BWH Hotels Says Hackers Had Access to Reservation Data for 6 Months
Security WeekArchived May 12, 2026✓ Full text saved
Threat actors obtained names and contact information for an unspecified number of BWH Hotels guests. The post BWH Hotels Says Hackers Had Access to Reservation Data for 6 Months appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
Hospitality group BWH Hotels is informing some guests that hackers had access to reservation data for more than six months.
BWH Hotels operates more than 4,000 hotels worldwide, including brands such as WorldHotels, Best Western Hotels & Resorts, and Sure Hotels.
Emails sent to customers affected by the data breach reveal that the intrusion was discovered on April 22, and an investigation showed that threat actors had access since October 14, 2025.
The company said the attackers gained access to a web application housing some guest reservation data, including names, email addresses, phone numbers, and reservation details.
“Importantly, payment and other financial information was not stored in the affected system and therefore was not accessed,” BWH Hotels stated.
It’s unclear how many individuals were affected by the incident.
The company took the compromised application offline after discovering the intrusion and launched an investigation with the aid of external security experts.
The hotel group seems concerned that the attackers may leverage the stolen data for scams and phishing.
No known cybercrime group appears to have taken credit for the attack on BWH Hotels.
Related: Booking.com Says Hackers Accessed User Information
Related: Nightclub Giant RCI Hospitality Reports Data Breach
Related: Sophisticated ClickFix Campaign Targeting Hospitality Sector
WRITTEN BY
Eduard Kovacs
Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
Frame Security Emerges From Stealth With $50M for Awareness and Training Platform
Google Detects First AI-Generated Zero-Day Exploit
Cloudflare Lays Off 1,100 Employees in AI-Driven Restructuring
New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks
Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants
Ransomware Group Takes Credit for Trellix Hack
Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks
Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking
Latest News
White Circle Raises $11 Million for AI Control Platform
Free OnlyFans Lure Used to Spread Cross-Platform CRPx0 Malware
Deal Reached With Hackers to Delete Data Stolen From the Canvas Educational Platform
West Pharmaceutical Services Hit by Disruptive Ransomware Attack
Apple Patches Dozens of Vulnerabilities in macOS, iOS
SAP Patches Critical S/4HANA, Commerce Vulnerabilities
Claude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really Means
Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?
Trending
Webinar: ROSI For CPS Security Programs
May 13, 2026
In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.
Register
Virtual Event: Threat Detection And Incident Response Summit
May 20, 2026
Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.
Register
People on the Move
Malwarebytes has named Chung Ip as Chief Financial Officer.
Semperis has appointed John Podboy as Chief Information Security Officer.
Randy Menon has become Chief Product and Marketing Officer at One Identity.
More People On The Move
Expert Insights
Is The SOC Obsolete, And We Just Haven’t Admitted It Yet?
Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au)
The Mythos Moment: Enterprises Must Fight Agents With Agents
Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor)
Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents
From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George)
Government Can’t Win The Cyber War Without The Private Sector
Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin)
The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb)
Flipboard
Reddit
Whatsapp
Email