Maximise your Avios, air miles and hotel points

Air Europa suffers a major data breach with full credit card details exposed

Links on Head for Points may support the site by paying a commission.  See here for all partner links.

Air Europa, the Spanish airline which BA’s parent IAG is currently in the process of acquiring, appears to have suffered from a data breach.

The email sent out to customers over the weekend should, I think, serve as an example of how not to do this.

Rather than rewrite the story, I thought I’d share the email with you, with comments!

Air Europa credit card breach

Dear Customer:

At AIR EUROPA we are committed to the security and privacy of our customers. In light of this, we work daily to apply the best practices in the sector and comply with current regulations.

They are SO committed to the security and privacy of your data that they appear to have spent very little on cybersecurity, because:

In accordance with this commitment, we inform you that a cybersecurity incident was recently detected in one of our systems consisting of possible unauthorized access to your bank card data, specifically the following:

• The number of the bank card ending in XXXX
• The expiration date of that card.
• The CVV of the card.

Say what?! You thought you’d casually mention half-way down that all of my credit card information, including the CVV code, has been exposed?!

From the first moment we have put all our resources to contain the incident, adopting all the necessary technical and organizational measures. Thanks to this, we have secured our systems, guaranteeing the correct functioning of the service. Additionally, we have made the due notifications to the competent authorities and necessary entities (AEPD, INCIBE, banks, etc.).

That’s nice. How about telling me what you’re going to do to help me with my compromised credit card?

Air Europa credit card breach

Given the risk of card spoofing and fraud that this incident could entail, and in order to protect your interests, we recommend that you take the following steps:

1. Identify the card used to make payment(s) on the AIR EUROPA website.
2. Contact your bank.
3. Request the cancellation/cancellation/replacement of that card in order to prevent possible fraudulent use of your information.
4. Do not provide personal information, your pin, name or any other personal data through telephone, message or email, even when they are identified as your bank.
5. Do not click on links that warn you of fraudulent operations. Contact your bank directly by verifiable means.
6. Collect any evidence of possible unauthorized use of your card and report it to the State Security Forces.

So, Air Europa isn’t actually going to do anything to help me then ….

Our goal is to prevent similar situations from occurring in the future, as well as to minimize the possible inconvenience that all this may cause.

Bit late for that, I suspect – and I don’t see you doing anything to ‘minimize the possible inconvenience’ of your passengers. It’s also not ‘possible’ inconvenience, it IS inconvenience if my credit card has to be cancelled.

We apologise for the damages we may have caused you and we are at your complete disposal for any clarification or additional resolution of doubts you may need. Also, if you want more information about the management of the security breach, contact our Data Protection Officer at the mail: delegadopd@aireuropa.com.

Best regards,
Air Europa

Comments (73)

This article is closed to new comments. Feel free to ask your question in the HfP forums.

  • ThinkSquare says:

    I like the bit about not giving your name when you phoning your bank.

  • Robert says:

    Data breaches seem to follow IAG carriers or airlines connected to them….perhaps another airline that hasn’t invested enough in their IT…..like BA!

  • Chris W says:

    They weren’t exactly a world-class airline to start with.

  • TimM says:

    Absolute data security requires a very unfashionable proof-based approach – formal specification, pre-conditions, post conditions then a worked proof before the start of coding. No one in any major software company is educated in this fashion, and likely never will be. Perhaps it is time to elevate computer science education beyond the ‘failed mathematician’ label.

    Current data security is a whole mish-mash of bought-in products with no formal verification individually nor in combination. Data breaches will inevitably become ever more prevalent. It is probably better to change identity and all payment methods every few seconds than to rely on the data security of the corporates.

    • Lady London says:

      IMV proper IT testing went out the window decades ago @TimM. I’ve even had a project leader from one of the Big Four try to get me removed as the interfacing client leader when I told them I would insist on testing what they were implementing properly to find any bugs before they got to the users.

      Apparently the standard of testing was only to verify narrow functionality could be said to have worked once so a box could be ticked that it had worked once without testing the functionality worked under more than one set of parameters.

    • Bagoly says:

      I completely agree about formal specifications and proofs.
      Although there are two additional points which even boards should understand:
      1) effort can be drastically cut down by thinking in advance and eliminating a risk, rather than mitigating it. E.g. I looked at PCI DSS and went “too onerous” so send customers to Stripe with a Description+Currency+Amount request.
      2) even if you are 100% secure from one angle, there can be another – E.g. everything may be wonderfully encrypted, but an intercept attack is still a risk. And if a code injection gets through, it can invalidate almost everything else.

  • Charles Martel says:

    Could this and the potential huge fine jeapordise the takeover deal?

  • JandeW says:

    Judging by the fact that, for the last 6 months or so, BA (read IAG) has proved itself incapable of a) allowing me to access the BA Mobile App and then b) updating the data within the app, this display of data security incompetence and total ambivalence to its results by a sister IAG company, surprises me not one bit!

  • Mike says:

    At least they sent an email I guess, TAP didn’t bother and tried to hide it on their web site.

  • Amelia Expat says:

    I work for a Bank, previously in fraud, and we hate it when companies deal with beaches like this (i.e. ‘we’ve been hacked so go and speak to your bank yourself’). The merchant (i.e. Air Euhopeless) should contact the Schemes with the card data (e.g. Visa, MasterCard, AMEX etc) who can activate some of their own fraud analytics which can involve identifying which merchants are being used for fraud spend. The schemes also divvy the cards up by Card Issuer (e.g. HSBC, Santander etc) and pass them directly over to the Compromised Cards Teams in those Issuer organisations who can either arm (enhanced monitor) or replace the cards. In a parallel universe, Air Europa would then be able to say “No need to contact your Card Issuer! [who might not be a bank, by the way]. We have already made them aware and they will be in contact with you. In the meantime, protective measures have been applied to your card, and you only need to call your card issuer if you notice any unrecognised transactions on your statement. Please monitor your statement carefully” etc. This way the card issuers’ phone lines remain available for people who really need to speak to them as opposed to literally everyone whose card data was stolen, and you actually lessen the inconvenience among all the victims rather than just talking about it.
    Also, I’m not sure how this breach has happened without breaches of PCIDSS compliance by AirEuropa. I’m no expert in that but pretty sure card data should be encrypted in transit and storage.

    • sayling says:

      This. This is how it should be done

    • memesweeper says:

      Absolutely. It would appear Air Europa *still* hasn’t hired an actual cybersecurity expert (or isn’t listening to them) 🙄

    • Roy says:

      There are ways this can happen without blatant PCIDSS violations such as storing cleartext card details, storing CVV data etc. A server compromise can allow attackers to inject JavaScript malware into the page that captures the card details as you enter them into your browser and sends them to the attacker. IIRC the BA hack was something like this.

      Of course, in that scenario the question would still remain as to whether that server compromise was due to a failure of other PCIDSS controls.

This article is closed to new comments. Feel free to ask your question in the HfP forums.

The UK's biggest frequent flyer website uses cookies, which you can block via your browser settings. Continuing implies your consent to this policy. Our privacy policy is here.