Thursday, February 27, 2025
HomeData BreachAustralian Airport Hacked: Significant Amount of Security Data Stolen by Vietnamese Hacker

Australian Airport Hacked: Significant Amount of Security Data Stolen by Vietnamese Hacker

Published on

SIEM as a Service

Follow Us on Google News

A Vietnamese hacker penetrates into Perth Airport’s computer system’s and stole sensitive details such as building plans and security details.

Authorities revealed the hacker name, Le Duc Hoang Hai aged 31 used third party contractor credentials to get access into the systems in last year March.

Airport Authorities identified the intrusion and reported Australian Cyber Security Centre and the hack was traced to Vietnam and the Australian Federal Police tipped off counterparts in Vietnam.

As a result Hai was convicted in Vietnam military court and sentenced to four years jail last week. Hai also involved in hacking website, infrastructures and banks in Vietnam. Reported the west Australian.

Mr MacGibbon described the hack as a “near miss”, Hai have accessed sensitive material, but he didn’t stolen any personal details of employees.

Also Read Boeing 757 Airplanes are Vulnerable to Remote Hacking

Perth Airport chief executive Kevin Brown said it appeared the man had been attempting to steal credit card data. “We finished a full and exhaustive hazard evaluation of the information that had been gotten to guarantee there had been no threat to the safety of the travelling public,” he said.

“At no time was the safety or security of the airport, its staff, passengers or partners compromised,At no time was the safety or security of the airport, its staff, passengers or partners compromised” he added.

Now Perth Airport invested another $2 million in additional security measures.

Last month a critical vulnerability detected in Boeing 757 which allows remote code execution.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

US Employee Background Check Firm Hacked, 3 Million Records Exposed

DISA Global Solutions, a Houston-based provider of employee background checks and workplace safety services,...