Security WeekArchived Apr 09, 2026✓ Full text saved
In December 2025, hackers stole names and passport numbers from the European travel company’s network. The post 300,000 People Impacted by Eurail Data Breach appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
European travel company Eurail is notifying over 300,000 people that their personal information was stolen in a December 2025 data breach.
The incident was initially disclosed in January, when the company warned that customers who were issued a Eurail pass might have been affected.
The data was stolen after hackers breached the Netherlands-based company’s network and stole files containing basic identity and contact information.
In February, a hacker boasted on a surface web cybercrime site about stealing roughly 1.3 terabytes of data from Eurail’s AWS S3, Zendesk, and GitLab instances, including source code, support tickets, and database backups.
The hacker claimed they stole the personal information of millions of Eurail/Interrail customers and that negotiations with the travel company had failed.
In early March, Eurail confirmed that the hacker had been offering the stolen data on the dark web and that they published a sample dataset on their Telegram channel. It also said it does not store bank or credit card information, nor visual copies of passports.
“Customers whose personal data was included in the sample dataset will be informed directly where contact details are available to us,” the company said.
Last week, Eurail filed breach notifications with the Attorney General’s Offices in several US states, revealing that names and passport numbers were stolen in the attack.
The company told the Oregon Attorney General’s Office that the data breach impacts only 308,777 people. Eurail is sending written notifications to the potentially impacted individuals.
Related: FBI: Cybercrime Losses Neared $21 Billion in 2025
Related: Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption
Related: European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack
Related: T-Mobile Sets the Record Straight on Latest Data Breach Filing
WRITTEN BY
Ionut Arghire
Ionut Arghire is an international correspondent for SecurityWeek.
More from Ionut Arghire
FBI: Cybercrime Losses Neared $21 Billion in 2025
Evasive Masjesu DDoS Botnet Targets IoT Devices
Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover
Trent AI Emerges From Stealth With $13 Million in Funding
Critical Flowise Vulnerability in Attacker Crosshairs
GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data
Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems
German Police Unmask REvil Ransomware Leader
Latest News
Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities
The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security
Google Warns of New Campaign Targeting BPOs to Steal Corporate Data
Adobe Reader Zero-Day Exploited for Months: Researcher
$3.6 Million Stolen in Bitcoin Depot Hack
Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long
Data Leakage Vulnerability Patched in OpenSSL
RCE Bug Lurked in Apache ActiveMQ Classic for 13 Years
Trending
Webinar: Securing Fragile OT In An Exposed World
March 10, 2026
Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure.
Register
Webinar: Why Automated Pentesting Alone Is Not Enough
April 7, 2026
Join our live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline.
Register
People on the Move
John Clancy has become Chief Executive Officer at Bitsight.
Halcyon has appointed Dave Hannigan as Field Chief Information Security Officer.
Pamela McLeod has been named as CISO of the state of New Hampshire.
More People On The Move
Expert Insights
The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb)
The New Rules Of Engagement: Matching Agentic Attack Speed
The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael)
The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust
Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin)
Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw
Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor)
The Human IOC: Why Security Professionals Struggle With Social Vetting
Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb)
Flipboard
Reddit
Whatsapp
Email