Tuesday, February 25, 2025
HomeSecurity UpdatesBritish Airways Facing £183.39 Million Fine Under GDPR for 2018 Data Breach

British Airways Facing £183.39 Million Fine Under GDPR for 2018 Data Breach

Published on

SIEM as a Service

Follow Us on Google News

British Airways fined over £183 Million under the General Data Protection Regulation (GDPR) from the Information Commissioner’s Office (ICO) for 2018 data breach.

The cyber incidents believed to be started in June 2018 and the notice was issued in September 2018 by British Airways, meantime, the customers who made the booking through the website or mobile app were potentially affected.

During this cyber attack, the customers who have accessed the British Airways website being diverted to a fraudulent website where hackers stole the personal data of approximately 500,000 customers.

Based on the ICO investigation report, a huge data was compromised by poor security arrangements at the company and the stolen date including login, payment card, and travel booking details as well name and address information.

British Airways spokesperson told during the investigation “a third-party noticed some unusual activity and informed us about it. We immediately acted to close down the issue, and started an investigation as a matter of urgency.”

Since the General Data Protection Regulation (GDPR) applied on 25 May 2018, this new law applies to all companies that collect and process data belonging to the European Union (EU) citizens.

Read: Key Elements and Important Steps to General Data Protection Regulation (GDPR)

ICO has the capability to impose up to 4% of fine to the company global turnover. In this case, the fine was just 1.4 of British Airways 2017 turnover.

According to Information Commissioner Elizabeth Denham said: “People’s personal data is just that – personal. When an organisation fails to protect it from loss, damage or theft it is more than an inconvenience. That’s why the law is clear – when you are entrusted with personal data you must look after it. Those that don’t will face scrutiny from my office to check they have taken appropriate steps to protect fundamental privacy rights.”

Nik Whitfield, CEO of cybersecurity firm Panaseer said the proposed BA fine is “game-changing” for any company serving EU customers and “great news” for consumers’ privacy.

British Airways and the other regulators now have 28 days to make the decision to reduce the fine.

“British Airways has completely cooperated with the ICO investigation and has made improvements to its security arrangements since these events came to light”, the ICO said.

This case was thoroughly investigated by a lead supervisory authority on behalf of other EU Member State data protection authorities and takes its final decision.

It is worth to mention that” “On 21st January 2019, France’s data-privacy watchdog, The CNIL imposed a financial penalty of 50 Million Euros against the company GOOGLE LLC  for “lack of transparency, inadequate information and lack of valid consent regarding the ads personalization”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

Microsoft Urges Windows Admins to Patch Microsoft Message Queuing RCE Flaw

Microsoft has disclosed two Critical remote code execution vulnerabilities in MSMQ (Microsoft Message Queuing)...

Microsoft Unveild New Windows 11 Features To Strengthen Security

Microsoft has been prioritizing security in Windows, as they introduced Secured-Core PCs to protect...