BreachesHIGH

Booking.com Data Breach - Reservation PINs Reset After Hack

Featured image for Booking.com Data Breach - Reservation PINs Reset After Hack
#Booking.com#data breach#reservation PIN#Customer Data#Data Breach#Hotel#Notification#Security Breach#Phishing

Original Reporting

BCBleepingComputer·Bill Toulas

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

⚔️
⚔️ BREACH SUMMARY
Victim OrganizationBooking.com
Industry SectorTravel & Hospitality
Attack TypeUnauthorized Access
Data ExposedPersonal Information
Records Affected
Threat Actor
Entry Point
Dwell Time
Discovery MethodInternal Monitoring
Ransom Demanded
Regulatory Impact
🎯

Booking.com had a security problem where hackers got into some users' accounts and could see their reservation details. To keep everyone safe, they changed the PINs for those reservations and are warning users to be careful of fake emails that might try to trick them.

Quick Summary

Booking.com has confirmed a data breach affecting user reservation details, prompting the company to reset PINs for affected accounts. The breach may have exposed personal information, raising concerns about potential phishing attacks.

What Happened

Booking.com has confirmed that hackers accessed certain users' reservation data, prompting the company to take immediate action by resetting PINs for existing and past reservations. The breach was disclosed in emails sent to impacted users, warning them of unauthorized access to their booking information. The company stated that it detected suspicious activity affecting a number of guests' reservations and acted to contain the issue.

Who's Affected

While the exact number of affected users remains undisclosed, customers have reported receiving notifications about the breach. The emails have been corroborated by multiple users on platforms like Reddit, indicating a widespread issue. Booking.com has not specified whether the breach is linked to a compromise of its systems or those of its partners.

What Data Was Exposed

The compromised data includes:

  • Full names
  • Email addresses
  • Postal addresses
  • Phone numbers
  • Reservation dates
  • Messages exchanged with hotels through the platform Although Booking.com has assured that financial data was not accessed, the nature of the exposed information makes users vulnerable to phishing attacks. This is especially concerning as attackers can use real booking data to craft convincing phishing emails.

What You Should Do

Booking.com has advised users to remain vigilant against phishing attempts, especially those that may appear legitimate due to the nature of the exposed data. Users are encouraged to:

  • Be cautious of unsolicited emails or messages, particularly those requesting sensitive information.
  • Avoid clicking on links in suspicious messages.
  • Monitor their accounts for unusual activity.

The company has emphasized that it will continue to inform affected users individually and that customer support services are available 24/7. This incident follows a previous breach in 2021, where over 4,000 customers' data was compromised due to vulnerabilities in hotel staff logins, highlighting ongoing security challenges within the travel sector.

🔍 How to Check If You're Affected

  1. 1.Monitor for suspicious emails or messages
  2. 2.Check for unauthorized account activity
  3. 3.Report any phishing attempts to Booking.com

🏢 Impacted Sectors

TravelHospitality

Pro Insight

This breach underscores the ongoing challenges in securing customer data within the travel industry, where third-party vulnerabilities can lead to significant risks for users. The potential for follow-on phishing attacks is a critical concern that requires immediate attention from affected customers.

🗓️ Story Timeline

Story broke by BleepingComputer
Covered by TechCrunch Security
Covered by The Register Security

Sources

Original Report

BCBleepingComputer· Bill Toulas
Read Original

Also covered by

TETechCrunch Security

Booking.com confirms hackers accessed customers’ data

Read
THThe Register Security

Booking.com warns reservation data may have checked out with intruders

Read

Related Pings

HIGHBreaches

Anodot Breach - Over a Dozen Companies Face Extortion Amid Rockstar Games Threat

The Anodot breach has left multiple companies, including Rockstar Games, vulnerable to extortion by the ShinyHunters hacking group, which claims to have accessed sensitive data through stolen authentication tokens.

TechCrunch Security·
HIGHBreaches

Data Breaches and Ransomware Attacks - April 2026 Report

April 2026's threat intelligence report highlights major data breaches, including the LAPD's exposure of sensitive files and a ransomware attack on ChipSoft affecting hospitals. These incidents underscore the urgent need for improved cybersecurity measures across sectors.

Check Point Research·
HIGHBreaches

Basic-Fit Data Breach Exposes Millions of Users' Data Across Multiple Countries

Basic-Fit has confirmed a significant data breach affecting 1 million members across Europe, exposing sensitive personal information. Investigations are ongoing.

Cyber Security News·
HIGHBreaches

Rockstar Games - Data Breach Threat from ShinyHunters Group

Rockstar Games is facing a data breach threat from the ShinyHunters group, which claims to have accessed sensitive company data through a third-party platform. The group demands payment to prevent a leak, highlighting the risks associated with third-party integrations.

The Register Security·
HIGHBreaches

Bitpanda Phishing Scheme - Multifaceted Attack Deceives Users

A new phishing attack is targeting Bitpanda customers, tricking them into revealing sensitive information. Users are at risk of credential theft and identity fraud. Stay vigilant and protect your accounts.

Infosecurity Magazine·
HIGHBreaches

Google Workspace Breach - Misconfigured Permissions Exposed

Google Workspace breaches can go unnoticed for weeks, exposing sensitive data. Misconfigured permissions are the main culprit. Stay informed to protect your organization.

Huntress Blog·