Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Threat Actor Infests Hotels With New RAT

RevengeHotels has been targeting hotels in Brazil and Spanish-speaking regions with VenomRAT implants in 2025.

Hackers target hotels

A threat actor known as RevengeHotels has expanded its arsenal with a new remote access trojan (RAT) in recent attacks targeting the hospitality sector, Kaspersky reports.

Active since 2015 and also known as TA558, the hacking group has been focusing on stealing the credit card information of hotel guests and travelers.

RevengeHotels attacks typically start with phishing emails redirecting to websites that drop malicious scripts designed to infect the victims’ systems with various RAT families, allowing the attackers to steal sensitive information and maintain persistent access.

In previous attacks, the group was seen targeting hotels in multiple countries across Latin America with malware families such as 888 RAT, NanoCoreRAT, NjRAT, RevengeRAT, and the custom malware ProCC.

More recently, the threat actor added XWorm to its arsenal, and was also seen using DesckVBRAT in some operations.

In a campaign that Kaspersky observed in mid-2025, RevengeHotels switched to more sophisticated implants and tools, such as VenomRAT, and started using AI to build its JavaScript loaders and PowerShell downloaders.

Advertisement. Scroll to continue reading.

The attacks started with phishing emails with invoicing lures targeting hotel reservations, urging the recipient to take care of overdue payments. More recently, the attackers started using fake job applications, sending résumés to the targeted hotels.

The victims were redirected to websites hosting malicious scripts containing code generated by AI. These scripts were designed to load additional scripts that would trigger malware infection.

“A significant portion of the initial infector and downloader code in this campaign appears to be generated by large language model (LLM) agents. This suggests that the threat actor is now leveraging AI to evolve its capabilities, a trend also reported among other cybercriminal groups,” Kaspersky notes.

The infection chain leads to the deployment of VenomRAT, which allows attackers to control infected machines through a hidden virtual desktop session. The malware can harvest and exfiltrate files, sets up a reverse proxy, and can bypass User Account Control protections.

The malware can also spread via USB drives, by searching for removable drives and copying itself to them under the name My Pictures.exe.

According to Kaspersky, this fresh RevengeHotels campaign focused on hotels and front desks in Brazil. However, while most of the identified phishing emails were in Portuguese, some of them were in Spanish, suggesting that the hacking group might be expanding the operation to other regions.

Previously, the group was seen targeting establishments in Spanish-speaking countries such as Argentina, Bolivia, Chile, Costa Rica, Mexico, and Spain, as well as hotels in Russia, Belarus, and Turkey.

“RevengeHotels has significantly enhanced its capabilities, developing new tactics to target the hospitality and tourism sectors. With the assistance of LLM agents, the group has been able to generate and modify their phishing lures, expanding their attacks to new regions,” Kaspersky notes.

Related: Microsoft Warns of Hospitality Sector Attacks Involving ClickFix

Related: Details Emerge on Chinese Hacking Operation Impersonating US Lawmaker

Related: North Korean Hackers Target macOS Users

Related: Why Sincerity Is a Strategic Asset in Cybersecurity

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Remedio has appointed of Cynthia Stanton as Chief Marketing Officer.

Jacki Monson has joined CVS Health as SVP, Deputy CISO.

Gigi Schumm has been promoted to Chief Revenue Officer at Securonix.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.