Booking.com Breach - Scammers Target Guests with Data

What Happened Booking.com has confirmed a data breach affecting guest reservation information. The breach was reported on April 13, 2026, revealing that unauthorized third parties accessed sensitive data including booking details, names, email addresses, physical addresses, and phone numbers. This information can be exploited by scammers to impersonate hotels and deceive customers. Who's Affected While Booking.com has not disclosed

BreachesHIGHUpdated: Published:
Featured image for Booking.com Breach - Scammers Target Guests with Data

Original Reporting

MWMalwarebytes Labs

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯Basically, hackers stole guest information from Booking.com to trick people into giving money.

What Happened

Booking.com has confirmed a data breach affecting guest reservation information. The breach was reported on April 13, 2026, revealing that unauthorized third parties accessed sensitive data including booking details, names, email addresses, physical addresses, and phone numbers. This information can be exploited by scammers to impersonate hotels and deceive customers.

Who's Affected

While Booking.com has not disclosed the exact number of affected customers, the platform boasts over 100 million active mobile app users and 500 million monthly website visits. This vast user base makes the breach particularly concerning, as many guests could be at risk.

What Data Was Exposed

The stolen data includes: This information provides scammers with everything they need to convincingly impersonate hotel staff and contact guests.

πŸ“

Booking details

πŸ‘€

Names

πŸ’°

Email addresses

πŸ₯

Physical addresses

πŸ“§

Phone numbers

How the Breach Occurred

The breach appears to have originated from compromised hotel partners. A report by Microsoft attributes the attack to a criminal group known as Storm-1865, which employed the ClickFix phishing technique to install malware on hotel employees' computers. This malware, including XWorm and VenomRAT, was distributed via fake CAPTCHA pages, allowing attackers to access sensitive data.

What You Should Do

To protect yourself, follow these guidelines:

Containment

  • 1.Be skeptical of messages asking you to verify payment details, even if they appear to come from Booking.com.
  • 2.Check your booking confirmation for accuracy regarding payment requirements. If you are asked to pay in advance without a pre-payment policy, it's likely a scam.

Remediation

  • 3.Contact the hotel directly using official contact methods if anything seems suspicious, rather than clicking links in messages.
  • 4.Monitor your bank statements for any unauthorized transactions, as scammers may not strike immediately after the breach.

Conclusion

This incident highlights a recurring problem in the travel industry, where breaches often stem from compromised third-party vendors rather than direct attacks on the companies themselves. Booking.com previously faced similar issues, and the trend suggests that the travel sector remains a soft target for cybercriminals. As the situation develops, staying vigilant and informed is crucial for protecting your personal information.

πŸ”’ Pro Insight

πŸ”’ Pro insight: Analysis pending for this article.

MWMalwarebytes Labs
Read Original

Related Pings