• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Air India: Supplier Breach Hit 4.5 Million Passengers

You are here: Home / General Cyber Security News / Air India: Supplier Breach Hit 4.5 Million Passengers
May 24, 2021

Air India has confirmed that 4.5 million passengers have had their personal data exposed in a 3rd-party info breach first disclosed in excess of two months in the past.

The incident impacted SITA, an IT supplier which promises to serve close to 90% of the aviation field. Attackers compromised servers that function passenger processing devices for airline customers.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Air India mentioned it to start with acquired phrase of the attack on February 25 this 12 months, but was unable to verify individuals influenced until SITA informed it on 25 March and 5 April.

“The breach involved personal information registered between August 26 2011 and February 3 2021, with specifics that incorporated identify, day of delivery, call information and facts, passport information, ticket information and facts, Star Alliance and Air India frequent flyer info (but no passwords info have been impacted) as properly as credit card data,” the assertion noted.

“However, in respect of this past type of facts, CVV/CVC quantities are not held by our information processor.”

Air India claimed that, pursuing the incident, the impacted servers ended up secured, external investigators engaged, credit rating card issuers were being notified and recurrent flyer passwords ended up reset.

“Further, our data processor has ensured that no irregular action was observed soon after securing the compromised servers,” it added.

“While we and our facts processor keep on to consider remedial actions which include but not confined to the earlier mentioned, we would also persuade travellers to improve passwords anywhere relevant to assure safety of their personalized details.”

Finnair, Malaysia Airways, Japan Airlines and Singapore Airways ended up among the the other massive names affected by the breach.

Whilst Singapore Airways claimed it was not a customer of SITA’s, some of its frequent flyer information was apparently compromised by means of a fellow Star Alliance member that was.

This is not the initially information security incident to have influenced Air India. Back again in 2016 a possible insider attack was detected in which risk actors sought to divert about $23,000 in air miles.


Some parts of this short article are sourced from:
www.infosecurity-journal.com

Previous Post: «air india cyber attack exposes 4.5 million customers’ data Air India cyber attack exposes 4.5 million customers’ data
Next Post: Amex Fined After Sending Over Four Million Spam Emails Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.