{"id":1248,"date":"2026-02-11T00:28:17","date_gmt":"2026-02-11T06:28:17","guid":{"rendered":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/?p=1248"},"modified":"2026-02-11T00:28:17","modified_gmt":"2026-02-11T06:28:17","slug":"clickfix-phishing-hospitality-threat-alert","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/blog\/clickfix-phishing-hospitality-threat-alert\/","title":{"rendered":"ClickFix- Phishing Alert: The New Fake Update Threat Targeting Las Vegas Hospitality"},"content":{"rendered":"<p>&nbsp;<\/p>\n<article><!-- Urgent Alert Header --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"40\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td>\n<h1 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 900;margin: 0 0 20px 0;line-height: 1.3\">\ud83d\udea8 URGENT: &#8220;ClickFix&#8221; Phishing Campaign Targeting Las Vegas Hospitality<\/h1>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.3em;margin: 0;font-weight: 600;padding: 15px;border-radius: 5px\">Copy-Paste PowerShell Scam Bypasses Email Filters &#8211; Hotels, Casinos, and Transportation at Risk<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Threat Level Indicator --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td align=\"center\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"background-color: #ef3f37;padding: 15px 30px;border-radius: 50px\">\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;font-weight: 900;color: white\">\u26a0\ufe0f ACTIVE CAMPAIGN &#8211; HOSPITALITY SECTOR TARGETED<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Executive Summary --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">1. Executive Summary: The &#8220;Copy-Paste&#8221; Trap<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">A sophisticated new social engineering campaign, dubbed <strong style=\"color: #ef3f37\">&#8220;ClickFix,&#8221;<\/strong> is actively targeting the <strong>hospitality and transportation sectors<\/strong>. Unlike traditional phishing that relies on a malicious link, this attack weaponizes &#8220;tech support anxiety.&#8221;<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Scam Explanation Box --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 20px 0\">How The Scam Works:<\/h3>\n<p style=\"margin: 0 0 15px 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\"><strong style=\"color: #ef3f37\">The Trap:<\/strong> Employees see a fake pop-up (mimicking Google Chrome, Microsoft Word, or Booking.com) claiming a &#8220;Critical Error&#8221; or &#8220;Update Required.&#8221; Instead of a download button, it instructs them to copy a PowerShell script and paste it into their terminal to &#8220;fix&#8221; the issue.<\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44;padding: 20px;background-color: white;border-left: 5px solid #ef3f37\"><strong style=\"color: #ef3f37\">The Impact on Las Vegas:<\/strong> With our city&#8217;s heavy reliance on <strong>Booking.com, Expedia, and rapid front-desk operations<\/strong>, this specific campaign puts guest data and corporate networks at immediate risk of ransomware and credential theft. Hotels on The Strip, downtown properties, and casino resorts are prime targets.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Technical Details --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">2. The Technical Details: Bypassing Email Filters<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">This attack is clever because it <strong style=\"color: #ef3f37\">bypasses email filters<\/strong>\u2014the malicious code is never &#8220;sent&#8221; to you; you paste it yourself.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Technical Attack Chain --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Attack Mechanism Analysis:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px;margin-bottom: 15px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83c\udf10 Attack Vector<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Compromised websites inject an iframe displaying a fake error (e.g., &#8220;Word Online: Document Preview Error&#8221; or &#8220;Booking.com: Session Timeout &#8211; Action Required&#8221;). These appear on legitimate-looking pages employees visit daily.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef9b37;padding: 20px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\u2328\ufe0f The Mechanism<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">The user is told to press <strong style=\"color: #ef9b37\">&#8220;Ctrl+C&#8221;<\/strong> (to copy the &#8220;fix&#8221;) and <strong style=\"color: #ef9b37\">&#8220;Ctrl+V&#8221;<\/strong> into a Windows PowerShell window. Instructions appear professional with Microsoft-style formatting and official-looking error codes.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #2fb17e;padding: 20px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udc80 The Payload<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">The clipboard content is actually a malicious PowerShell script (using <code style=\"background-color: #001b28;padding: 3px 8px;border-radius: 3px;color: #ef3f37;font-weight: 600\">mshta.exe<\/code> or similar legitimate Windows binaries) that downloads the <strong style=\"color: #ef3f37\">Lumma Stealer<\/strong> or <strong style=\"color: #ef3f37\">Vidar<\/strong> malware. These are credential-harvesting tools that steal browser passwords, session tokens, and cryptocurrency wallets.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83c\udfaf Targeted Sectors<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Specifically targeting <strong style=\"color: #ef9b37\">Transport, Logistics, and Hospitality (Hotels\/Casinos)<\/strong>. Las Vegas hospitality sector is uniquely vulnerable due to high volume of Booking.com, Expedia, and reservation system usage combined with frequent employee turnover.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- The Risk Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">3. The Risk: Why Firewalls Can&#8217;t Stop This<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">For a <strong>Las Vegas hotel manager or logistics coordinator<\/strong>, this looks like a standard IT glitch. The attack exploits trust in familiar platforms and the pressure of fast-paced hospitality operations.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Risk Blocks --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83d\udee1\ufe0f Bypassing EDR (Endpoint Detection &amp; Response)<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">Because the user <strong>manually executes the script<\/strong>, many Endpoint Detection &amp; Response (EDR) tools view it as an &#8220;administrative action&#8221; rather than a virus. The malware uses legitimate Windows utilities (Living off the Land &#8211; LotL attack), making detection extremely difficult. Traditional antivirus sees PowerShell.exe and assumes it&#8217;s a technician performing maintenance.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83d\udd10 Session Token Theft<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">The malware targets <strong>browser cookies and session tokens<\/strong>. This means hackers can log into your Booking.com, Expedia, or Bank of America portal <em>without<\/em> needing your password or 2FA code. They hijack active sessions, appearing as legitimate logged-in users. Multi-Factor Authentication provides zero protection against session token theft.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83d\udcb3 Guest Fraud &amp; Reputation Damage<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">Once inside a hotel&#8217;s <strong>Booking.com account<\/strong>, attackers can message future guests demanding payment to alternative accounts, cancel reservations causing revenue loss, or steal guest credit card information for fraud. <strong>This is a reputation nightmare for Las Vegas properties.<\/strong> A single incident can destroy years of 5-star reviews and guest trust, particularly damaging for boutique hotels and independent properties.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Las Vegas Specific Impact --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Las Vegas Hospitality Sector Vulnerability:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"12\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"5%\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>High-volume operations:<\/strong> The Strip hotels process thousands of check-ins daily, creating pressure to &#8220;fix&#8221; issues quickly without verification<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Employee turnover:<\/strong> Frequent staff changes in hospitality mean new employees may not recognize legitimate vs. fake IT procedures<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Multiple booking platforms:<\/strong> Properties use Booking.com, Expedia, Hotels.com, Airbnb &#8211; attackers customize fake errors for each<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>PCI compliance requirements:<\/strong> Hotels process credit cards &#8211; credential theft can trigger compliance violations and massive fines<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Gaming Control Board scrutiny:<\/strong> Casino-hotels face additional regulatory oversight &#8211; security breaches can jeopardize gaming licenses<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Mitigation Plan --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">4. The 3-Step Mitigation Plan<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">Since this exploits human behavior, technology alone isn&#8217;t the fix. You need a <strong style=\"color: #ef3f37\">&#8220;Human Firewall.&#8221;<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 1 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #2fb17e;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">1<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Disable PowerShell for Front-Desk Users<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #2fb17e\">Technical Control:<\/strong> Most front-desk staff, reservation agents, and concierge personnel never need to use PowerShell or Windows Command Prompt in legitimate operations.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #2fb17e\">Action:<\/strong> Use Group Policy (GPO) to disable the Windows Command Prompt and PowerShell for non-admin users, or restrict &#8220;Console Window&#8221; access entirely. Only IT administrators should have PowerShell privileges. This single step blocks the entire ClickFix attack chain.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 2 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #ef9b37;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">2<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">The &#8220;Tech Support&#8221; Verification Rule<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef9b37\">Policy:<\/strong> Train staff that <em>no legitimate error message<\/em> will ever ask you to &#8220;Copy and Paste&#8221; code or commands. Not from Microsoft, not from Google, not from Booking.com, not from any legitimate vendor.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef9b37\">Action:<\/strong> If a pop-up asks for a manual &#8220;fix&#8221; involving copying code, instruct staff to: (1) Close the browser immediately, (2) Do not restart the computer, (3) Call the CMIT Help Desk at 702-725-2877 before taking any action. Post this procedure prominently at every front desk workstation.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 3 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #ef3f37;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">3<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Monitor for &#8220;mshta.exe&#8221; Execution<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef3f37\">Detection:<\/strong> The &#8220;ClickFix&#8221; script often uses the Microsoft HTML Application Host (<code style=\"background-color: #001b28;padding: 3px 8px;border-radius: 3px;color: #ef9b37\">mshta.exe<\/code>) to reach the internet and download malware payloads.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef3f37\">Action:<\/strong> Configure your EDR (SentinelOne, CrowdStrike, Microsoft Defender) to flag or automatically block <code style=\"background-color: #001b28;padding: 3px 8px;border-radius: 3px;color: #ef9b37\">mshta.exe<\/code> if it attempts to make an outbound network connection. In most hotel environments, mshta.exe should never need internet access. This catches the attack during payload download.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- CMIT Protection Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">5. How CMIT Solutions Protects Las Vegas Hospitality<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">We actively hunt for these specific <strong style=\"color: #ef3f37\">&#8220;Living off the Land&#8221; (LotL)<\/strong> attacks where hackers use your own tools against you. Our hotel and casino clients receive specialized protection designed for high-volume guest operations.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Protection Services --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Hospitality-Focused Security Services:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"5%\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">PowerShell Script Blocking:<\/strong> Our security stack blocks unauthorized PowerShell scripts from running on front-desk terminals, reservation systems, and guest-facing computers. Application whitelisting ensures only approved hospitality software executes.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">DNS Filtering:<\/strong> We block the known Command &amp; Control (C2) domains that ClickFix scripts try to contact. Advanced threat intelligence prevents communication with malware distribution servers.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Front-Desk Security Training:<\/strong> Customized training for hotel staff covering ClickFix, fake Booking.com errors, and reservation system scams. Monthly simulations test employee readiness with realistic hospitality scenarios.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Session Monitoring:<\/strong> 24\/7 SOC watches for impossible travel (Booking.com login from Las Vegas suddenly appearing from Russia), credential stuffing, and session token anomalies across all hotel systems.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">PMS &amp; POS Protection:<\/strong> Segmented networks isolate Property Management Systems (Opera, OnQ, Maestro) and Point of Sale systems from general office computers, containing infections if they occur.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">PCI Compliance Maintenance:<\/strong> Security controls designed to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance while blocking modern attack vectors like ClickFix.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Incident Response Plan:<\/strong> Pre-established breach response procedures specific to hospitality operations &#8211; minimizing guest notification delays and protecting reputation during security events.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Front Desk Vulnerability CTA --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border: 3px solid #ef3f37\" align=\"center\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 15px 0\">\u26a0\ufe0f Is Your Front Desk Vulnerable to &#8220;Fake Update&#8221; Scams?<\/h3>\n<p style=\"margin: 0 0 20px 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;line-height: 1.7;color: #002f44\">Don&#8217;t let ClickFix compromise guest data and destroy your reputation. We can assess your front-desk security in 24 hours.<\/p>\n<p style=\"margin: 0\"><a style=\"background-color: #ef3f37;color: white;padding: 18px 40px;text-decoration: none;border-radius: 50px;font-family: 'Avenir', Arial, sans-serif;font-weight: bold;font-size: 1.2em\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Schedule Security Awareness Training<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Main CTA Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"45\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td align=\"center\">\n<h2 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 900;margin: 0 0 20px 0\">Protect Your Hotel from ClickFix Attacks<\/h2>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin: 0 0 15px 0;line-height: 1.6\">Get specialized hospitality cybersecurity that protects guest data, Booking.com credentials, and your reputation.<\/p>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin: 0 0 25px 0;font-weight: 600\">CMIT Solutions: Trusted by Las Vegas Hotels, Casinos, and Hospitality Groups<\/p>\n<table style=\"margin: 25px auto\" border=\"0\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-radius: 50px;padding: 5px 20px\" bgcolor=\"#002f44\">\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: bold;color: white\">\ud83d\udcde <a style=\"color: white;text-decoration: none\" href=\"tel:702-725-2877\">702-725-2877<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin: 25px 0\"><a style=\"background-color: #002f44;color: white;padding: 18px 40px;text-decoration: none;border-radius: 50px;font-family: 'Avenir', Arial, sans-serif;font-weight: bold;font-size: 1.2em\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Request Hospitality Security Assessment<\/a><\/p>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1em;margin: 25px 0 0 0\"><a style=\"color: white;text-decoration: underline\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\">cmitsolutions.com\/lasvegas-nv-1206<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Key Takeaways --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin-top: 0\">Key Takeaways for Hospitality Operations:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"8\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"3%\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>ClickFix targets hospitality sector<\/strong> &#8211; Copy-paste PowerShell scam specifically designed for hotels, casinos, and transportation<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Bypasses email filters<\/strong> &#8211; Malicious code never sent via email, users paste it themselves after fake error messages<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Session token theft<\/strong> &#8211; Steals Booking.com, Expedia credentials allowing hackers to impersonate staff and commit fraud<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Guest fraud risk<\/strong> &#8211; Attackers message future guests demanding payment, causing reputation damage and revenue loss<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Disable PowerShell for front-desk staff<\/strong> &#8211; Most hospitality employees never need command line access<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Never copy-paste &#8220;fixes&#8221;<\/strong> &#8211; No legitimate error message asks users to paste code into PowerShell<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Monitor mshta.exe activity<\/strong> &#8211; Block Microsoft HTML Application Host from making outbound connections<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>CMIT Solutions provides hospitality-focused training<\/strong> and front-desk security for Las Vegas hotels and casinos<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Source Attribution --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"20\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.3em;font-weight: 900;margin: 0 0 10px 0\">6. Source &amp; Technical Analysis<\/h3>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 0.95em;color: #9ba8b1;margin: 0;font-style: italic\">Read the technical breakdown of the ClickFix campaign targeting hospitality here: <a style=\"color: #002f44;text-decoration: underline\" href=\"https:\/\/thehackernews.com\/2025\/11\/large-scale-clickfix-phishing-attacks.html\" target=\"_blank\" rel=\"noopener noreferrer\">The Hacker News: Large-Scale ClickFix Phishing Attacks Target Transport and Hospitality Sectors<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/article>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The &#8216;ClickFix&#8217; campaign uses a psychological trick: it presents a fake &#8216;Browser Error&#8217; and asks the user to copy-paste a &#8216;Fix&#8217; script. This bypasses standard antivirus by making the user the hacker.&#8221;<\/p>\n","protected":false},"author":1008,"featured_media":1249,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/users\/1008"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/comments?post=1248"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1248\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media\/1249"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media?parent=1248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/categories?post=1248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/tags?post=1248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}