Wednesday, July 24, 2024
EHA

British Airways Hacked – More than 380,000 Payment Cards Compromised

British Airways Hacked, customers who made the booking through the website or mobile app from August 21, 2018, to September 5, 2018, are affected.

The attackers stole personal and financial details of 380,000 customers who made the booking through the website ba.com and mobile app.

https://twitter.com/British_Airways/status/1037755174700417025

British Airways confirmed that travel details, passport details, and stored payment card details are not affected.

British Airways spokesperson said “a third-party noticed some unusual activity and informed us about it. We immediately acted to close down the issue, and started an investigation as a matter of urgency.”

BA said that breach has been resolved now and the website is working normally now and they reported to the relevant authorities.

Also, the company started to email customers who could potentially be affected by this issue and BA requested the reset the ba.com account passwords.

“The incident has been resolved and ba.com is working normally so future bookings will not be affected, all customers booked on our flights will be able to check in as normal.” reads the company statement.

Last month a similar incident happened with Air Canada, as the attackers gained access to the mobile App and accessed more than 20,000 user accounts without proper authorization.

Also Read

Hackers Selling Airport Security System Credentials on Dark Web for $10

Australian Airport Hacked: Significant Amount of Security Data Stolen by Vietnamese Hacker

Boeing 757 Airplanes are Vulnerable to Remote Hacking

Website

Latest articles

ShadowRoot Ransomware Attacking Organizations With Weaponized PDF Documents

A rudimentary ransomware targets Turkish businesses through phishing emails with ".ru" domain sender addresses....

BreachForumsV1 Database Leaked: Private messages, Emails & IP Exposed

BreachForumsV1, a notorious online platform for facilitating illegal activities, has reportedly suffered a massive...

250 Million Hamster Kombat Players Targeted Via Android And Windows Malware

Despite having simple gameplay, the new Telegram clicker game Hamster Kombat has become very...

Beware Of Malicious Python Packages That Steal Users Sensitive Data

Malicious Python packages uploaded by "dsfsdfds" to PyPI infiltrated user systems by exfiltrating sensitive...

Chinese Hackers Using Shared Framework To Create Multi-Platform Malware

Shared frameworks are often prone to hackers' abuses as they have been built into...

BlueStacks Emulator For Windows Flaw Exposes Millions Of Gamers To Attack

A significant vulnerability was discovered in BlueStacks, the world's fastest Android emulator and cloud...

Google Chrome 127 Released with a fix for 24 Security Vulnerabilities

Google has unveiled the latest version of its Chrome browser, Chrome 127, which is...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles