Chinese Hackers Attacked EasyJet

The recent high-profile cyber attack that struck British budget EasyJet may have been carried out by Chinese hackers, new research and multiple sources suggest.

EasyJet has disclosed that a "highly sophisticated cyber-attack" has affected approximately nine million customers admitting that email addresses and travel details had been stolen and that 2,208 customers had also had their credit and debit card details "accessed".

The cyber-attack, which saw the email addresses and travel details as well as the credit card details of more than 2,000 customers, was reportedly conducted by the same Chinese hackers responsible for other attacks on a number of airlines .

“We would like to apologise to those customers who have been affected by this incident,” said EasyJet’s CEO, Johan Lundgren.“As a result, and on the recommendation of the ICO, we are contacting those customers whose travel information was accessed and we are advising them to be extra vigilant, particularly if they receive unsolicited communications,” he told reporters. There is little information available about the identity of the alleged Chinese hackers behind the attack and Chinese official sources ahave declined to answer questions on the subject.  

Anonymous sources who spoke to Reuters, said the hacking tools and techniques used in the cyber-attack incident pointed to a group of Chinese hackers as the culprits and this unnamed group reportedly has an alleged record carrying out malicious cyber-attacks on airline companies. Other sources are reported to have said that the attack appeared to be part of a series by suspected Chinese hackers aimed at the bulk theft of travel records and other data. It is claimed that the hackers have in the past been reponsible for targeting the travel data in order to track the movement of specific individuals, suggestiing espionage as the motive, rather than ransom or fraid.

The hacking tools and techniques used appear similar those used in previous security breach incidents involving other airlines, allowed the Chinese hackers to steal data belonging to some 9 million EasyJet customers. In response to the cyber-attack incident, EasyJet has begun an investigation with the suggestion that the Chinese hackers had been targeting intellectual property, as opposed to data that would assist in identity theft.

The airlines's investigation’s preliminary findings support the claim that the hackers did indeed have a motive for the attack that was more than mere financial gain.

The airline has said that it will have contacted all affected customers by May 26, and that it is advising all users to be wary of phishing attacks in the wake of this security breach.

ICO Investigation

Aside from EasyJet’s internal investigation into the incident, another investigation is being carried out simultaneously, this time by the UK’s Information Commissioner’s Office (ICO) to determine whether the airline itself had not properly protected the personal data of its customers. 

The ICO investigation will likely result in EasyJet facing a heavy fine for the data breach having occurred in the first place, similar fines previusly exacted from both British Airways and Cathay Pacific.

British Airways is in the process of appealing against a £183m penalty that it received from the ICO in 2019 after cyber criminals stole the credit card details of hundreds of thousands of its customers the year before.

Data Stolen by Chinese Hackers

Because of the lack of information the attack itself and the precise motives of the Chinese hackers behind it; it is unknown how the personal information stolen might ultimately be used. According to the UK cyber security firm CybSafe, customers whose personal data has been stolen are most likely to experience targeted phishing attacks or other attempts of fraud. 

Whilst that attack took place in January that airline did not inform the affected customers until 4 minths later, raising widespread criticism of EasyJet's handling of the attack and one consquence is the the formation of a potenial £18 billion legal claim againts the airline.  

Information Commisioner's Office:         CP Magazine:     Reuters:       Security Boulevard:        BBC:  

You Might Also Read:

The BA Hack And How Not To Respond To A Cyber Attack:

Travelex Slowly Recovering From Ransomware Attack:

 

« The History Of The Internet And Its Possible Future
Covid-19 Is Working Well For Criminals »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.