Hotel Cybersecurity: A Practical Threat Playbook for Hospitality (2026)

Hotels are prime targets for booking-themed phishing and ClickFix attacks. Learn what’s hitting hospitality in 2026 and how to train staff and reduce risk.

Post hero image

Table of contents

See Hoxhunt in action
Drastically improve your security awareness & phishing training metrics while automating the training lifecycle.
Get a Demo
Updated
January 21, 2026
Written by
Jon Gellin
Fact checked by

Threat actors are targeting hotel staff with booking-related phishing emails and the ClickFix social engineering technique. These phishing campaigns are some of the most commonly observed examples of industry-specific targeting across the Hoxhunt network.

This article examines why hotels are targeted, how booking-related phishing campaigns operate, the operational and financial impact on hospitality, and what awareness teams can do to reduce human risk.

What “hotel cybersecurity” means in this guide

Hotel cybersecurity refers to the digital controls that protect hospitality workflows - especially booking and OTA communications, front-desk email, guest identity and payment handling, and the systems behind them (PMS, POS, finance, and vendor portals). This guide focuses on cyber risk that begins with staff-facing messages and ends in fraud, disruption, or data exposure.

  • OTA (Online Travel Agency): Third-party booking platforms such as Booking.com or Expedia that hotels use to list availability, manage reservations, and communicate with guests.
  • PMS (Property Management System): The core hotel system used to manage reservations, check-in and check-out, room assignments, guest profiles, and billing.
  • POS (Point of Sale): Systems used to process payments for on-site services such as restaurants, bars, spas, and shops, often connected to guest folios.

Included: Booking and OTA messages, guest requests, payment workflows, staff email, shared inboxes, and access to PMS/POS and vendor systems.
Excluded: Physical security, on-property safety, surveillance systems, and trafficking prevention.

Why are hotels prime targets for cyberattacks?

The accommodation industry handles a high volume of sensitive customer data, from payment card data to passport numbers and contact details. This makes breaches highly profitable for threat actors looking to extort the breached company, or sell data on cybercrime forums.

Operational disruptions impact both revenue and guest experience because guests depend on working check-in, room access, and payment systems, thereby increasing ransomware leverage. Time-sensitive scenarios such as cancellations and other last-minute changes, combined with reliance on third parties like booking platforms, create natural pretexts for social engineering.

Observed phishing campaigns targeting hotels (OTA impersonation + ClickFix)

Attackers target the accommodation industry using multiple angles, impersonating both guests and online travel agencies (OTAs) such as Booking.com.

These campaigns have been observed across the Hoxhunt network in recent months and reflect active, ongoing targeting of hotel staff.

Campaign 1: Booking request pretext → ClickFix

The first example campaign begins with a booking request, often for a larger group such as a construction crew or a sports team. Larger groups might often coordinate bookings via email instead of through standard booking platforms, which makes the initial email seem more legitimate. These emails are usually sent from free email addresses, most often from gmail.com. The visible sender names are often different from the local-part (the part before @) of the gmail address: the sender name might show as “Name_1”, while the email is [Name_2]@gmail.com.

Apart from the sender-local-part mismatch, the individual initial contact requests are not overtly suspicious. However, the attackers are bulk-sending emails that tell the same story with some slight variation in details and wording, potentially suggesting AI-assisted drafting. While individually the emails might look benign, volume reveals a pattern.

If the recipient answers to the booking request, they receive a follow-up email. Threat actors claim they have seen negative reviews, related to, for example, extra fees or reported thefts, and share a malicious link that seems to lead to Booking.com (Figure 1).

Hotel cybersecurity threat - email impersonating guest
Figure 1. Phishing email impersonating a guest worried about negative reviews

In reality, the link leads to a malicious lookalike Booking.com site. The landing page first prompts the recipient to verify they’re human by completing a fake CAPTCHA, and claims the site needs to review the security of the recipient’s connection (Figure 2). Next, the user will be shown a series of commands they need to complete to “finish verification” (Figure 3). This is an example of the ClickFix technique, where threat actors' goal is to trick users into running malicious commands themselves.

Hotel cybersecurity threat - Fake CAPTCHA on Booking.com lookalike landing page
Figure 2. Fake CAPTCHA on Booking.com lookalike landing page
ClickFix prompt with malicious commands
Figure 3. ClickFix prompt with malicious commands

Campaign 2: Booking.com impersonation → ClickFix

In the second campaign, attackers directly impersonate Booking.com, claiming the recipient needs to confirm hotel details to reactivate their account (Figure 4). If the first example relied more on regular workflows, this campaign leans on urgency and fear, as the email claims the recipient will lose access to their Booking.com account within 24 hours. The phishing email requests the recipient to complete a CAPTCHA verification, which suggests the landing page of the campaign may also use the ClickFix technique.

Hotel cybersecurity threat - Phishing email impersonating Booking.com
Figure 4. Phishing email impersonating Booking.com

The common denominator: Booking.com and ClickFix

These campaigns show that as of early 2026, attackers are actively targeting the hotel industry with Booking.com lures and ClickFix. In January, researchers detailed how Booking.com impersonations and ClickFix are being used to deliver DCRat malware, which allows for persistent remote access, password theft and collection of other sensitive information.

ClickFix takes advantage of the recipient’s willingness to quickly resolve a problem themselves, especially under seeming time pressure. Many hotels rely on Booking.com for visibility and operations, meaning losing access to the account even momentarily could have a significant impact on business.

You can read our full phishing trends report here, covering the latest threats bypassing filters and what's working when it comes to training programs.

How cyberattacks hit hotels (and where it hurts first)

After successfully infecting a computer with malware or gaining access to systems via credentials, the attackers can do significant harm to operations and confidential data. The consequences, whether financial, human or reputational, might be serious, as is evident from the following example.

In 2025, a casino hotel company paid $45 million to affected customers of a 2019 data breach and 2023 ransomware attack to settle multiple class action lawsuits. According to the company, the ransomware attack resulted in approximately $100 million in losses due to disrupted operations and other expenses like legal fees. These costs show how cyber incidents can compound over years through litigation, remediation and lost business.

During the incidents, sensitive customer data, like names, addresses, passport numbers and social security numbers was leaked. The exposure of this type of data has long-term risks for those affected, such as identity theft or further targeted phishing attempts. Following the ransomware attack, the company took some of its systems down and there were reports of slot machines, ATMs and room cards not working. This means the attack directly damaged customers' trust in the company’s ability to not only safeguard their data, but also ensure their safety on-site.

Reducing hotel phishing risk: awareness behaviors and security controls

Awareness behaviors

  • Ensure security awareness training for front desk staff covers booking platform impersonations, fake customer requests and ClickFix technique.
  • Emphasize “pause-and-think” before clicking links. Rather than clicking, employees should be advised to navigate to booking platforms and other systems via official domains.
  • Encourage end users to report real suspicious emails and other suspicious behavior through simple reporting flows and positive feedback. Employees should feel comfortable reporting even after a click or command execution.

Security controls

These controls limit damage but they don’t prevent initial compromise on their own - especially in booking-driven phishing attacks.

Ensure typosquatted and newly registered domains are quarantined or flagged, and quarantine emails with URLs that redirect multiple times.

Protect your systems from ClickFix:

  • Reduce user ability to run commands or scripts.
  • Review PowerShell execution policies to prevent abuse.
  • Enable PowerShell Script Block Logging to detect malicious activity.

What should hotel staff do when they receive an OTA or booking message?

In busy hotel environments, staff don’t have time to analyze every message. What works in practice is a clear, repeatable response that can be applied consistently during peak check-in and other high-pressure moments.

The default response for booking and OTA messages:

  • Don’t act inside the message. Don’t click links, open attachments, follow “verification steps” or copy commands.
  • Verify via the known path. Open the OTA or booking platform using a saved bookmark or official domain and check there.
  • Report immediately. Escalate suspicious messages even if you’re unsure, or after a click.

When this response is working, ‘zero clicks’ isn’t the only metric: the measurable impact is faster reporting and better visibility into suspicious booking and OTA messages, letting teams respond before issues spread.

How awareness teams operationalize this in hotel environments

Awareness teams don’t need to introduce new concepts for each campaign. The goal is to apply the same response consistently across onboarding, simulations, and when coming across real phishing emails.

Brief, regular reinforcement works better than infrequent long-form training. Short simulations and reminders tied to booking workflows keep expectations clear without disrupting operations.

Make it part of onboarding

High turnover means phishing risk resets frequently. Effective programs introduce realistic simulations early, using examples staff are likely to encounter on shift.

  • Day 1: Explain the default response and reporting path.
  • First weeks: Reinforce the same response with realistic booking-themed simulations.
  • First month: Repeat the scenario with small variations while keeping expectations unchanged.

The goal is to prioritize familiarity over mastery

Standardize across properties

For multi-property or franchise environments, consistency is key:

  • One response pattern for booking-related messages
  • Role-relevant examples for front desk, reservations, and finance
  • Regular review of reporting and response trends to spot gaps

This keeps teams aligned while allowing staff to focus on guest service.


Metrics that matter for hotel phishing risk (how awareness teams prove real impact)

Hotel awareness programs succeed when they can show measurable risk reduction without relying on vanity metrics like completion or click-rate alone. The most reliable signal is whether frontline staff report suspicious booking/OTA/vendor messages quickly and consistently. These four metrics translate directly into better detection, faster containment, and board-safe progress tracking.

The 4 metrics to track

Metric What it measures Why it matters in hotels What awareness teams influence
Reporting rate Percentage of suspicious messages that staff actively report (simulated and real, where possible). Front-desk and reservations teams act as the earliest detection layer. Higher reporting means threats surface faster. Drill “report even if unsure,” simplify reporting paths, and reinforce positive feedback after reports.
Miss rate Messages that are neither clicked nor reported. Silent failures are risky in high-turnover environments—staff may hesitate or disengage instead of escalating. Clarify expectations, reinforce behavioral defaults, and normalize reporting as the correct action.
Time-to-report Time from message delivery to first report. Faster reports reduce attacker dwell time and help protect shared inboxes and adjacent teams. Practice fast reporting during realistic simulations and remove fear of “reporting too late.”
Unknown-vendor reporting volume Volume of “is this legitimate?” reports related to vendors, invoices, or payment changes. Hospitality fraud frequently exploits vendor confusion and urgency rather than malware. Train verification habits and reward cautious escalation, even when the request turns out to be legitimate.

Hoxhunt for hotels: reducing booking-themed phishing risk without slowing front-desk operations

Hoxhunt helps hotels apply the guidance outlined above at scale by offering realistic booking- and OTA-themed simulations, making reporting easy for frontline teams, and giving security leaders clear visibility into reporting behavior and response speed.

Train the scenarios hotels actually face

Hoxhunt campaigns can mirror the real pretexts shown in this guide - booking inquiries, guest complaints, account reactivation pressure, and fake verification prompts - so training feels like the job rather than generic security content. That matters in hospitality because relevance is what makes learning stick, especially for new hires and frontline roles.

Make reporting the “default action,” even after a mistake

Hotels don’t need perfection, they need speed and visibility. Hoxhunt’s approach reinforces reporting as the right behavior, including when someone clicked or followed steps, because fast escalation is what allows response teams to contain damage. Punitive programs suppress reporting; supportive programs increase it.

Reduce admin overhead for lean hotel security teams

Hotel security and IT teams are often stretched across multiple properties. Hoxhunt is designed to reduce manual campaign management - setup, follow-ups and ongoing maintenance - by running continuous training, so you can focus on trends, high-risk areas, and specific cohorts (front desk, reservations, finance) instead of endless scheduling.

Prove improvement with metrics leaders understand

Completion rates and click rates alone can be misleading. Hoxhunt emphasizes reporting- and speed-based measurement, so awareness managers can show progress in the outcomes that matter operationally:

  • Reporting rate (are staff escalating suspicious booking/OTA messages?)
  • Time-to-report (how quickly does the first report happen?)
  • Miss rate (how often are suspicious messages ignored?)

Below you can see how Hoxhunt maximizes user engagement with personalized simulations at scale.

Key takeaways for hotel security and awareness teams

  • Hotel and hospitality staff are actively targeted with booking-themed phishing, including messages that impersonate guests and platforms like Booking.com.
  • Many of these attacks use ClickFix-style lures, such as fake CAPTCHA or “verification” steps, to trick users into running malicious commands themselves.
  • These campaigns work because they exploit real hotel workflows - high-volume, time-sensitive bookings and reliance on third-party platforms, not because staff are careless.
  • Initial access can quickly escalate to stolen credentials, malware deployment, guest data exposure, operational disruption, and ransomware.
  • Risk is reduced most effectively by focusing on people and process: training staff on booking/OTA impersonation patterns, reinforcing fast reporting, and supporting those behaviors with access and scripting controls.
Want to learn more?
Be sure to check out these articles recommended by the author:
Get more cybersecurity insights like this