Booking.com Hack Exposes Customer Data, Sparks Travel Scam Fears

Image: Jas Rolyn/Unsplash

That upcoming vacation? Hackers may already know all about it.
Booking.

Booking.com Hack Exposes Customer Data, Sparks Travel Scam Fears

Booking.com Hack Exposes Customer Data, Sparks Travel Scam Fears

That upcoming vacation? Hackers may already know all about it.

Booking.com, the global giant that handles everything from boutique hotel stays to cross-country car rentals, has confirmed that hackers breached its system. While the company insists that the situation is now “under control,” the breach has left a trail of exposed personal data and some very frustrated travelers.

On Sunday evening, Booking.com began notifying an undisclosed number of customers that their reservation details had been compromised. The company says it noticed “suspicious activity” linked to specific bookings and immediately moved to contain the breach.

A spokesperson for the company told The Guardian that the platform “noticed some suspicious activity involving unauthorised third parties being able to access some of our guests’ booking information.” While the company was quick to clarify that “financial information was not accessed,” the list of what was taken is extensive enough to cause serious headaches for travelers.

What information was exposed?

According to the company’s email to customers, the hackers may have seen:

  • Full names and email addresses.
  • Physical addresses and phone numbers.
  • Specific booking details and dates.
  • Any extra notes or requests shared directly with hotels.

The NL Times, which reviewed a copy of the email, reported that the message does not state when the hack occurred or how many people may have been affected. Booking.com is also not answering questions about those details, the outlet said.

The ‘context’ danger

While the lack of credit card theft might sound like a relief, cybersecurity experts warn that the true value for hackers lies in the “context” of your trip.

In an email to TechRepublic, Adrianus Warmenhoven, a cybersecurity expert at NordVPN, explained why this specific breach is so alarming:

“This type of breach is particularly dangerous not because of financial data, but because of context. When attackers gain access to booking details, such as names, travel dates, accommodation information, they can craft highly convincing, personalised scams that are much harder to detect.”

Warmenhoven further noted that the timing of these messages is a weapon. “Scammers know exactly when you’re due to travel, which makes their messages feel urgent and legitimate – whether it’s a ‘problem with your booking’ or a ‘last-minute payment request,’” he told TechRepublic.

Frustrated users speak out

Not everyone is satisfied with how the travel giant handled the situation. On social media, some users claimed the company was slow to admit there was a problem.

One Reddit user, quoted by Sky News, expressed frustration over the timeline: “I reported a security breach 15 days ago, and they claimed everything was fine on their end. Apparently, they are now sending automated emails to many customers, which clearly shows this is not an issue with just one hotel, but likely something related to their booking management app or security systems.”

Another user on the platform speculated on the hackers’ ultimate goal, telling Sky News: “The hacker may have been trying to get at something else, such as holding their system hostage for money.”

What you should do right now

If you’re a Booking.com customer — especially one with a trip coming up — NordVPN’s Warmenhoven has a clear set of recommendations:

  • Do not click links in unexpected emails or messages about your booking
  • Never share payment details over email, SMS, or messaging apps
  • Log directly into Booking.com’s official platform to verify anything suspicious
  • Be on high alert for messages that create urgency around your reservation

The company says the problem is contained. Whether customers feel the same is another matter entirely.

For more on emerging mobile threats, check out how a critical Android SDK flaw is opening the door to stealthy malware attacks.

About Author

What do you feel about this?

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.