Booking.com Breach Exposes Guest Reservation Data
Booking.com confirms hackers accessed customer reservation data including names, emails, phone numbers, and booking details. Company resets PINs but won't disclose breach scope.
Booking.com has confirmed that hackers gained unauthorized access to customer reservation data, exposing names, email addresses, phone numbers, booking details, and any notes shared with accommodation providers. The company began notifying affected users on Sunday and has reset PIN numbers on all impacted reservations.
Despite the breach affecting an undisclosed number of travelers, Booking.com has declined to say how many people were impacted and has not issued a formal press release or shared technical details about the intrusion vector.
What Data Was Accessed
According to Booking.com's confirmation to TechCrunch, the accessed information includes:
- Full names on reservations
- Email addresses
- Phone numbers
- Booking dates and property details
- Any notes or special requests shared with accommodations
The company insists that payment information was not accessed. A spokesperson stated that "all affected customers had been contacted directly" and that the problem is now "under control."
Phishing Risk Remains Elevated
Even without payment data, the exposed information creates serious secondary risks. Attackers now possess everything needed to craft convincing phishing campaigns: they know where you're staying, when you're traveling, and how to reach you.
Expect highly targeted scams referencing specific bookings—fake payment requests, fraudulent cancellation notices, or messages impersonating hotel staff. This follows patterns we've seen in social engineering attacks that leverage stolen context to bypass user skepticism.
Travel reservation data is particularly valuable for this purpose. Victims receive what appears to be a legitimate follow-up about a real trip from a sender who knows exact dates and property names.
Company Response
Booking.com has taken the following actions:
- Reset all PIN numbers on impacted reservations
- Directly contacted affected users via email
- Stated the breach is now "under control"
What the company has not done:
- Disclosed the number of affected accounts
- Explained how attackers gained access
- Issued a public statement or press release
- Filed breach notifications with regulators (as of reporting)
The lack of transparency echoes other recent travel sector breaches where companies downplay scope while users bear the fraud risk.
Timeline
- April 13, 2026 — Booking.com confirms breach publicly after The Register reported on user notifications
- April 13 evening — Company begins emailing affected users about "suspicious activity"
- April 14, 2026 — PIN resets completed across impacted reservations
What Travelers Should Do
If you've booked through Booking.com recently:
- Watch for phishing — Be extremely skeptical of any communication about bookings, even if details match real reservations
- Verify directly — Don't click links in emails. Navigate to Booking.com directly or call properties using numbers from official sources
- Check for unauthorized changes — Log into your account and verify no modifications were made to existing reservations
- Monitor linked email — Watch for password reset attempts on accounts using the same email address
The exposed phone numbers may also enable SMS phishing (smishing) or voice phishing (vishing) attacks. Scammers can reference real booking details to pressure victims into providing payment information "to confirm" or "update" reservations.
Why This Matters
Booking.com processes millions of reservations globally. The company's refusal to disclose breach scope prevents affected users from understanding their exposure level.
This breach also highlights ongoing risks in the travel sector, where reservation systems aggregate sensitive personal data across hundreds of thousands of properties. A single platform compromise exposes data that travelers shared with what they believed were individual hotels.
For a detailed breakdown of how breaches like this enable downstream attacks, see our guide on understanding data breaches.
Travel booking platforms have become prime targets precisely because the data enables highly convincing, context-rich social engineering. When attackers know your hotel, dates, and contact information, the fake "payment failed—update your card" message looks indistinguishable from legitimate communication.
Related Articles
Starbucks Breach Exposes SSNs of 889 Employees via Phishing
Attackers compromised 889 Starbucks Partner Central accounts using fake login portals, exposing employee names, Social Security numbers, and bank details.
Mar 14, 2026Basic-Fit Breach Exposes Bank Details for 1M Gym Members
Dutch fitness chain Basic-Fit confirms hackers accessed bank account details, addresses, and personal data for up to 1 million members across six European countries.
Apr 15, 2026ShinyHunters Breaches Rockstar Games via Anodot Token Theft
GTA 6 developer Rockstar Games confirms third-party breach after ShinyHunters stole Snowflake credentials through Anodot. Ransom deadline set for April 14.
Apr 12, 2026Mercor Breach Exposes 4TB of AI Training Data After LiteLLM Attack
AI startup Mercor confirms breach via LiteLLM supply chain attack. Lapsus$ claims 4TB stolen including candidate data, source code, and API keys. Meta pauses contracts.
Apr 10, 2026