KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!





On 15 April 2026, Booking.com warned users that unauthorised parties may have accessed customer information after it detected suspicious activity affecting several reservations. In an email seen by The Straits Times, the platform said the accessed information could include booking details, names, email addresses and phone numbers linked to the booking, as well as anything customers shared with the property. It added that financial information was not accessed from its systems, and Booking.com later stated that customers’ home addresses were not accessed from its systems either.
Those details matter because they sit at the heart of a specific threat pattern that travel platforms face. Even when payment data is not taken, the reservation context is often enough to make phishing feel real. A scammer does not need your card number if they can persuade you to type it into a fake “verification” page. The breach story is therefore not only about data security, but it is also about how trust is exploited in travel, where customers expect urgent messages, last-minute changes, and property-specific instructions.
The information Booking.com described as potentially accessible is a highly usable set of identifiers. Names, email addresses, phone numbers, and booking details can be combined into personalised messages, such as reminders about check-in, payment “reconfirmation”, or changes to reservation terms. When the content matches a real trip, victims are more likely to react quickly rather than verify.
The most potent risk is the extra context people share with properties. Travellers often send passport name spellings, arrival times, special requests, and family details via messaging. When an attacker can reference those details, they can craft phishing that bypasses scepticism. This is why “not financial data” should still be treated as serious. It shifts the attacker’s plan from stealing data directly to using the data as a lure.
Travel is a high-trust environment. People expect to receive messages from unfamiliar parties, such as hotels, serviced apartments, or concierge teams. They also expect urgent deadlines, especially when travelling across time zones. This creates a psychological advantage for scammers: urgency and unfamiliarity already feel normal.
There is also a structural factor. Travel bookings typically involve multiple entities: the platform, the property, payment providers, and sometimes corporate travel partners. Each handoff creates another chance to imitate a legitimate actor. When a platform warns that it will never ask for card details over email, phone, text, or WhatsApp, it is responding to the reality that phishing thrives where communication channels are fragmented and hard to verify.
The Straits Times noted that some Booking.com users previously received emails or in-app messages from scammers posing as hotel representatives, prompting victims to click a fraudulent link to “verify” a reservation and then share personal and banking details. In practice, these scams are effective because they blend into the normal rhythm of travel communication. The fraudster does not need to invent a scenario; they only need to nudge you into a familiar action at a stressful moment.
What changes after a breach is plausibility. If an attacker can include correct reservation details, the message is no longer generic. It becomes targeted phishing, shaped around the trip you are actually taking. That makes traveller awareness more important, but it also raises the bar for platform-side detection, because malicious messages can look similar to real property communications.
Booking.com said it had sent new PINs to users with reservations and urged them to watch out for suspicious emails and calls. As a practical approach, customers should treat any link-based request to “verify” payment as suspicious, even if it references correct booking details. The safest path is to open the Booking.com app or website independently and check messages there, rather than following a link in an email or messaging app.
A useful real-world habit is to slow down the interaction. Scams rely on urgency and embarrassment, such as “your reservation will be cancelled” or “your payment failed, act now”. If you pause and validate through an official channel, you remove the attacker’s advantage. If a message claims to be from a hotel, verify using contact details from the official booking page rather than the message itself.
For organisations that process personal data, incidents like this sit in the broader context of breach readiness, including assessment, containment, and notification duties. Singapore’s PDPA includes mandatory data breach notification obligations, and the regulator expects organisations to assess whether a breach is notifiable and to notify the PDPC within a defined timeline once it is assessed as notifiable. The PDPC states that notification should be made as soon as practicable and no later than three calendar days after establishing that the data breach is notifiable.
Even when financial data is not involved, exposed identifiers can still lead to significant harm through identity fraud, social engineering, and account takeover. That is why organisations should treat “contact plus context” data as high-risk. In travel, the business impact is not only regulatory. It is customer trust, chargebacks, partner disputes, and reputational damage that can outlast the initial incident.
One reason travel phishing works is that legitimate travel communications often look like scams. The more systems rely on PINs, links, and last-minute payment workflows, the harder it is for customers to tell what is real. This is where security teams need to work with product and customer experience teams, not just IT. Strong control is not only a technical barrier, but it is also a communication pattern that customers can recognise and follow reliably.
A practical example is link minimisation. If a platform can shift verification flows away from link clicks and into in-app confirmations, it reduces the attack surface. Another is consistent language: if legitimate messages never request payment reconfirmation outside the app, customers can learn a simple rule that holds up under stress.
Incidents like this show why breach preparedness needs both cybersecurity controls and data protection discipline. Privacy Ninja supports organisations by helping them stay ready before incidents happen, and be decisive when they do.
Our DPO-as-a-Service provides a dedicated point of contact to keep PDPA compliance on track, maintain core data protection policies and practices, and handle data protection queries or requests consistently. When an incident arises, the DPO helps coordinate the initial response and communications as the organisation’s key data protection contact, so actions are recorded and follow-up is disciplined. Where technical assurance is required, Privacy Ninja’s vulnerability assessment and penetration testing services help identify weaknesses that often enable data exposure and phishing, such as misconfigured access controls, insecure messaging workflows, and overlooked internet-facing systems.
The Booking.com incident is a reminder that a data breach does not need card numbers to create harm. Reservation details, contact data, and message history can be enough to power convincing phishing that targets people when they are distracted and time-sensitive. For consumers, the best defence is verification through official channels and refusing link-led payment requests. For organisations, the best defence is to design systems and communications that reduce opportunities for impersonation, backed by disciplined breach response and clear regulatory readiness.