Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Teams Vulnerability Enables Spoofing Attacks
May 13, 2026
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Home/CyberSecurity News/Booking.com Data Breach Confirmed: Customer Info Confirms Hackers
CyberSecurity News

Booking.com Data Breach Confirmed: Customer Info Confirms Hackers

Global travel booking giant Booking.com has confirmed a cyberattack, revealing that unauthorized third parties accessed customer personal data. The compromised information includes names, email...

Sarah simpson
Sarah simpson
April 14, 2026 2 Min Read
18 0

Global travel booking giant Booking.com has confirmed a cyberattack, revealing that unauthorized third parties accessed customer personal data. The compromised information includes names, email addresses, phone numbers, and reservation details. This incident immediately raises concerns about subsequent phishing attacks targeting millions of travelers worldwide.

Booking.com confirmed on Monday that it had detected suspicious activity across a number of customer reservations. The company, which hosts over 28 million accommodation listings worldwide, notified affected customers via email, warning that “unauthorized third parties may have been able to access certain booking information associated with your reservation”.

Despite the public disclosure, Booking.com declined to reveal the total number of customers impacted, the specific regions affected, or the exact timeframe during which unauthorized access occurred.

Booking Notification to users

A company spokesperson confirmed to TechCrunch that Booking.com “noticed some suspicious activity involving unauthorized third parties being able to access some of our guests’ booking information” and that the company “took action to contain the issue” upon discovery.

As an immediate security measure, Booking.com reset the PIN numbers associated with affected reservations and informed impacted guests.

The compromised data reportedly includes booking details, full names, email addresses, physical addresses, phone numbers, and “anything that you may have shared with the accommodation”.

Critically, Booking.com confirmed to The Guardian that financial information was not accessed during the breach. However, it remains unclear whether the credit card data stored on the platform was fully isolated from the intrusion.

Evidence suggests threat actors are already weaponizing the stolen data. At least one affected Reddit user reported receiving a targeted WhatsApp phishing message two weeks prior to receiving the breach notification, a message that contained accurate booking details and personal information.

This strongly indicates that stolen reservation data is being actively operationalized for social engineering campaigns impersonating Booking.com or affiliated accommodation providers.

Booking.com has explicitly warned customers that it will never request credit card details over the phone, via SMS, or via WhatsApp, nor will it request bank transfers outside of official booking confirmation guidelines.

This incident follows a well-documented pattern of attacks targeting the Booking.com ecosystem. In late 2023, cybersecurity firm Secureworks identified campaigns using the Vidar infostealer to harvest hotel admin portal credentials, enabling attackers to directly message guests with fraudulent payment requests.

A November 2025 report by Sekoia.io further detailed phishing campaigns leveraging ClickFix and PureRAT malware to compromise hotel accounts and target customers.

Security researchers urge Booking.com users to remain vigilant against unsolicited payment requests via WhatsApp or email, verify all communications through official channels, and monitor accounts for suspicious activity.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCybersecurityHackerMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Hackers Steal User Data Using 108 Mal Chrome Extensions

Next Post

Hackers Target Okta Identity Systems, Bypassing Phishing Emails

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ivanti Patches Critical Vulnerabilities in Secure Access &
May 12, 2026
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us