British Airways data breach bigger than originally thought

Back in September, British Airways announced that they had experienced a data breach. After a lengthy investigation carried out by third-party cybersecurity threat responders and the National Crime Agency, it was determined that the breach is far larger than originally thought. In an updated statement on their website, British Airways had this to say:

The investigation has shown the hackers may have stolen additional personal data and we are notifying the holders of 77,000 payment cards, not previously notified, that the name, billing address, email address, card payment information, including card number, expiry date and CVV have potentially been compromised, and a further 108,000 without CVV. The potentially impacted customers were those only making reward bookings between April 21 and July 28, 2018, and who used a payment card.

The company insists that there are no instances of known fraud that can be attributed to the data breach. It should be noted that this does not mean fraud hasn’t happened, it just means it has yet to be recognized and reported via official channels. British Airways has also stated that they are meticulously notifying all potential victims in their customer base and instructing them to stay in contact with their bank or credit card provider to stay informed. In a rather generous act, the company has also promised reimbursement to any customer negatively impacted by the breach.

As important as it is to understand the impact of the British Airways data breach, it is also imperative to understand what and/or who caused the breach in the first place. In an interview with Kaspersky Lab’s Threatpost, Yonathan Klijnsma, a threat researcher with RiskIQ, attributed it to the infamous Magecart cybergang:

Magecart since 2017 has been running a campaign very similar to what happened to British Airways... They’ve been setting up infrastructure to mimic victims or they would simply mimic ad or analytics providers to blend in. The British Airways attack was just an extension of that attack in our eyes.

While this does sound like Magecart’s modus operandi, it is also important to note that Klijnsma only had “medium-high confidence” of their involvement. All leads should be pursued until we can absolutely be certain that the notorious Magecart is the culprit (which is without a doubt a major possibility). In the meantime, all customers affected by the British Airways data breach should be aware of their finances even more so than usual and take advantage of the services that British Airways is providing to rectify the situation.

Featured image: Flickr / Bill Wilt

Derek Kortepeter

Derek Kortepeter is a graduate of UCLA and tech journalist that is committed to creating an informed society with regards to Information Security. Kortepeter specializes in areas such as penetration testing, cryptography, cyber warfare, and governmental InfoSec policy.

Published by
Derek Kortepeter

Recent Posts

Diebold Nixdorf ATMs targeted by jackpotting attacks

ATM manufacturer Diebold Nixdorf says its European machines are being hit by jackpotting attacks, where…

13 hours ago

Allow a home computer to connect to your Azure SQL server/database

In these days where remote computing has become crucial, you can connect your home computer…

17 hours ago

Migrating to Microsoft 365? Get the ball rolling with a trial tenant

Many companies still using Exchange Server are thinking of moving to Microsoft 365. You can…

20 hours ago

wpDiscuz WordPress plugin: Critical vulnerability found and patched

Users of the wpDiscuz interactive comment WordPress plugin should implement a new patch as soon…

2 days ago

Data lifecycle management: Policies and procedures for security and compliance

With the amount of electronic information consistently growing, data lifecycle management is crucial for compliance…

2 days ago

Deploy Windows from the cloud to on-premises hardware? Yes, you can

Wouldn’t it be nice if you could deploy Windows from the cloud while sipping an…

5 days ago