Norwegian Cruise Line experiences data breach of travel agents records

Unfortunately for people impacted by the COVID-19 pandemic, cybersecurity breaches are one thing that has not ceased. Hackers, if anything, are more motivated than ever to take advantage of networks that might be more at-risk due to stay-at-home orders, and additionally, preying upon people’s fears to create phishing emails loaded with malware. It is this reality that the Norwegian Cruise Line is now uncovering thanks to research done by DynaRisk.

In a blog post on its website, DynaRisk has detailed a data breach that has made its way to the Dark Web:

On 13 March 2020, DynaRisk’s intelligence team discovered a breached database belonging to Norwegian Cruise Line. After verifying that the data records are legitimate credentials, we notified a Norwegian Cruise Line representative immediately. Despite opening our message later that day, we received no response. After five days a representative responded to our team to discuss the breach; as yet, we do not know if the travel agents on the list have been notified of the breach.

The information in question was found on hacking forums that are often used to propagate stolen data. The data specifically consists of clear-text passwords and email addresses belonging to 27,000 travel agents, many of whom are affiliated with major companies like TUI and Virgin Holidays. The data in question is used by travel agents to log-in to the agents.ncl.eu website, which acts as a portal for Norwegian Cruise Line.

As DynaRisk notes, with the travel industry at a standstill during the coronavirus outbreak, travel agents, in particular, are at a higher risk of cyberattacks. Researchers specifically state this is due to them being “exposed to account takeovers on numerous platforms, sophisticated phishing emails, and fraud which could put further pressure on large travel agents or worse still, put smaller agents out of business.” This incident with Norwegian Cruise Line is hardly an isolated incident.

Things are going to be this way for a while, so it is up to security professionals to keep the public informed. Additionally, travel industry professionals should be on high alert and on the lookout for any nefarious schemes.

Featured image: Flickr / Roel Hemkes

Derek Kortepeter

Derek Kortepeter is a graduate of UCLA and tech journalist that is committed to creating an informed society with regards to Information Security. Kortepeter specializes in areas such as penetration testing, cryptography, cyber warfare, and governmental InfoSec policy.

Share
Published by
Derek Kortepeter

Recent Posts

Dell unveils new PCs optimized for remote work

With remote work here to stay, companies are looking to supply employees with devices to…

3 hours ago

Using Azure Active Directory Identity Protection to boost your security

Using Azure Active Directory Identity Protection will boost your security. This step-by-step guide shows you…

20 hours ago

Review: Kemp Virtual LoadMaster load balancer

With many businesses requiring employees to work remotely, Kemp’s Virtual LoadMaster can help relieve many…

24 hours ago

Microsoft warns of COVID-19-related spear-phishing campaign

COVID-19 is not going away anytime soon, and as Microsoft researchers have discovered, neither are…

1 day ago

Ansible: Introduction to this open-source automation platform

In this first of several articles on Ansible, we give you a high-level overview of…

2 days ago

Microsoft Build 2020: All the major announcements

Microsoft Build 2020 may have been a virtual event, but there was some real news,…

2 days ago