British Airways Customer Data Stolen

British Airways are investigating the theft of customer data from its website and mobile app. The stolen data did not include travel or passport details.

 

From 22:58 BST August 21 2018 until 21:45 BST September 5 2018 inclusive, the personal and financial details of customers making or changing bookings on the website and app were compromised.

The breach has been resolved and their website is working normally. They have notified the police and relevant authorities.

The personal and financial details of customers making or changing bookings on ba.com and the airline’s mobile app were compromised. No passport or travel details were stolen.

BA says the hackers stole names, email addresses and credit card information – that would be the credit card number, expiration date and the three digit CVV code on the back of the credit card.  BA insists it did not store the CVC numbers. Security researchers are now speculating the card details were intercepted, as opposed to being harvested from a BA database.

If you’ve been affected, you should change your online passwords. Then monitor your bank and credit card accounts keeping an eye out for any unwanted transactions.

Further details – https://www.britishairways.com/en-gb/information/incident/data-theft/latest-information?dr=&dt=British%20Airways&tier=&scheme=&logintype=public&audience=travel&CUSTSEG=&GGLMember=&ban=%7C%7CP1M%7C%7C%7C%7C%7C%7C%7CHOME%7C%7C%7C%7CL4%7C%7C%7C%7Canonymous-inspiration%7C%7C%7C&KMtag=c&KMver=1.0&clickpage=HOME



Duncan is a technology professional with over 20 years experience of working in various IT roles. He also has a wide range of other skills in radio, electronics and telecommunications.

Duncan Newell

Duncan is a technology professional with over 20 years experience of working in various IT roles. He also has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: