News broke late last night that 380,000 sets of critical information from BA customers had been stolen. The airline said personal and financial details of customers making bookings had been compromised. BA said the breach took place between 22:58 BST on 21 August and 21:45 BST on 5 September. IT security experts commented below.
Mayur Upadhyaya, Managing Director, EMEA at Janrain:
Randhir Shinde, CEO at Galaxkey:
“The real danger here is not the stolen financial information and assets. These losses will be compensated. The bigger issue is that their personal information may have been compromised. Names, addresses and email addresses may not sound threatening, however this information can be the first step for hackers. The details allow them to enter email accounts, social media and ultimately do harm. All of us – businesses and individuals – have an interest in doing everything we can to protect data.”
Lewis Henderson, VP of Threat Intelligence at Glasswall Solutions:
There is also another side to encryption, as it is a powerful tool for malicious actors and not just used for protecting data. What we are discovering is that attackers are using encryption not simply to deliver malware payloads in documents, but to also hide what they’re doing whilst inside a network – it is the ultimate stealth tactic as they are rendered invisible.
This explains why it has probably taken British Airways some time to discover the breach was even happening. It’s entirely possible that the British Airways attackers were siphoning off significant quantities of sensitive data for weeks or months, whilst BA had no indication of their presence – this again supports the theory it was interception of data, and not a ‘smash’n’grab’ style of breach.
The other danger from encrypted payloads is it means attackers can use old malicious malware and walk in with it through the front door, and if they encounter unpatched machines then its game over.
The Cyber Security industry needs to stop interpreting the word ‘encrypted’ as ‘secure’, because it can no longer be explicitly trusted when malicious actors are using it as one of their key tactics. How these attackers are gaining entry, their tactics once inside, and how they exfiltrate data all involves encryption – it needs a serious risk management overhaul.”
Dan Panesar, VP EMEA at Certes Networks:
The question being asked today is: was the stolen data encrypted? Encryption is a fundamental component of the defence in depth security model, but to be effective, encryption must enhance an organisations’ security posture, not constrain it.
This is where Layer 4 encryption comes in, which decouples encryption from the network. By encrypting data in motion and segmenting the network, even if the hackers are able to infiltrate the perimeter defences, using segmentation makes it harder for hackers to steal sensitive data, and encryption actually renders the sensitive data useless if it’s stolen.
Unfortunately, the increasing sophistication of cyber-attacks and the growing attack surface means that for any organisation with a world-wide recognised brand, it’s a question of when they’ll be breached, not if. By using encryption technology as a fundamental part of their security strategy, organisations can make sure their sensitive data is protected and keep it out of the waiting hands of the hackers. This then avoids the inevitable post-breach fallout and negative impact on a company’s brand, as seen with British Airways.”
Pravin Kothari, CEO at CipherCloud:
Paul Bischoff, Privacy Advocate at Comparitech.com:
“With British Airway’s disclosure of hackers carrying out a malicious attack on its website and mobile app and Air Canada suffering a similar fate just last week, there’s nothing like a fresh wave of data breaches to drive home the importance of the security of customer data.
Somewhat encouraging is the admission that the BA attack did not compromise travel or passport details, but it has still had a knock-on effect to BA’s share prices, which have dropped 4% since the disclosure. Comparitech.com yesterday published its own study that looks at share prices in relation to data breach disclosures and the effects are immediate and negative. It’s a stark reminder to companies that hold personal information on customers that hackers will come for them, the question is: are they ready?”
Timothy Bedard, Director of Product Marketing – TID Solutions at OneSpan:
The key lessons from the British Airlines breach are threefold – one, breaches will continue to fuel fraud, account takeover and application fraud; two, combined with poor password hygiene, fraud will continue to rise; and three, no password is safe; every password is vulnerable – so British Airwayscustomers, change your passwords today!”
Andre Stewart, VP EMEA at Netskope:
“That said, fear of financial penalties should not be the reasons for businesses to have solid data practices. The proliferation of cloud means more and more data is stored off-premise, and out of the control and protection of traditional security defences. Businesses need to take steps to secure sensitive customer data wherever it’s stored, building complete visibility and real-time control over data under their remit.”
Ronan David, VP, Strategy at Efficient IP:
The DNS protocol is recognised as one of the most discrete options for cyber criminals to carry out data exfiltration, as DNS traffic is typically not analysed. This ‘careless’ attitude makes it difficult to efficiently track with existing network inspection tools, especially considering the high volume of DNS traffic.
DNS exfiltration attacks are difficult to detect for legacy systems, and if the British Airways attack is indeed DNS exfiltration, it could give validity to Mr. Cruz’s claim that it was discovered as late as it was.Our Global DNS Threat Report shows 22% of transport organisations were vulnerable to DNS tunneling and exfiltration, showing a higher vulnerability to these attacks than other industries. It also showed that the transport industry was subject to more DNS-based attacks than any other in the last 12 months. In this day and age, companies must consider security solutions specifically for DNS in order to protect their infrastructure and stored customer data.”
Andy Norton, director of threat intelligence at Lastline:
James Hadley, CEO & Founder of Immersive Labs:
Brands that hold such personal and valuable data must do better at preventing cyber attacks and make sure their skills are contually tested, as these attacks are having a major impact on brand trust. Customers are increasingly taking their security and privacy into consideration as part of the buying cycle and will gravitate towards those they are comfortable with handling and looking after their personal information.”
Tim Mackey, Technical Evangelist at Synopsys:
Israel Barak, Chief Information Security Officer at Cybereason:
Tim Erlin, Vice President of Product Management and Strategy at Tripwire:
.
Jake Moore, Security Specialist at ESET:
If your data is included in this breach, you’ll need to take action to protect yourself. If you find your credit or debit card has been compromised consider the following:
- Call your bank or card issuer, cancel the card and request a new card. No bank will ever mind being contacted for you being cautious.
- You’ll also want to check your card statements for suspicious activity or purchases online – in particular small amounts just in case they are testing your card before a larger transaction is placed online. It also might be worth adding extra fraud alert security on your account.
- And it goes without saying change your BA.com password. After any breach of such velocity, it is always a good idea to change your passwords along with the same ones used on other websites.”
Bill Evans, Senior Director at One Identity:
it is heartening to note that BA is working with those individuals whose card payment information was breached as well as working with authorities all seemingly aligned to the recently enacted GDPR regulation.
While it’s far too early to tell how this latest breach occurred, usually these types of cybercrimes are the result of poorly managed privileged accounts which are the accounts that have access to most, if not all, IT systems. Protecting these accounts is perhaps the single most important security step any organization can take followed closely by multi-factor authentication and access governance.”
Gerald Beuchelt, CISO at LogMeIn:
Whilst the breach is still under investigation, it appears to have been a sophisticated infiltration of defences and not the airline’s encryption systems. This, paired with the fact that the attack went undetected for 15 days illustrates the need for organisations to adapt and update their security controls to keep up with the fast evolving threat landscape.
Customers should also mitigate any damage by changing their passwords to something unique across all accounts and turning on multi-factor authentication where possible. Individuals and businesses should also be extra vigilant to phishing emails, as attacks like this provide the perfect opportunity for scammers to use it to their advantage.”
Chris Boyd, Lead Malware Analyst at Malwarebytes: