OpenDocument malware scams target hotels across the world

Security experts have recently discovered hackers on a particularly stealthy mission to compromise hotels in Latin America using OpenDocument text files.
The unknown hackers are using a rarely seen phishing method that seems to be working out well so far, with the detection rate on VirusTotal for the malicious files being used was zero less than two weeks ago.
The campaign itself has also raised a number of questions due to some unique features and traits that set it apart from others.
Macro trouble
Cybersecurity researchers from HP Wolf Security said that in late June 2022, they spotted a phishing campaign that distributed OpenDocument text files. OpenDocument is an open, vendor-neutral file format, recognized by the majority of productivity programs, such as Word, LibreOffice Writer, or Apache OpenOffice Writer as one of the most popular Microsoft Office alternatives.
These files were being distributed, via email, to hotels in Latin America, and were presented as guest registration documents.
Should the victim download and run the file, they’d be prompted to “update fields with references to other files”. The researchers describe the prompt as a “cryptic message”, and say that if the victim confirms, an Exel file opens.
The Excel file will later ask the user to enable macros, and that’s where the real trouble starts, as allowing macros triggers the infection chain. As a result, the victim gets AsyncRAT installed – a remote access trojan malware (opens in new tab). AsyncRAT is described as a RAT that allows threat actors remote monitoring and control over infected endpoints (opens in new tab), through a secure, encrypted connection.
This campaign is particularly stealthy, as analysis of the OpenDocument shows no hidden macros, the researchers are saying. But the document does reference Object Linking and Embedding (OLE) objects, hosted remotely.
The document was found referencing almost two dozen other documents which, when downloaded and opened, contain embedded Excel spreadsheets, each of which requests running macros.
The researchers seem to be a bit baffled by this approach, as the purpose of “so many duplicate files” remains unclear.
“Documents that arrive from outside an organization should always be treated with suspicion, especially if they try to load external content from the web – but in practice, this isn’t always straightforward advice to follow, especially in industries that rely on exchanging electronic documents between suppliers and clients,” concluded HP Wolf Security.
Audio player loading… Security experts have recently discovered hackers on a particularly stealthy mission to compromise hotels in Latin America using OpenDocument text files. The unknown hackers are using a rarely seen phishing method that seems to be working out well so far, with the detection rate on VirusTotal for…
Recent Posts
- NYT Wordle today — answer and my hints for game #1479, Monday, July 7
- Playdate Season 2 review: Taria & Como and Black Hole Havoc
- 3 features that would actually make me pay for a Samsung Health subscription for my Galaxy Watch – and one big problem it needs to avoid
- 250-million pixel virtual projector sets world record on 280-meter tall building used as a screen
- TikTok’s ‘ban’ problem could end soon with a new app and a sale
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022