Chinese Hackers Attacked EasyJet

The recent high-profile cyber attack that struck British budget EasyJet may have been carried out by Chinese hackers, new research and multiple sources suggest.

EasyJet has disclosed that a "highly sophisticated cyber-attack" has affected approximately nine million customers admitting that email addresses and travel details had been stolen and that 2,208 customers had also had their credit and debit card details "accessed".

The cyber-attack, which saw the email addresses and travel details as well as the credit card details of more than 2,000 customers, was reportedly conducted by the same Chinese hackers responsible for other attacks on a number of airlines .

“We would like to apologise to those customers who have been affected by this incident,” said EasyJet’s CEO, Johan Lundgren.“As a result, and on the recommendation of the ICO, we are contacting those customers whose travel information was accessed and we are advising them to be extra vigilant, particularly if they receive unsolicited communications,” he told reporters. There is little information available about the identity of the alleged Chinese hackers behind the attack and Chinese official sources ahave declined to answer questions on the subject.  

Anonymous sources who spoke to Reuters, said the hacking tools and techniques used in the cyber-attack incident pointed to a group of Chinese hackers as the culprits and this unnamed group reportedly has an alleged record carrying out malicious cyber-attacks on airline companies. Other sources are reported to have said that the attack appeared to be part of a series by suspected Chinese hackers aimed at the bulk theft of travel records and other data. It is claimed that the hackers have in the past been reponsible for targeting the travel data in order to track the movement of specific individuals, suggestiing espionage as the motive, rather than ransom or fraid.

The hacking tools and techniques used appear similar those used in previous security breach incidents involving other airlines, allowed the Chinese hackers to steal data belonging to some 9 million EasyJet customers. In response to the cyber-attack incident, EasyJet has begun an investigation with the suggestion that the Chinese hackers had been targeting intellectual property, as opposed to data that would assist in identity theft.

The airlines's investigation’s preliminary findings support the claim that the hackers did indeed have a motive for the attack that was more than mere financial gain.

The airline has said that it will have contacted all affected customers by May 26, and that it is advising all users to be wary of phishing attacks in the wake of this security breach.

ICO Investigation

Aside from EasyJet’s internal investigation into the incident, another investigation is being carried out simultaneously, this time by the UK’s Information Commissioner’s Office (ICO) to determine whether the airline itself had not properly protected the personal data of its customers. 

The ICO investigation will likely result in EasyJet facing a heavy fine for the data breach having occurred in the first place, similar fines previusly exacted from both British Airways and Cathay Pacific.

British Airways is in the process of appealing against a £183m penalty that it received from the ICO in 2019 after cyber criminals stole the credit card details of hundreds of thousands of its customers the year before.

Data Stolen by Chinese Hackers

Because of the lack of information the attack itself and the precise motives of the Chinese hackers behind it; it is unknown how the personal information stolen might ultimately be used. According to the UK cyber security firm CybSafe, customers whose personal data has been stolen are most likely to experience targeted phishing attacks or other attempts of fraud. 

Whilst that attack took place in January that airline did not inform the affected customers until 4 minths later, raising widespread criticism of EasyJet's handling of the attack and one consquence is the the formation of a potenial £18 billion legal claim againts the airline.  

Information Commisioner's Office:         CP Magazine:     Reuters:       Security Boulevard:        BBC:  

You Might Also Read:

The BA Hack And How Not To Respond To A Cyber Attack:

Travelex Slowly Recovering From Ransomware Attack:

 

« The History Of The Internet And Its Possible Future
Covid-19 Is Working Well For Criminals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

authen2cate

authen2cate

authen2cate is a single-sign-on (SSO) and multi-factor authentication service provider.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Eperi

Eperi

Eperi is a leading provider of Cloud Data Protection (CDP) solutions with 15 years of experience in data encryption for databases, (SaaS) applications and files.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

BrandShield

BrandShield

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

TryHackMe

TryHackMe

TryHackMe is an online platform that teaches cyber security through short, gamified real-world labs. We have content for both complete beginners and seasoned hackers.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.