CRITICAL SEVERITYTravel

ixigo Data Breach

ixigo Indian Travel & Booking Platform Breach (2019): 17 Million Customer Records Including Passport Numbers & Passwords Exposed

Indian travel and booking platform.

Verified by ObscureIQ Intelligence

8.5Severity
17.2MRecords
11Fields
2019Year

ObscureIQ Breach Intelligence Scores
10.0
Breach Risk Index
30
Data Value
25
Market Recency
406
days
Since Breach

Risk Interpretation

Exposure enables travel-themed phishing, fraud, and impersonation. Search and itinerary data can also reveal future travel intent and increase physical-security risk.

🎯 Impact & Downstream Threats

The institutional impact on ixigo has been moderate given the platform's prompt and substantive security response after initial denial. ixigo incurred costs associated with the comprehensive security overhaul, password reset across the entire user base, third-party security auditing, and reputational management within the Indian travel-platform sector. Civil litigation has been limited based on publicly available information. The reputational impact concentrated within the Indian online travel a

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Social media account targeting and impersonation

🔓 Threat Vectors

Session hijacking & account takeover
Device fingerprinting & targeted exploitation
Phishing, credential stuffing & account takeover
Name-based social engineering
Profile enrichment
International identity fraud & border exploitation
Credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Professional impersonation seeding
Account impersonation & social graph harvesting
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

Entityixigo
OrganizationPrivate Company • India
Breach Date2019-01-03
DBC Added2025-03-17
Added Date2025-03-17
Records~17.2M (17,241,350 records)
Attack VectorMisconfiguration
Threat ActorGnosticPlayers
Data SubjectsCustomer: Direct
Breach PathwayDirect
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityStandard
Breach ID716;717
StatusConfirmed

📝 Executive Summary

ixigo, a major India-based travel and hotel booking platform, suffered a data breach on approximately January 1, 2019 when an attacker affiliated with the GnosticPlayers hacker group exfiltrated approximately 7.23 gigabytes of user data from ixigo's systems. The breach was part of a broader GnosticPlayers attack series that compromised approximately 620 million records across sixteen websites globally, with some sources reporting up to 127 million records across eight websites in the specific tranche containing ixigo. The stolen data was offered for sale on the Dream Market dark-web marketplace beginning February 2019. ixigo founder Aloke Bajpai initially denied the breach when first reported on February 13, 2019, but subsequently acknowledged the incident following further verification.

The breach affected approximately 17.2 million unique user records based on records indexed by Have I Been Pwned and DataBreach.com, with some sources reporting up to 18 million records. Compromised fields included email addresses, full names, salutations, gender, phone numbers, social media profile linkages including Facebook URLs, IP addresses, device information, authentication tokens, usernames, and passwords stored as MD5 hashes. For a small subset of users who used ixigo for international travel booking, the dataset also included passport names and passport identification numbers. The MD5 password storage represents a deprecated cryptographic algorithm vulnerable to rapid brute-force cracking, and ixigo subsequently confirmed the use of MD5 and migrated to stronger hashing.

For affected users, the practical risk profile is significant due to the combination of credential exposure, authentication token exposure, and the inclusion of passport data for the international-travel subset. The MD5 password exposure means original password values are recoverable for many users, supporting credential-stuffing attacks against email, financial, and other Indian platforms where users may have reused the same password. The authentication token exposure may have permitted session hijacking and account takeover attacks during the period before ixigo reset all user passwords and tokens. For users whose passport information was included, the risk extends to international identity-fraud scenarios because passport numbers can support travel-document fraud, border-control identity exploitation, and synthetic-identity construction for opening financial accounts in jurisdictions that accept passport-based identity verification. Affected users should change any reused passwords immediately, enable two-factor authentication on important accounts, monitor financial accounts for unusual activity, and remain alert to travel-themed phishing referencing real ixigo booking history. Users whose passport information was exposed should consider notifying their passport-issuing authority and remaining alert to identity-document fraud over an extended timeframe given that passport numbers do not expire frequently.

🏢 About ixigo

ixigo is a major India-based travel and hotel booking platform headquartered in Gurugram, Haryana, founded in 2006 by co-founders Aloke Bajpai and Rajnish Kumar. The platform operates as an online travel marketplace at ixigo.com and through mobile applications, allowing users to compare and book flights, hotels, trains, cabs, and destinations across more than 120 travel suppliers and online travel agencies. ixigo claimed approximately 100 million users as of October 2018, making it one of India's largest travel-booking platforms. As an account-based travel marketplace, ixigo maintained substantial user account data including identity, contact information, demographic profile data, social media linkages used for sign-in, device information, authentication tokens, and travel-document information including passport details for international booking workflows.

Platform | Travel booking and planning | Online travel marketplace | India
Private CompanyIndiaixigo.com

🗂 Why They Hold Your Data

Travel-planning platforms collect user accounts, contact details, itineraries, search history, booking-linked data, and location or trip-planning behavior across travel services.

📰 Recent Developments

ixigo continues to operate as a major Indian travel platform. Following the January 2019 breach, ixigo founder Aloke Bajpai initially denied the breach claims on February 13, 2019, stating that the company was investigating and had not confirmed the incident. Following further verification by the security research community, ixigo subsequently acknowledged the breach and announced a substantial security response including resetting all user passwords, implementing two-factor authentication, encrypting all personally identifiable information in their databases, conducting regular external API and infrastructure audits by a third-party security firm, implementing perimeter controls, and isolating corporate infrastructure from production infrastructure. The breach was redistributed and indexed by DataBreach.com on March 17, 2025. ixigo has continued to expand its user base and platform capabilities since the 2019 incident without public disclosure of subsequent breaches.

🔍 Data Points Exposed

11 verified field types:
Email
Phone Number
Passport
Name;Auth tokens
Device information
Email
Genders
Names
Passwords
Phone numbers
Salutations
Social media profiles
Usernames

Exposure Categories

CredentialsPASSPORT

Canonical Fields

auth_token, device_information, email_address, full_name, gender, passport_number, password, phone_number, salutation, social_media_profile, username

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~17.2M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: ixigo-2019;ixigo Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of ixigo
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationTravelEmailPhonePasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom