Thursday, March 27, 2025
HomeCyber AttackCathay Pacific Hacked - More Than 9.4 Million Passengers Affected

Cathay Pacific Hacked – More Than 9.4 Million Passengers Affected

Published on

SIEM as a Service

Follow Us on Google News

Cathay Pacific limited suffered a major data breach that affected more than 9.4 million passengers personal data.

According to Cathay Pacific, the following data are details accessed by hackers such as passenger name, nationality, date of birth, phone number, email, address, passport number, identity card number, frequent flyer programme membership number, customer service remarks, and historical travel information.

Cathay Pacific detected the suspicious activity on their network in March this year and the Unauthorised access was confirmed in early May.

Cathay Pacific – Financial Data

The company confirms that attackers accessed 403 expired credit card numbers and 27 credit card numbers with no CVV were accessed. No-one’s travel or loyalty profile was accessed in full, and no passwords were compromised.

“We have no evidence that any personal information has been misused. However, in an abundance of caution, we have taken the decision to notify everyone we believe may have been affected.” reads breach report.

Also, the company confirms there is no evidence of data misuse still date, but these exposed data can be used by attackers to launch targeted attacks.

Cathay Pacific Airways Limited is the flag carrier of Hong Kong, it’s a biggest international carrier and the main hub located at Hong Kong International Airport.

British Airways disclosed security breach last September, attackers stole personal and financial details of 380,000 customers who made the booking through the website ba.com and mobile app.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

CodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL Repositories

A recent discovery has revealed a potential supply chain attack vulnerability in GitHub's CodeQL...

Exim Use-After-Free Vulnerability Enables Privilege Escalation

A significant security threat has been uncovered in Exim, a popular open-source mail transfer...

OpenAI Offers Up to $100,000 for Critical Infrastructure Vulnerability Reports

OpenAI has announced major updates to its cybersecurity initiatives. The company is expanding its...

Splunk RCE Vulnerability Enables Remote Code Execution via File Upload

A severe vulnerability in Splunk Enterprise and Splunk Cloud Platform has been identified, allowing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL Repositories

A recent discovery has revealed a potential supply chain attack vulnerability in GitHub's CodeQL...

Exim Use-After-Free Vulnerability Enables Privilege Escalation

A significant security threat has been uncovered in Exim, a popular open-source mail transfer...

OpenAI Offers Up to $100,000 for Critical Infrastructure Vulnerability Reports

OpenAI has announced major updates to its cybersecurity initiatives. The company is expanding its...