Eurail, Europe’s well-known rail travel service that allows passengers to explore multiple countries using a single pass, has recently made headlines following a significant data breach. The company, popular among international tourists for its convenient and flexible train travel options, disclosed that it fell victim to a cyberattack that compromised the personal data of more than 300,000 travelers. Alarmingly, the breach also included highly sensitive information such as passport numbers, raising serious concerns about identity theft and data misuse.
According to an official statement released by the company Eurail BV (which markets Eurail exclusively), the cyberattack occurred in December 2025 but went undetected until January 2026.
This delay in detection prompted Eurail’s senior leadership to initiate a thorough and highly detailed investigation into the incident. Cybersecurity experts and forensic teams were reportedly brought in to assess the extent of the damage, identify vulnerabilities, and determine how the attackers were able to infiltrate the system without immediate detection.
As the investigation progressed, more troubling details emerged. Hackers were able to access and extract a wide range of personal and sensitive information. This included not only basic contact details such as names, email addresses, and phone numbers, but also more sensitive data such as home addresses, dates of birth, and financial information, including International Bank Account Numbers (IBANs). In addition, certain health-related data and copies of identification documents—such as password-linked ID records—were also compromised. The breadth of this data exposure has heightened concerns among affected individuals and privacy advocates alike.
Further disclosures revealed that the attackers did not simply steal the data but also attempted to extort the company. In an official report submitted by Eurail BV to the Oregon Department of Justice, it was stated that the hackers issued a ransom demand. They threatened to release portions of the stolen data on the dark web if their demands were not met. To amplify the pressure, the attackers allegedly promoted the stolen data through channels on Telegram, signaling their intent to publicize the breach and potentially sell the information.
Notifications sent to affected individuals, particularly those residing in U.S. states such as California, Texas, and Oregon, confirmed the scale of the breach. These communications indicated that approximately 1.3 terabytes of data had been exfiltrated. This massive dataset reportedly included not only customer information but also internal company assets such as source code, Zendesk customer support tickets, and extensive data backups.
The incident underscores the growing threat of cyberattacks targeting global travel and transportation companies, which often store vast amounts of personal data. It also highlights the importance of robust cybersecurity measures and rapid incident detection systems to prevent such breaches or minimize their impact.
