Connect with us

Hi, what are you looking for?

HEADLINES

Watch out for worms in your cookies, HP warns holidaymakers

The report details an investigation into suspicious domains – related to an earlier CAPTCHA-themed campaign – which uncovered fake travel booking websites. The spoofed sites feature branding imitating booking.com, but with the content blurred, and a deceptive cookie banner designed to trick users into clicking “Accept” – triggering a download of a malicious JavaScript file.

HP Inc. issued its latest Threat Insights Report, showing attackers continuing to take advantage of users’ “click fatigue” – particularly during fast paced, time-sensitive browsing moments, like booking travel deals.

With analysis of real-world cyberattacks, the report helps organizations to keep up with the latest techniques cybercriminals are using to evade detection and breach PCs in the fast-changing cybercrime landscape.

The report details an investigation into suspicious domains – related to an earlier CAPTCHA-themed campaign – which uncovered fake travel booking websites. The spoofed sites feature branding imitating booking.com, but with the content blurred, and a deceptive cookie banner designed to trick users into clicking “Accept” – triggering a download of a malicious JavaScript file.

Opening the file installs XWorm, a remote access trojan (RAT) that gives attackers full control of the device, including access to files, webcams, microphones, and the ability to deploy further malware or disable security tools.

The campaign was first detected in Q1 2025, coinciding with the peak summer holiday booking period – a time when users are particularly vulnerable to travel-themed lures. Yet it remains active, with new domains continuing to be registered and used to deliver the same booking-related lure.

Advertisement. Scroll to continue reading.

Patrick Schläpfer, Principal Threat Researcher in the HP Security Lab, comments:

“Since the introduction of privacy regulations such as GDPR, cookie prompts have become so normalized that most users have fallen into a habit of ‘click-first, think later.’ By mimicking the look and feel of a booking site at a time when holiday-goers are rushing to make travel plans, attackers don’t need advanced techniques – just a well-timed prompt and the user’s instinct to click.”

Based on data from millions of endpoints running HP Wolf Security1, HP threat researchers also discovered:

Impostor Files Hiding In Plain Sight: Attackers used Windows Library files to sneak malware inside familiar-looking local folders – such as “Documents” or “Downloads.” Victims were shown a Windows Explorer pop-up, displaying a remote WebDAV folder with a PDF-lookalike shortcut that launched malware when clicked.

PowerPoint Trap Mimics Folder Opening: A malicious PowerPoint file, opened in full-screen mode, mimicking the launch of a standard folder. When users click to escape, they trigger an archive download containing a VBScript and executable – pulling a GitHub-hosted payload to infect the device.

Advertisement. Scroll to continue reading.

MSI Installers on the Rise: MSI installers are now among the top file types used to deliver malware, largely driven by ChromeLoader campaigns. Often distributed through spoofed software sites and malvertising, these installers use valid, recently issued code-signing certificates to appear trusted and bypass Windows security warnings.

By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely inside secure containers – HP Wolf Security1 has specific insight into the latest techniques used by cybercriminals. To date, HP Wolf Security1 customers have clicked on over 50 billion email attachments, web pages, and downloaded files with no reported breaches.

Dr. Ian Pratt, Global Head of Security for Personal Systems at HP Inc., comments: “Users are growing desensitized to pop-ups and permission requests, making it easier for attackers to slip through. Often, it’s not sophisticated techniques, but moments of routine that catch users out. The more exposed those interactions are, the greater the risk. Isolating high-risk moments, like clicking on untrusted content, helps businesses reduce their attack surface without needing to predict every attack.”

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

These new capabilities help retailers move faster, serve shoppers with greater relevance, and operate with resilience and efficiency, delivering a modern foundation for growth...

HEADLINES

Spanning three years, the partnership is not just a procurement arrangement, but a comprehensive framework for joint innovation to support increasing demand for data...

COMPUTERS

These devices, which leverage the power of AI, are engineered to help creatives, businesses, and technical professionals work faster and smarter.

HEADLINES

The announcements are aligned with Microsoft’s mission to support education in the AI era.

HEADLINES

ASEAN+ mirrors this momentum, with 96% of organizations also planning to increase AI investments, reinforcing AI’s role as a core driver of enterprise growth...

HEADLINES

Five organizations will be selected to receive US$100,000 in funding, US$100,000 in HP technology and solutions, and six months of virtual training by HP...

COMPUTERS

HP Inc. unveiled the HP EliteBoard G1a Next Gen AI PC, a CES 2026 Innovation Award Honoree and the world’s first full AI PC built...

SOFTWARE

Driven by evolving regulatory requirements, and the need for auditable governance, enterprises and governments are seeking self-managed environments where they maintain complete operational authority,...

Advertisement