Nearly 5 million
A misconfigured server has led to the exposure of sensitive data belonging to approximately 5 million hotel guests worldwide. Security researchers at Cybernews discovered a 6.5GB database, left open to the internet, containing booking information and personal details siphoned from two hospitality software providers: Chekin, based in Spain, and Gastrodat, based in Austria. The data was harvested by an unknown threat actor using Python scripts and the compromised credentials of over 500 hotels and hosts. The exposed information includes full names, emails, phone numbers, dates of birth, and in some cases, ID document details, creating a treasure trove for malicious actors planning phishing campaigns and identity theft.
The incident, discovered on March 24, 2026, and reported on April 15, 2026, is not a direct breach of the software vendors but rather a third-party compromise facilitated by credential theft. An unknown threat actor gained access to 527 accounts belonging to hotels and other properties using the Chekin and Gastrodat platforms. The credentials for these accounts, including plaintext passwords and JWT tokens, were found on the same exposed server, suggesting a successful campaign targeting the platforms' clients.
Using these compromised accounts, the actor deployed Python scripts to continuously scrape booking data. The aggregated dataset included:
The exposed data is highly sensitive and creates significant risk for the 5 million affected individuals. The compromised dataset includes:
While no direct financial data like credit card numbers was found, the combination of personal and travel information is extremely valuable for attackers. This data enables highly convincing and personalized social engineering attacks.
Potential Attack Scenarios:
Strategic Recommendations:
Enforcing MFA on all accounts, especially for hotel staff accessing management platforms, would have made it significantly harder for the attacker to compromise 527 accounts.
Regularly auditing accounts, enforcing strong password policies, and monitoring for credential stuffing attacks are crucial for platforms like Chekin and Gastrodat.
API gateways and backend systems should be configured to detect and block anomalous behavior, such as a single account scraping thousands of records in a short period.
The root cause of this breach was the compromise of 527 hotel accounts. The most effective defense against this is multi-factor authentication. Both Chekin and Gastrodat should mandate MFA for all their client accounts, particularly those with administrative or data access privileges. Implementation could involve using authenticator apps (TOTP), SMS codes, or hardware security keys. This single control would have likely prevented the entire incident by stopping the attacker from using stolen credentials to log in and scrape data. For hotels, it is imperative to enable MFA on every administrative platform they use, from property management systems to third-party booking services.
The service providers, Chekin and Gastrodat, should implement robust monitoring to detect anomalous data access patterns. A legitimate user might access a few dozen bookings a day; a malicious script will access thousands. By establishing a baseline of normal behavior for each user account, the platforms can automatically flag or block accounts exhibiting scraping behavior. This involves analyzing the volume, frequency, and type of API requests. An alert should be triggered if an account suddenly starts exporting data at a rate far exceeding its historical average. This D3FEND technique acts as a crucial second line of defense when authentication controls fail.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats