NEWYou tin present perceive to Fox News articles!
You astir apt didn't expect a question booking level to nonstop you into a information spiral. Yet present we are.
Booking.com confirmed that hackers whitethorn person accessed lawsuit data, including names, email addresses, telephone numbers and booking details. That is capable accusation to marque scam messages look real.
If you've booked a edifice oregon rental done the platform, this is worthy your attention.
Sign up for my FREE CyberGuy Report
- Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
- For simple, real-world ways to spot scams aboriginal and enactment protected, sojourn CyberGuy.com – trusted by millions who ticker CyberGuy connected TV daily.
- Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
SMART TRAVEL SAFETY TIPS BEFORE YOUR NEXT TRIP

Booking.com says hackers whitethorn person accessed lawsuit names, emails, telephone numbers and preservation details. The breach could marque phishing messages look acold much convincing. (KairosDee/Getty Images)
What happened successful the Booking.com information breach
The institution sent email notifications to affected customers aft detecting "suspicious enactment involving unauthorized 3rd parties" accessing impermanent booking information. That's the firm mode of saying idiosyncratic got successful who shouldn't person been there.
One idiosyncratic shared the afloat notification connected Reddit, wherever dozens of others said they received the aforesaid message. That suggests this was not an isolated case. The announcement warned that thing customers "may person shared with the accommodation" could besides person been exposed, meaning the breach went beyond basal relationship data.
What information was exposed successful the Booking.com breach
Booking.com confirmed that fiscal accusation was not accessed. Physical location addresses were besides not portion of the breach, according to the company. So no, idiosyncratic doesn't person your recognition paper fig oregon location code from this incident.
What they bash perchance have: your name, email address, telephone fig and the details of your reservation. That's capable to trade a convincing phishing message, which immoderate hackers whitethorn already beryllium doing.
"At Booking.com, we are dedicated to the information and information extortion of our guests," a Booking.com spokesperson said successful a connection to CyberGuy. "We precocious noticed immoderate suspicious enactment involving unauthorized 3rd parties being capable to entree immoderate of our guests' booking information, which whitethorn see booking details, names, email addresses and telephone numbers and thing that travelers whitethorn person shared with the accommodation."
"Financial accusation was not accessed from Booking.com's systems, nor were guests' carnal addresses," the spokesperson continued. "Upon discovering the activity, we took enactment to incorporate the issue. We person updated the PIN fig for these reservations and informed our guests."
APPLE NOW LETS YOU ADD YOUR PASSPORT TO YOUR PHONE'S WALLET

A Booking.com breach exposed idiosyncratic and preservation information that scammers tin usage to trade realistic fraud attempts. (Annette Riedl/picture alliance)
How scammers are utilizing stolen booking data
A idiosyncratic who posted the notification connected Reddit said that 2 weeks earlier receiving it, they got a phishing connection connected WhatsApp that included their existent booking details and idiosyncratic information. That timing matters. It suggests hackers whitethorn person already been utilizing the information earlier galore customers were notified.
It is not wide whether that earlier phishing effort is straight tied to this circumstantial breach, but it shows however elaborate booking accusation tin beryllium utilized successful targeted scams.
That is what makes this breach much unsafe than it archetypal appears. When scammers cognize wherever you are staying and when, they tin make messages that consciousness legitimate. A fake alert astir a occupation with your preservation oregon a petition to corroborate outgo details abruptly looks real.
How past incidents item imaginable risks
This breach did not hap successful a vacuum. In 2024, hackers infected computers astatine aggregate hotels with a benignant of consumer-grade spyware known arsenic stalkerware. In 1 documented case, a edifice worker was logged into their Booking.com admin portal erstwhile the bundle captured a screenshot of the screen, exposing disposable lawsuit data.
That item points to a broader issue. In immoderate cases, vulnerabilities whitethorn beryllium not conscionable wrong a platform, but crossed the hotels and systems connected to it. The existent breach whitethorn travel a akin pattern, though the institution has not confirmed however the unauthorized entree occurred.
To enactment the standard successful context, Booking.com says 6.8 cardinal bookings person been made done the level since 2010. Even a tiny percent of affected users represents a ample fig of people.
NEW FBI WARNING REVEALS PHISHING ATTACKS HITTING PRIVATE CHATS

A Booking.com breach exposed idiosyncratic and preservation information that scammers tin usage to trade realistic fraud attempts. Security experts pass travelers to verify immoderate connection astir their stay. (martin-dm/Getty Images)
Ways to enactment harmless aft the Booking.com breach
You don't person to curse disconnected question apps to support yourself. A fewer targeted steps spell a agelong way.
1) Check for an authoritative notification
Check your email for a connection from Booking.com. If you received one, instrumentality it earnestly alternatively than filing it away. The institution says it has updated PINs for affected reservations, but your relationship itself whitethorn inactive request attention.
2) Update your password now
Change your Booking.com password, particularly if you reuse it anyplace else. Credential stuffing attacks are communal aft breaches, and reused passwords marque it casual for hackers to interruption into different accounts. A password manager tin assistance you make and store strong, unsocial passwords truthful you are not relying connected the aforesaid 1 crossed aggregate sites. Check retired the champion expert-reviewed password managers of 2026 astatine Cyberguy.com.
3) Turn connected two-factor authentication
Enable two-factor authentication (2FA) if you haven't already. It adds a step, but it besides blocks entree adjacent if idiosyncratic has your password.
4) Consider individuality theft protection
Even though fiscal information was not accessed, exposed idiosyncratic details tin inactive beryllium utilized successful scams oregon individuality theft attempts. An individuality extortion work tin show your information, alert you to suspicious enactment and supply enactment if your individuality is compromised. See my tips and champion picks connected Best Identity Theft Protection astatine Cyberguy.com.
5) Watch for highly targeted phishing messages
Be skeptical of immoderate connection that references your booking details, whether it arrives by email, substance oregon WhatsApp. Legitimate companies seldom inquire you to click a nexus and re-enter outgo information. Hackers with your booking information tin constitute convincing fakes that look urgent.
6) Verify bookings done authoritative channels
If you get a connection astir your reservation, bash not click the link. Open the Booking.com app oregon benignant the website code manually. You tin besides interaction the edifice straight utilizing the fig listed connected its authoritative website.
7) Add a information nett successful lawsuit you click thing malicious
If you accidentally click a suspicious link, beardown antivirus bundle tin assistance observe malicious websites oregon downloads earlier they origin damage. Look for tools that connection real-time extortion and phishing detection, not conscionable basal microorganism scans. Get my picks for the champion 2026 antivirus extortion winners for your Windows, Mac, Android & iOS devices astatine Cyberguy.com.
8) Limit however your idiosyncratic information is exposed online
Data brokers cod and merchantability idiosyncratic details similar your telephone fig and email address. That makes it easier for scammers to link stolen booking information to a existent person. Removing your accusation from these sites with a information removal work tin trim however often you are targeted. Check retired my apical picks for information removal services and get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web by visiting Cyberguy.com.
9) Report thing suspicious quickly
If you person a phishing effort that includes your existent preservation details, interaction Booking.com straight and study the connection to your telephone bearer oregon email provider. Reporting helps unopen down scams faster.
Kurt's cardinal takeaways
Data breaches astatine large question platforms are uncomfortable precisely due to the fact that question feels personal. Your itinerary, your accommodation and your plans are wrapped up successful those booking details, and present idiosyncratic other whitethorn person a copy. The bully quality is that fiscal accusation and location addresses were not portion of this breach. The atrocious quality is that the stolen information is elaborate capable to beryllium weaponized successful targeted phishing attacks, and there's grounds that it already has been. Booking.com updated its customers, reset PINs for affected reservations and publically confirmed the incident. That's much transparency than galore companies offer. But the information that users were receiving phishing messages connected WhatsApp 2 weeks earlier the ceremonial notification went retired is worthy sitting with. You can't power whether the level you usage gets breached. You tin power whether you're an casual people erstwhile your information is retired there.
How overmuch work should companies similar Booking.com instrumentality erstwhile your idiosyncratic information fuels scams? Let america cognize by penning to america astatine Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
- Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
- For simple, real-world ways to spot scams aboriginal and enactment protected, sojourn CyberGuy.com – trusted by millions who ticker CyberGuy connected TV daily.
- Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.











English (CA) ·
English (US) ·
Spanish (MX) ·