Russian hackers target European hospitality industry with fake BSoD malware

Suspected Russian cybercriminals are targeting European hotels and hospitality companies with a malware campaign that uses a fake “Blue Screen of Death” to trick victims into infecting their own systems, according to new research from Securonix.

The campaign, dubbed ‘PHALT#BLYX,’ begins with phishing emails posing as reservation cancellations from popular hotel booking platforms. The messages, typically titled “Reservation Cancellation,” include room charges in euros (often exceeding €1,000) to create urgency and pressure recipients into clicking.

Victims who select the “See Details” button are redirected to a fake booking page that displays a browser error claiming the page is loading too slowly. Clicking a “Refresh page” button then triggers a convincing imitation of the Windows Blue Screen of Death.

To resolve the fake error, users are instructed to follow a series of steps that ultimately lead them to paste a malicious script into the Windows Run dialog. Then a remote access trojan called ‘DCRat’ is installed that allows attackers to log keystrokes, steal passwords and clipboard data, disable Windows Defender, and maintain long-term access to infected devices.

As a decoy, a legitimate booking page opens while the malware operates in the background, downloading additional tools and evading detection.

Securonix said the campaign shows signs of a Russian connection, including Russian-language debug strings in malicious files, infrastructure traced to Russia, and the use of DCRat, which is commonly sold on Russian underground forums. 


Back to the list

Latest Posts

Cyber Security Week in Review: January 16, 2026

In brief: Microsoft fixes a Windows zero-day flaw, Russian hackers target Ukraine posing as charities, and more.
16 January 2026

RedVDS cybercrime platform disrupted in global takedown

RedVDS sold access to disposable virtual Windows servers for as little as $24 a month, allowing criminals to run fraud and phishing operations at scale.
15 January 2026

Administrator of AVCheck malware testing service arrested in the Netherlands

The man is suspected of facilitating cybercrime by allowing malware devs to test whether their software could bypass antivirus protections.
15 January 2026