In a notification sent to customers, the site said that it had noticed third-party access that impacted reservations.
“We recently noticed suspicious activity affecting a number of reservations and we immediately took action to contain the issue,” the notice reads.
“Based on the findings of our investigation to date, accessed information could include booking details and name(s), emails, addresses, phone numbers associated with the booking and anything that you may have shared with the accommodation.”
Based on the notice email posted on reddit, the notices appear to have been addressed from the hotels the customer reservations were with. However, the user that posted the statement says that this appears to be an issue with Booking.com as a whole.
“I reported a security breach 15 days ago, and they claimed everything was fine on their end,” the user said.
“Apparently, they are now sending automated emails to many customers, which clearly shows this is not an issue with just one hotel, but likely something related to their booking management app or security systems.
“Given how weak their security appears to be, I’m not surprised. Make sure you understand the risks before booking with Booking.com.”
Booking.com has not clarified whether or not its systems were breached, nor how many people were impacted by the incident.
However, it did confirm that no financial data was accessed in a statement to SecurityWeek.
“We took quick action and the issues has [sic] been fully contained,” a Booking.com spokesperson said.
“We have updated the PIN number for these reservations and informed our customers accordingly.”
“While no financial or payment information was accessed, we’re also reminding customers to remain vigilant to potential phishing attacks and reinforcing that Booking.com will never ask for credit card details by email, phone WhatsApp or text message, or ask them to make a bank transfer that is different from the payment details in their booking confirmation.”
Speaking with Cyber Daily, former FBI agent and Chief Information Security Officer (CISO) at Arctic Wolf Adam Marré said that this is an example of threat actors replicating legitimate activity and using social engineering rather than relying on breaking systems.
Updated 14/04/2026: Added commentary from Adam Marré, Arctic Wolf.
Want to see more stories from trusted news sources?Make Cyber Daily a preferred news source on Google.