Massive Hospitality Breach: 5 Million Guests' Data Exposed via Leaky Server Tied to Chekin, Gastrodat

Unprotected Server Leaks Personal Data of 5 Million Hotel Guests from Chekin and Gastrodat Platforms

HIGH
April 15, 2026
3m read
Data BreachCloud SecurityPhishing

Impact Scope

People Affected

Nearly 5 million

Industries Affected

Hospitality

Related Entities

Organizations

Cybernews

Other

ChekinGastrodat

Full Report

Executive Summary

A misconfigured server has led to the exposure of sensitive data belonging to approximately 5 million hotel guests worldwide. Security researchers at Cybernews discovered a 6.5GB database, left open to the internet, containing booking information and personal details siphoned from two hospitality software providers: Chekin, based in Spain, and Gastrodat, based in Austria. The data was harvested by an unknown threat actor using Python scripts and the compromised credentials of over 500 hotels and hosts. The exposed information includes full names, emails, phone numbers, dates of birth, and in some cases, ID document details, creating a treasure trove for malicious actors planning phishing campaigns and identity theft.


Threat Overview

The incident, discovered on March 24, 2026, and reported on April 15, 2026, is not a direct breach of the software vendors but rather a third-party compromise facilitated by credential theft. An unknown threat actor gained access to 527 accounts belonging to hotels and other properties using the Chekin and Gastrodat platforms. The credentials for these accounts, including plaintext passwords and JWT tokens, were found on the same exposed server, suggesting a successful campaign targeting the platforms' clients.

Using these compromised accounts, the actor deployed Python scripts to continuously scrape booking data. The aggregated dataset included:

  • 4.9 million unique email addresses
  • 400,000 separate booking records
  • 11.6 million total data entries

Impact Assessment

The exposed data is highly sensitive and creates significant risk for the 5 million affected individuals. The compromised dataset includes:

  • Personal Identifiable Information (PII): Full names, phone numbers, email addresses, dates and places of birth.
  • Identity Documents: Details from ID documents in some cases.
  • Booking Details: Stay dates, reservation IDs, guest names, and property addresses.

While no direct financial data like credit card numbers was found, the combination of personal and travel information is extremely valuable for attackers. This data enables highly convincing and personalized social engineering attacks.

Potential Attack Scenarios:

  1. Targeted Phishing: Attackers can send emails impersonating the hotel or booking platform, referencing legitimate booking details (e.g., "There's an issue with your upcoming stay at [Hotel Name] on [Date]") to trick victims into providing payment information or credentials.
  2. Identity Theft: The combination of name, date of birth, and ID details is sufficient to attempt identity theft or open fraudulent accounts.
  3. Physical Security Risk: Knowledge of a person's travel dates can be used to target their empty home for burglary.

Detection and Response

  • For Affected Individuals: Be extremely vigilant about any emails or messages related to past or future hotel stays. Do not click on links or provide personal information. Instead, contact the hotel or booking platform directly through their official website or phone number. Enable multi-factor authentication on all sensitive accounts.
  • For Hotels Using These Platforms: Immediately change all passwords for Chekin, Gastrodat, and other management platforms. Review access logs for any signs of unauthorized activity. Notify guests who may have been affected, providing clear guidance on how to stay safe.
  • For Chekin and Gastrodat: The vendors should enforce stronger security measures for their clients, such as mandatory multi-factor authentication, password complexity requirements, and monitoring for anomalous account activity like rapid data scraping.

Mitigation

Strategic Recommendations:

  • Third-Party Risk Management: This incident highlights the critical importance of managing security risks associated with third-party software and supply chains. Hotels must vet the security practices of their service providers.
  • Credential Security: The use of plaintext passwords and the compromise of 527 accounts underscore the need for strong authentication. All platforms handling sensitive data should mandate MFA.
  • Data Minimization: Organizations should only collect and retain the data that is absolutely necessary for their operations. The less data stored, the lower the impact of a breach.

Timeline of Events

1
March 24, 2026
Cybernews researchers discover the misconfigured and leaking server.
2
April 15, 2026
The data leak is publicly reported by Cybernews.
3
April 15, 2026
This article was published

MITRE ATT&CK Mitigations

Enforcing MFA on all accounts, especially for hotel staff accessing management platforms, would have made it significantly harder for the attacker to compromise 527 accounts.

Regularly auditing accounts, enforcing strong password policies, and monitoring for credential stuffing attacks are crucial for platforms like Chekin and Gastrodat.

API gateways and backend systems should be configured to detect and block anomalous behavior, such as a single account scraping thousands of records in a short period.

D3FEND Defensive Countermeasures

The root cause of this breach was the compromise of 527 hotel accounts. The most effective defense against this is multi-factor authentication. Both Chekin and Gastrodat should mandate MFA for all their client accounts, particularly those with administrative or data access privileges. Implementation could involve using authenticator apps (TOTP), SMS codes, or hardware security keys. This single control would have likely prevented the entire incident by stopping the attacker from using stolen credentials to log in and scrape data. For hotels, it is imperative to enable MFA on every administrative platform they use, from property management systems to third-party booking services.

The service providers, Chekin and Gastrodat, should implement robust monitoring to detect anomalous data access patterns. A legitimate user might access a few dozen bookings a day; a malicious script will access thousands. By establishing a baseline of normal behavior for each user account, the platforms can automatically flag or block accounts exhibiting scraping behavior. This involves analyzing the volume, frequency, and type of API requests. An alert should be triggered if an account suddenly starts exporting data at a rate far exceeding its historical average. This D3FEND technique acts as a crucial second line of defense when authentication controls fail.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachHospitalityChekinGastrodatPIIPhishingCybernews

📢 Share This Article

Help others stay informed about cybersecurity threats