Cyberattack Campaign PHALT#BLYX Targets European Hospitality Sector with Phishing Lures

A new cyberattack campaign, called PHALT#BLYX, has been unveiled, with a specific focus on the European hospitality industry. Back in late December 2025, experts noticed a coordinated and advanced campaign employing living-off-the-land (LotL) methods. This tactic uses the trojanization of trusted system binaries to establish persistent access onto hacked networks. The primary goal of the…

Tina Reynolds Avatar

By

Cyberattack Campaign PHALT#BLYX Targets European Hospitality Sector with Phishing Lures

A new cyberattack campaign, called PHALT#BLYX, has been unveiled, with a specific focus on the European hospitality industry. Back in late December 2025, experts noticed a coordinated and advanced campaign employing living-off-the-land (LotL) methods. This tactic uses the trojanization of trusted system binaries to establish persistent access onto hacked networks. The primary goal of the campaign is to deploy a remote access trojan known as DCRat. Russian threat actors consistently exploit this malicious software.

The compromise starts with phishing emails pretending to be from Booking.com, enticing victims with phony hotel reservation cancellation alerts. These emails include a link to a scam website created to emulate the look and feel of real government service providers. Once victims fall for the bait-and-switch and click the malicious link, they’re sent to a fraudulent blue screen of death (BSoD) page. There, they’re pressured to do things that put their own systems at risk.

Exploitative Techniques and Goals

The PHALT#BLYX campaign uses a few familiar tactics to keep the resistance going inside infected hosts. Most infamously, it misuses some trusted system binaries like “MSBuild.exe” to spread its goals.

Cybersecurity specialists Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee at Sophos wrote recently that threat actors were using a Bookings.com reservation cancellation as bait. They deceive targets into running harmful PowerShell commands, which in turn covertly download and execute remote code. This approach underscores the campaign’s reliance on trickery and other abuses of voter processes that Americans have come to trust.

To help boost them, the campaign is intensifying its effort. Secondly, it seeks to develop and maintain a deeper presence inside the organizations they are trying to influence. According to Securonix, “The phishing emails notably feature room charge details in Euros, suggesting the campaign is actively targeting European organizations.” This specificity further highlights the calculated nature of the attack, as well as its objectives to take advantage of weaknesses within the hospitality sector.

Language and Localization

Adding another layer of sophistication, the campaign uses Russian language in its ‘v.proj’ MSBuild file. This rhetorical framing deepens the association with Russian malign influencers. Beyond that, it shows how uniquely crafted the campaign was, enabling it to pack the most punch within its target demographic.

“The use of the Russian language within the ‘v.proj’ MSBuild file links this activity to Russian threat factors using DCRat,” noted Securonix. This aspect of the campaign demonstrates the great flexibility in approach of cybercriminals. They adapt their strategies to linguistic and cultural environments, maximizing their effectiveness.

Implications for Security

The launch of PHALT#BLYX is very dangerous for our member organizations operating in the European hospitality industry. The landscape of cyber threats is changing at a dizzying pace. To stay one step ahead of advanced phishing campaigns, businesses need to implement strong security technologies like never before.