DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Eurail passengers taken for a ride as data breach spills passports, bank details

Posted on January 14, 2026 by Dissent

Connor Jones reports:

Eurail has confirmed customer information was stolen in a data breach, according to notification emails sent out this week.

The European travel company, also known as Interrail to EU residents, initially posted the news on January 10, but affected customers, the number of whom was not disclosed, began receiving emails on January 13.

[…]

Customers who purchased a travel pass directly from Eurail/Interrail did not have a visual copy of their passports stored on company systems.

However, the same is not true for those who received a pass through the DiscoverEU program, an Erasmus-funded initiative that invites travelers to explore the EU by rail.

Read more at The Register.

The January 13 updated notice on Interrail’s site reads:

Eurail B.V. has unfortunately experienced a security breach within our systems that resulted in unauthorized access to customer data. Following the discovery, we immediately began work to secure our systems and initiated an investigation with the support of external cybersecurity specialists and legal advisors. We take this matter very seriously and are currently conducting a thorough investigation to determine the full scope of the incident and its potential impact on customers, which includes participants of the European Commission’s DiscoverEU action.

The investigation is still ongoing. Our early review suggests that the data involved may include customer order and reservation information, including basic identity and contact details. Where provided, it might also include your passport information, like passport number, country of issuance or expiry date. As a standard procedure, if you purchased your Pass from Eurail B.V. we do not store a visual copy of your passport. For customers who received a Pass as part of the DiscoverEU programme, please refer to this statement.

The ongoing investigation will need to provide more information about the precise categories of personal data which are involved and to what extent personal data has also been copied from our customer database. There is currently no evidence that the data has been misused or publicly disclosed. This is consistently being monitored by external cybersecurity specialists.

The incident has been reported to the data protection authority in line with European Union GDPR requirements, and we are in the process of notifying all other relevant data protection authorities outside of the EU (as required by law).

Customers whose data may have been accessed will be informed directly. We take the security of our customers’ information seriously and regret any concern this incident may cause.

For customer questions, please refer to the FAQs available via Eurail’s customer support centre, or contact [email protected]


Related:

  • U.K. Citizen Extradited and Pleads Guilty to Cyber Crime Offenses
  • Jones Day disputes claimed breach; points to hacked vendor; hacker points back to them (UPDATE2)
  • Attorney General James and DFS Superintendent Harris Secure $11.3 Million from Auto Insurance Companies over Data Breaches
  • The Jones Day dump contains prescription drug records. Who's notifying those patients of the breach?
  • A 2020 Data Breach That Continues To Remain An Unsolved Mystery
Category: Business SectorHack

Post navigation

← Victorian Department of Education says hackers stole students’ data
Data protection agency tells Coupang to stop publishing unconfirmed information about data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.