British Airways will be hit with a record fine under the General Data Protection Regulation for a security incident that led to the compromise of about 500,000 customers' personal data.
The Information Commissioner's Office (ICO), the independent GDPR investigator for the U.K., announced its intention to levy a fine of nearly $230 million -- 183.39 million euros -- due to the British Airways security incident, which took place during the summer of 2018.
While ICO described the British Airways security incident as a breach, threat actors did not obtain the customer data through access to the airline's network, according to RiskIQ's research.
British Airways said the attacks occurred between Aug. 21, 2018, and Sept. 5, 2018, but the ICO said the incident was "believed to have begun in June 2018." Investigators found customer data, including names, addresses, login credentials, payment card data and travel booking details, was compromised in the incident.
Information Commissioner Elizabeth Denham said in a statement that it is "more than an inconvenience" when an organization fails to protect customer data.
"That's why the law is clear -- when you are entrusted with personal data, you must look after it," Denham said. "Those that don't will face scrutiny from my office to check they have taken appropriate steps to protect fundamental privacy rights."
The ICO credited British Airways with cooperating with the investigation and improving security, and the ICO reserved the right to change its final decision after considering "the representations made by the company and the other concerned data protection authorities."
The British Airways security incident
Although it has been made publicly known how threat actors were able to steal customer data in this incident, it is still unknown how they were able to access British Airways' systems in order to launch the attacks.
Matan Or-El, co-founder and CEO of third-party security management vendor Panorays, based in New York, said the lack of transparency regarding how attackers were able to access British Airways' systems "is doing a disservice to the discussion around the fine and whether it's justified or not."
"Oddly enough, nobody has published clear details about the incident, so it's not clear what exactly happened. It will be difficult to turn this into a learning experience for everyone if more details are not disclosed," Or-El said. "The amount of the fine is unprecedented. It will be very interesting to see how it's appealed and whether the fine will remain. The more transparent the ICO will be regarding their rationale and reasons for the high amount, the better it will be for discussion."
Or-El said the threat actors would have needed to be able to replace certain files on the British Airways website in order to implant the poisoned library as described by the RiskIQ analysis.
Matan Or-ElCo-founder and CEO, Panorays
Ido Safruti, CTO and co-founder of web application security vendor PerimeterX, based in San Mateo, Calif., said the available details made it seem as though the code was "served and verified by the original site and on the official mobile application."
Alex Calic, strategic technology partnerships officer for The Media Trust, based in McLean, Va., suggested the British Airways security incident was likely the result of a cross-site scripting (XSS) attack, although this has not been confirmed.
"[The threat actors] identified a poorly secured component in their web application and used it to inject the malicious code," Calic said. "On the one hand, [British Airways is] expected to remain relatively tight-lipped about how they might have contributed. On the other, an admission would shed more light on XSS' popularity as a method of attack among bad actors and the surprising large number of web applications that remain vulnerable to it."
Protection against similar attacks
Experts roundly agreed there might not be much customers could do to protect themselves against attacks like this. Kolochenko said breaches like this could be "totally invisible from the outside."
Experts also agreed enterprises should be continuously testing the security of web applications in order to identify any changes or vulnerabilities that may arise, scan for unauthorized code and inspect any third-party code being used.