transactions, especially in complex platform environments with layered payment flows and multiple integrations.
In this case, the suspicion does not primarily fall on Booking itself. It is far more likely that the data was compromised earlier in the chain. The event ticket provider where the card was last used is one possible source. A compromised payment provider or an insecure gateway within the transaction flow is another. These upstream systems rarely receive the same level of scrutiny, yet they are integral to the entire ecosystem.And this is where the bigger picture becomes clear.
Modern attacks do not originate at a single point. They evolve across a chain. A credit card is used in one context. The data is compromised there. Weeks or months later, it reappears in a completely different context. In this case, through Booking-related transactions. Real bookings, real charges, but entirely fraudulent.
For the end user, this is almost impossible to trace. The booking happens on Booking. The fraud appears on Booking. But the source may lie somewhere else entirely. This lack of transparency is what makes these scenarios so dangerous.
In this particular case, the positive outcome was that the fraud could ultimately be proven. Through clear evidence, the absence of authorization and transaction analysis, the case was recognized as fraudulent. The amounts were refunded. But the process to reach that point was far from simple. And that reveals another structural issue. Even in clear cases of fraud, the burden of proof often lies with the victim.What does this mean in practical terms.
First, it becomes clear that traditional security thinking is no longer sufficient. It is not enough to secure individual systems. It is not enough to educate users. These attacks are interconnected. They operate across processes. They build on trust.
Second, the role of data itself is fundamentally changing. It is no longer just a byproduct of digital operations. It is the primary attack surface. Every dataset increases the attacker’s capabilities. The more context is available, the more precise the attack becomes. And the harder it becomes to detect.The situation becomes even more critical when multiple elements converge. Travel data, payment information, communication histories. Together, they form a complete picture. A picture that enables not only phishing, but targeted fraud with real financial consequences.The direction is clear.
Attacks are not becoming louder. They are becoming more precise. They are not becoming more technically complex. They are becoming more intelligent in how they use existing systems.And that is exactly why this case matters.It shows that security is no longer about protecting systems alone.It is about understanding how they are used.Because the most dangerous attacks do not occur where systems fail.They occur where systems function exactly as designed.



