Key Facts: BookMyForex Data Breach
- Date reported: February 25, 2026.
- Unauthorized access identified: February 24, 2026.
- Target entity: BookMyForex (bookmyforex.com) in partnership with Yes Bank.
- Source of breach: Unknown (unauthorized third-party).
- Data types: Customer card data, including card numbers, expiry dates, and CVVs.
- Status: Disputed/Confirmed; while BookMyForex denied a breach of its internal systems, Yes Bank confirmed unauthorized transactions affecting 5,000 customers.
- Severity: Medium; the incident resulted in approximately ₹2.55 crore in fraudulent charges across international merchants.
Start continuous breach monitoring with UpGuard.
What happened in the BookMyForex data breach?
BookMyForex (bookmyforex.com) was the subject of security reports on February 25, 2026, involving a potential hack of sensitive financial information. While third-party reports suggested a data breach involving multi-currency cards issued with Yes Bank, the company has officially denied any compromise of its internal systems or customer data. The incident was categorized with low severity because the organization maintains that no unauthorized access occurred, despite Yes Bank identifying unusual transaction attempts on certain accounts.
The reports indicated that hackers might have accessed sensitive card details, leading to unauthorized transactions. BookMyForex emphasized that customer funds remain secure and that real-time fraud monitoring is being prioritized to address the reports. While the company denies a direct breach, incidents involving financial services often carry risks of credential abuse or targeted phishing campaigns aimed at cardholders.
Who is behind the incident?
The attacker or cause of the incident has not been identified.
Impact and risks for BookMyForex customers
For customers of BookMyForex, the primary risk involves potential unauthorized transactions or phishing attempts if card details were indeed compromised. Even with the company's denial, individuals should be wary of identity theft or credential abuse. If sensitive financial data is exposed, attackers may attempt to use it for fraudulent purchases or to gain access to other linked financial accounts.
Typical outcomes of such reports include increased scrutiny of account activity and a temporary loss of consumer trust. To mitigate these risks, users should regularly monitor their transaction history and update security settings on their accounts. Transparency from financial service providers is essential for maintaining security and ensuring that users can take timely protective actions.
How to protect against similar security incidents
Scan your domain for vulnerabilities in minutes
Frequently asked questions
What happened in the BookMyForex security breach?
On February 25, 2026, reports surfaced of large-scale fraud affecting BookMyForex multi-currency cards issued in partnership with Yes Bank. While BookMyForex maintains that its own internal systems were not breached, Yes Bank confirmed unusual transaction attempts on certain accounts
What data was exposed?
The types of data involved in the BookMyForex incident have not been disclosed.
Is my personal information at risk?
If you interacted with BookMyForex, there's a possibility your personal information could be affected. Similar incidents often involve email addresses, login details, or financial records. Stay alert for updates and take precautionary measures to secure your accounts.
How can I protect myself after this data breach?
- Change your account passwords immediately.
- Enable multi-factor authentication (MFA) where available.
- Monitor your financial accounts for unauthorized activity.
- Be vigilant against phishing emails or texts.
- Use data breach monitoring tools to stay informed.
- Ensure you receive real-time SMS or email alerts for every transaction, no matter how small.
What steps should companies take after being impacted by this breach?
BookMyForex is expected to secure its systems, notify any affected parties, and provide guidance on protective actions. Organizations in this situation typically review their security measures and deploy attack surface management to detect and remediate vulnerabilities.
.jpg)
.jpg)
.jpg)
.jpg)
.jpg)
.jpg)