Booking.com breach raises red flags for insurers as travel scams evolve

Data breach exposes customer booking details and opens the door to highly targeted social engineering incidents

Booking.com breach raises red flags for insurers as travel scams evolve

Cyber

By Josh Recamara

A recent data breach at Booking.com that exposed customer reservation details could trigger a wave of highly convincing travel scams, a cybersecurity expert has warned, with clear implications for travellers, intermediaries and insurers. 

The accommodation platform confirmed on April 13, 2026, that unauthorised actors had accessed certain customer booking information linked to past reservations. Notifications to users and statements reported in European media indicate the exposed data may include booking details, names, email addresses, home addresses, phone numbers and notes shares with the accommodation. Payment card data help in Booking.com's core payment systems has not been reported as compromised.

Cybersecurity specialists said that, even without card data, the incident materially raises the risk of social engineering attacks that are difficulty for consumers to spot and which can ultimately feed through into claims and assistance costs.

According to NordVPN cybersecurity expert Adrianus Warmenhoven, relatively limited but highly contextual data is often enough to fuel sophisticated fraud.

“This type of breach is particularly dangerous not because of financial data, but because of context. When attackers gain access to booking details, such as names, travel dates, accommodation information, they can craft highly convincing, personalised scams that are much harder to detect," he said. “Imagine receiving a message that references your exact stay, dates, and property – it immediately feels legitimate. This is exactly what cybercriminals rely on. We expect to see a spike in phishing emails, fake payment requests, and ‘verification’ messages targeting affected users.”

Warmenhoven added that the time‑sensitive nature of travel plans gives attackers an added advantage.

“Travel-related data is especially sensitive because it introduces a time element. Scammers know exactly when you’re due to travel, which makes their messages feel urgent and legitimate – whether it’s a ‘problem with your booking’ or a ‘last-minute payment request.’”

Background: an established attack vector

The latest breach comes against a backdrop of persistent fraud attempts exploiting the Booking.com ecosystem.

The UK’s national reporting centre for fraud, Action Fraud, received 532 reports between June 2023 and September 2024 relating to scams where criminals gained control of hotel accounts on the platform and contacted guests with fake payment requests, leading to reported losses of around £370,000.

Consumer reports over the past two years have highlighted cases in which victims received messages quoting exact reservation details – dates, property names and prices – before being redirected to fraudulent payment pages. Many of those attacks began with phishing campaigns against hotels or exploitation of weak partner credentials, rather than a direct compromise of Booking.com’s central systems.

Booking.com has also faced regulatory action. In 2021, the Dutch Data Protection Authority fined the company €475,000 for failing to notify a 2018 breach within the 72‑hour deadline required under the EU’s General Data Protection Regulation, after criminals accessed the data of more than 4,000 customers and attempted to obtain card details by phone.

That regulatory history reinforces the exposure of large digital travel platforms not only to breach response and remediation costs, but also to potential penalties for notification failures, adding to the risk picture under cyber and directors’ and officers’ policies.

Travel scams being more sophisticated

Fraud specialists expect the current breach to fuel more sophisticated “conversation‑hijacking” scams that mirror legitimate communication styles and reference genuine trips. Typical approaches include unexpected requests to “re‑confirm” card details, links to external payment pages that differ from original booking terms, or messages pressuring customers to act immediately to avoid cancellation.

Lloyds Bank data on holiday scams showed victims of holiday booking fraud have suffered average losses in the hundreds of pounds, with social media and third‑party platforms frequent starting points. That pattern aligns with the Booking.com‑related scams seen by Action Fraud, where victims have lost the entire cost of stays by paying fake invoices via bank transfer.

Increased scam activity can surface in several ways. Policyholders may seek to claim when they arrive to find non-existent or unpaid accommodation, or for missed departures and trip disruption linked to fraud. Many travel policies exclude losses where the customer has voluntarily transferred funds to fraudsters, but complaints, reputational pressure and customer‑care responses can still create cost and operational strain. Some products also offer limited cover for unauthorised transactions or fraud‑related disruption, bringing the issue squarely into claims teams’ workloads.

Assistance providers may see higher call volumes from stranded travellers needing emergency rebooking, even where the underlying financial loss falls outside policy cover. That can put pressure on capacity during peak periods and may feed into pricing, service‑level agreements and discussions with insurers at renewal.

Challenges for cyber and travel underwriters

Cyber underwriters have been paying close attention to sectors that rely heavily on third‑party platforms and APIs. The Booking.com case underlines the complexity of data flows in travel, where customer information moves between platforms, channel managers, property‑management systems and individual hotels. Weaknesses at any point can be exploited to stage convincing scams.

Underwriters are likely to probe more deeply into how travel and hospitality clients manage access to platform dashboards and reservation data, the use of multi‑factor authentication, and controls around partner accounts. They may also scrutinise incident response plans for social‑engineering attacks using booking data and the contractual position between platforms, properties and intermediaries when a breach at one party drives losses elsewhere.

In parallel, travel insurers and intermediaries may revisit how clearly their policies address losses arising from scams that use legitimate travel data, and whether additional guidance or optional fraud‑related extensions are warranted. Clear communication about how an insurer or assistance provider will contact customers – and what they will never ask for – is becoming an important part of risk management.

Related Stories

Keep up with the latest news and events

Join our mailing list, it’s free!