PERSONAL details of nine million easyJet customers are at risk after being accessed by cyber hackers.
The discount airline will be letting customers know if they have been affected over the next few days.
⚠️ Read our coronavirus live blog for the latest news & updates
Thieves stole email addresses and travel details millions of passengers, as well as 2,208 travellers’ credit card details.
EasyJet, which has currently grounded all flights due to the coronavirus crisis, has said there is no evidence that the stolen details have been used by the criminals.
The airline is yet to confirm exactly when the data breach occurred, but has said that it had closed the online channels used by the hackers.
A statement issued by the airline said: “We’re sorry that this has happened, and we would like to reassure customers that we take the safety and security of their information very seriously.
What should I do if I’m an easyJet customer?
EASYJET is contacting customers who have been affected by the data breach in the coming days, no later than May 26.
It has already contacted the 2,208 customers who have had their credit card details stolen.
If you have been affected, you should consider cancelling your credit or debit card and flag the situation to your bank and ActionFraud.
It’s also a good idea to update your password for your easyJet account, and any other accounts that you use the same password for.
Ray Walsh, Digital Privacy Expert at ProPrivacy.com adds: “Consumers are reminded that they should always use strong, unique passwords for each of their accounts so that if anyone account is breached hackers are not able to login to secondary accounts.”
“EasyJet is in the process of contacting the relevant customers directly and affected customers will be notified no later than 26th of May.”
Criminals may use the data to target customers with “phishing” scams.
This is where they send out emails, phone calls or text messages, claiming to be from a reputable company in an attempt to trick you into handing over money or your personal details.
EasyJet customers are being urged to stay alert to possible scams over the coming weeks as a result of the cyber attack.
Since 2018, companies must let customers know if their personal details have been exposed within 72 hours of noticing the breach, under GDPR rules.
EasyJet is currently working with the Information Commissioner’s Office (ICO) and the National Cyber Security Centre.
The airline’s boss, Johan Lundgren, said: “We would like to apologise to those customers who have been affected by this incident.
“Since we became aware of the incident, it has become clear that owing to Covid-19 there is heightened concern about personal data being used for online scams.
“As a result, and on the recommendation of the ICO, we are contacting those customers whose travel information was accessed and we are advising them to be extra vigilant, particularly if they receive unsolicited communications.”
Robert Ramsden-Board, from security firm Securonix said: “This breach could have catastrophic consequences such as identity theft, ransomware being downloaded to personal devices that are being used for corporate purposes.
TAKE A BREAK
Can you still take holiday while on furlough and does it affect your pay?
Marks & Spencer ‘ripping-off shoppers’ with £11.50 hand sanitiser
Wagamama to reopen 67 restaurants for delivery across the UK
Benefit claims jump 70% in a month as unemployment rises to 2.1million
CHEERS TO THAT!
How pubs could look after lockdown with food stalls and limits on drinks
“We will most likely see a series of phishing attacks targeting EasyJet customers in the near future, so all customers should be on the alert for suspicious activity.”
Crooks have been cashing in on coronavirus fears by selling unsafe face masks and hand sanitiser.
Tesco and Morrisons have both warned customers not to fall for fake COVID-19 emails claiming to be from the supermarkets.
Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .