Loading...
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Booking.com Confirms Data Breach Exposing Guest Reservation Data, Forces PIN Resets

Booking.com mobile app icon

Booking.com has confirmed a data breach in which unauthorized third parties accessed guest reservation information, forcing the company to reset booking PIN codes for all affected reservations and notify impacted customers directly via email. The company detected suspicious activity over the weekend of April 12 and 13, 2026, contained the issue, and began notifying affected users. The total number of customers affected has not been disclosed.

What Was Exposed

According to Booking.com’s breach notification and statements to multiple outlets, the compromised data includes guest names, email addresses, phone numbers, and any communications shared with accommodation providers through the platform. The company confirmed to The Guardian that financial information was not accessed. Physical addresses were not taken, according to a correction issued by TechCrunch following initial reporting. Passwords were not referenced in the company’s disclosure.

“At Booking.com, we are dedicated to the security and data protection of our guests,” communications lead Sage Hunter said in a statement. “We recently noticed some suspicious activity involving unauthorized third parties being able to access some of our guests’ booking information. Upon discovering the activity, we took action to contain the issue. We have updated the PIN number for these reservations and informed our guests.”

Phishing Risk Is the Primary Threat

While no financial data was taken, the nature of the exposed information creates a meaningful phishing risk. Booking details including names, email addresses, phone numbers, and accommodation communications provide attackers with enough context to craft highly convincing follow-on phishing messages — ones that reference real trip details, specific hotels, and accurate dates. Several Reddit users reported receiving suspicious messages over the weekend that appeared to contain accurate private reservation data, suggesting some exploitation of the stolen information may have already begun before Booking.com’s public disclosure.

Booking.com has a documented history of its platform being exploited for this exact type of scam. In previous incidents, threat actors compromised hotel staff accounts and used the platform’s built-in messaging system to deliver payment scam messages directly to guests through what appeared to be legitimate Booking.com communications. The platform’s position as a trusted intermediary between guests and properties makes it a particularly effective vehicle for social engineering once real reservation data is in an attacker’s hands.

Attack Vector and Attribution

Booking.com has not disclosed how the attacker gained access to its reservation system. No attack vector or method has been confirmed. Security researchers at Hackmanac noted that a group calling itself Vect claimed breaches at both Booking.com and Airbnb, but those claims have not been independently verified and Airbnb had not issued any public statement at time of publication. Booking.com said its investigation is ongoing with the assistance of external specialists.

A Pattern of Targeting

This is not Booking.com’s first significant security incident. In 2021, Dutch data protection regulators fined the company €475,000 after a breach exposed personal data belonging to more than 4,000 customers, including credit card details in some cases. That incident involved attackers compromising hotel staff logins to gain access through the supply chain rather than breaching Booking.com directly. Whether the current incident follows a similar pattern has not been confirmed. The company’s scale — 6.8 billion guest arrivals booked since 2010 — makes it a persistent high-value target for attackers seeking reservation data for downstream fraud and social engineering campaigns.

Affected users are advised to treat any incoming communications referencing their reservation with caution, verify the legitimacy of any messages through Booking.com’s official website directly, and report suspicious activity to the platform’s customer support through known official channels. April 13 saw a notable cluster of European consumer breaches — Basic-Fit confirmed a separate incident the same day, exposing bank details and personal data of 1 million gym members across 6 countries. For guidance on what to do after a breach notification, see our data breach response guide.

Picture of m00s3c

m00s3c

Moose (@m00s3c) is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Related Posts

Newsletter signup

Get the latest data breach and security news.

Please wait...

Thank you for signing up!

Search & Monitoring Tools

Free Data Breach Search Tool

Check your email against 12 billion+ leaked records — then set up alerts so you're the first to know if you appear in a new breach.

Instant breach lookup
Real-time monitoring & alerts
12 billion+ leaked records
Check now Set up monitoring

Powered by BreachNews