Iberia

Iberia

The Spanish flag carrier **Iberia** suffered a major **data breach** orchestrated by the Russian-linked cybercriminal group **Everest**. The attackers claim to have stolen **596 GB of sensitive data**, including **5 million passenger records** with **names, contact details, birthdates, travel/booking information, and masked credit card data**. Initially, Iberia acknowledged only the compromise of **frequent flyer program details (names, emails, and loyalty numbers)**, but Everest asserts the breach is far more extensive, involving **internal technical data for aircraft and engines** as well. The group, known for **financially motivated extortion**, has demanded a **ransom** in exchange for not leaking the stolen data. Everest previously disrupted **European airports** (e.g., Brussels, Heathrow, Berlin) via an attack on **Collins Aerospace’s MUSE check-in system**, causing flight cancellations. If leaked, the stolen passenger data could fuel **large-scale phishing scams**, tricking victims into revealing financial or personal information via **malware-laden links or fake airline websites**. Iberia has not confirmed the full scope of the breach, but the incident underscores the aviation sector’s growing vulnerability to **cyber extortion and data theft**.

Source: https://www.paddleyourownkanoo.com/2025/11/26/hackers-claim-iberia-data-breach-was-much-larger-than-previously-thought-with-millions-of-passengers-affected/

Iberia Express cybersecurity rating report: https://www.rankiteo.com/company/iberia-express

"id": "IBE26101526112625",
"linkid": "iberia-express",
"type": "Cyber Attack",
"date": "11/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': '5+ million (based on 5 million '
                                              'records in .eml files)',
                        'industry': 'Aviation',
                        'location': 'Madrid, Spain',
                        'name': 'Iberia',
                        'type': 'Airline'},
                       {'location': 'Global',
                        'name': 'Iberia Club members',
                        'type': 'Customer group'}],
 'attack_vector': ['Third-party software vulnerability (customer management '
                   'system)',
                   'Dark web extortion'],
 'customer_advisories': 'Passengers warned about potential phishing scams '
                        'using stolen data',
 'data_breach': {'data_exfiltration': 'Yes (596 GB of data, including 430 GB '
                                      'of .eml files)',
                 'file_types_exposed': ['.eml (email files)',
                                        'Technical documents (claimed)'],
                 'number_of_records_exposed': '5+ million (from .eml files)',
                 'personally_identifiable_information': ['Names',
                                                         'Email addresses',
                                                         'Birthdates',
                                                         'Frequent flyer '
                                                         'numbers',
                                                         'Contact details'],
                 'sensitivity_of_data': 'High (PII, travel details, technical '
                                        'data)',
                 'type_of_data_compromised': ['Personal identifiable '
                                              'information (PII)',
                                              'Travel/booking records',
                                              'Financial data (masked credit '
                                              'cards)',
                                              'Technical data (aircraft/engine '
                                              'specifications, claimed)',
                                              'Internal documents (claimed)']},
 'date_publicly_disclosed': '2025-11-23',
 'description': 'A Russian-linked cybercriminal group, Everest, claimed '
                'responsibility for a data breach at Spanish flag carrier '
                'Iberia, alleging the theft of 596 GB of sensitive passenger '
                'data, including names, contact details, birthdates, '
                'travel/booking information, and masked credit card data. The '
                'group, financially motivated, attempted to extort Iberia by '
                'threatening to leak the data publicly. The breach was linked '
                'to a third-party customer management software vulnerability. '
                'Everest also claimed to have compromised Iberia’s internal '
                'systems, stealing technical data related to aircraft and '
                'engines. The incident follows a pattern of increasing '
                'cyberattacks on the aviation industry, with recent breaches '
                'at Air France-KLM, Qantas, Hawaiian Airlines, and WestJet, '
                'often tied to third-party software like Salesforce.',
 'impact': {'brand_reputation_impact': 'High (potential loss of trust due to '
                                       'sensitive data exposure and extortion '
                                       'threats)',
            'data_compromised': ['Names',
                                 'Contact details (email addresses)',
                                 'Birthdates',
                                 'Travel and booking information',
                                 'Frequent flyer numbers',
                                 'Masked credit card data',
                                 'Technical data for aircraft and engines '
                                 '(claimed)',
                                 'Internal documents (claimed)'],
            'identity_theft_risk': 'High (phishing scams using stolen '
                                   'passenger details)',
            'payment_information_risk': 'Moderate (masked credit card data '
                                        'exposed)',
            'systems_affected': ['Customer management software (third-party)',
                                 'Internal computer systems (claimed, '
                                 'including technical data repositories)']},
 'initial_access_broker': {'data_sold_on_dark_web': 'Threatened (not yet '
                                                    'confirmed)',
                           'entry_point': 'Third-party customer management '
                                          'software',
                           'high_value_targets': ['Passenger PII',
                                                  'Technical aircraft data '
                                                  '(claimed)']},
 'investigation_status': 'Ongoing (Iberia has not responded to requests for '
                         'comment)',
 'motivation': 'Financial gain (ransom extortion)',
 'post_incident_analysis': {'root_causes': ['Third-party software '
                                            'vulnerability',
                                            'Inadequate protection of '
                                            'sensitive data']},
 'ransomware': {'data_exfiltration': 'Yes (596 GB)',
                'ransom_demanded': 'Yes (amount unspecified, negotiations '
                                   'attempted)'},
 'references': [{'date_accessed': '2025-11-25',
                 'source': 'Hackmanac (Twitter/X)',
                 'url': 'https://t.co/rYSGnNeBN1'},
                {'date_accessed': '2025-11-23',
                 'source': 'Iberia Customer Advisory (Email to Iberia Club '
                           'members)'},
                {'date_accessed': '2025-11',
                 'source': 'Dark Web Post by Everest Group'}],
 'response': {'communication_strategy': 'Alerted Iberia Club members via email '
                                        'about potential data compromise',
              'containment_measures': ['Securing IT systems (details '
                                       'unspecified)'],
              'incident_response_plan_activated': 'Yes (Iberia secured its IT '
                                                  'systems post-breach)'},
 'stakeholder_advisories': 'Iberia Club members notified via email',
 'threat_actor': 'Everest (Russian-linked cybercrime group)',
 'title': 'Data Breach at Iberia Airlines by Everest Hacking Group',
 'type': ['Data Breach', 'Extortion', 'Cyberattack'],
 'vulnerability_exploited': 'Third-party customer management software (details '
                            'unspecified)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.