Go Back  FlyerTalk Forums > Miles&Points > Airlines and Mileage Programs > British Airways | Executive Club
Reload this Page >

BA Investigating Theft of Personal and Financial Data

BA Investigating Theft of Personal and Financial Data

    Hide Wikipost
Old Nov 24, 18, 3:49 am   -   Wikipost
Please read: This is a community-maintained wiki post containing the most important information from this thread. You may edit the Wiki once you have been on FT for 90 days and have made 90 posts.
 
Last edit by: tbm13
Wiki Link
Are you trying to change your BA password and having difficulty doing so? For some suggestions, go to this wikipost.
---------------------------------------------------------------------------------------------------------------------
On Thursday 6 September 2018 at about 1830 London time (UTC+1), BA announced that there had been a data breach involving customers using the BA website and the BA mobile app.

Updates from BA are being posted to this ba.com page: https://www.britishairways.com/en-gb...st-information
A further update dated 25 October 2018 can be found in this post 1377. The SPG Law class action thread can be found here.

As at 1400 London time on Tuesday 11 September 2018, the body of that page read:-
Customer data theft

We are investigating, as a matter of urgency, the theft of customer data between 22:58 BST August 21 2018 until 21:45 BST September 5 2018 from our website, ba.com, and our mobile app.

The stolen data included personal and financial details of customers making bookings and changes on ba.com and the airline’s app. The data did not include travel or passport details.

The theft has been reported to the authorities and our website is now working normally.

What to do if you have been affected

If you believe you may have been affected because you made a booking or paid to change to your booking with a credit or debit card on ba.com or the mobile app between 22:58 BST August 21 2018 until 21:45 BST September 5 2018, we recommend you contact your bank or credit card provider and follow their advice.

We understand that this incident will cause concern and inconvenience. We are contacting all affected customers to say sorry, and we will continue to update them in the coming days.

Phishing

Customers should also be aware that fraudsters may be claiming to be British Airways and attempt to gather personal information by deception (known as 'phishing').

We will not be contacting any customers asking for payment card details and any such requests should be reported to the police and relevant authorities.

See below for more information on how to validate that the email you have received from us is genuine.
That is followed by a series of FAQs. These are reproduced at the end of this wikipost.

If you are experiencing difficulties in changing your BA password or want further information about doing so, some information is in this thread: https://www.flyertalk.com/forum/brit...rd-ba-com.html (which also has a wikipost).

Reports from FTers suggest that credit card companies and banks are taking differing approaches to this incident:-
  • American Express - A recorded message says they are aware of the breach, there is no need to take any further action and if you suffer any financial loss you will be fully compensated; an email says: "There is no action you need to take – we will contact you immediately if there's any unusual activity with your Account. In the meantime you can continue to use your Card as normal" (see post 293, post 401, post 470 and post 491).
  • Barclaycard - They just assured me I was fully protected, and I didn't need to do anything yet (see post 253); however at 18.20 on 7/9/18 the customer service helpline automated message says that affected cards are being reissued (see post 511).
  • Barclays Bank - They have contacted people they believe to have been affected, and have blocked their cards from online use (website/app), but the cards remain valid for physical (chip & PIN) transactions in shops, ATMs etc. New cards being dispatched "within a week" (see post 918).
  • Capital One - online transactions being blocked, new cards being issued (see post 493).
  • Chase (British Airways visa) - no contact from Chase about data breach and card still working
  • HSBC Premier Mastercard - Offering customers the option to freeze the card or replace it with a new card (see post 274).
  • Lloyds - Said "wait and see", but did give the option to cancel the card and have it reissued (see post 403).
  • Lloyds Mastercard - Based on the information they have, fraudulent use of my card is unlikely, just keep an eye on online banking and report anything suspicious (see post 370).
  • Monzo - Automatically replacing all cards (see post 371).
  • Natwest- Of the opinion that as there had been no fraudulent activity on my account to just keep an eye on things, and to call immediately if any suspicious transactions appear and fraud team would refund (post 315).
  • Sainsburys Bank - seem to be replacing all cards proactively (see post 968)
  • Starling - Automatically replacing cards (see post 460).
  • Tesco Bank - Pro-actively sending a new card as per details in this post (post 484)
  • TSB - Call the Telephone Banking Team on 03459 758758 to discuss further (see post 437).
  • Vanquis - online transactions being blocked, new cards being issued (see post 493).
FAQs (as at 1400 London time on Tuesday 11 September 2018):-
Have I been affected?

How do I know if I have been affected?

Customers who made bookings or changes to their bookings on ba.com or our mobile app between 22:58 BST August 21, 2018 and 21:45 BST September 5, 2018 may have been affected.

We advise any customers who believe they may have been affected to contact their banks or credit card providers and follow their advice.

We are experiencing high call volumes into our contact centres so please continue to check this page for the latest information.

Contact us

What data has been lost?

The personal and financial details of customers making bookings on ba.com and our mobile app between 22:58 BST August 21, 2018 and 21:45 BST September 5, 2018 was compromised. No passport or travel details were stolen. Only customers who made bookings between these dates are affected.

Names, billing address, email address and all bank card details were all at risk.

Did this affect just new bookings or any payment transaction made within the impacted time period?

All payment transactions made on ba.com or our mobile app from 22:58 BST August 21 2018 to 21:45 September 5 2018 inclusive were affected. Nothing before or after these dates and times was impacted. Payments made through our call centres, travel agents or online travel sites are not affected.

Are my saved payment card details safe if they were used to make a booking in that period?

If you made a payment using a saved card on ba.com or the mobile app from 22:58 BST August 21, 2018 to 21:45 September 5, 2018 inclusive, you may have been impacted.

No Executive Club accounts were compromised in the data theft. There is no impact to Avios or details stored with the British Airways Executive Club.

Has saved credit card data been stolen, even if a booking hasn’t been made in that period?

No, saved payment card data has not been compromised. However, if you made a payment using a saved card on ba.com or the mobile app from 22:58 BST August 21, 2018 to 21:45 September 5, 2018 inclusive, you may have been impacted.

How were phone numbers not affected?

Phone number information is collected in a separate part of the booking process and is not used as part of the payment transaction therefore this has not been impacted.

I used PayPal to pay for my ba.com transaction. Is this impacted?

If you booked through PayPal, your PayPal account will not have been compromised. There does remain the risk that some of your personal information such as your name and address may have been accessed. No passport details or travel details were compromised.

Is Apple Pay affected?

If you used Apple Pay via the mobile app then your data will not have been compromised.

I had a failed payment attempt during the affected time period – am I affected?

If you clicked the pay button on ba.com then the transaction would have taken place even if the outcome was unsuccessful and the data would have been compromised.

We advise any concerned customers to contact their banks or credit card providers and follow their advice.

Will I be affected if I made a free change to my booking but my payment card details were saved in the reservation?

If you made a free change to your booking via ba.com and did not use your payment card as part of that transaction, then you will not have been impacted.

Are travel agent bookings affected?

Only bookings or changes to bookings made directly with ba.com or the mobile app between 22:58 BST August 21, 2018 and 21:45 BST September 5, 2018 were affected.

If a change was made to a travel agent booking on ba.com and payment made for an additional product, such as seat reservations or excess baggage, then these would be affected.

Does this affect Executive Club accounts in any way? i.e. missing Avios/ Tier Points

No accounts were compromised in the data theft. There is no impact to Avios or details stored with the British Airways Executive Club.

I received an email about the data theft, however I only cancelled a booking during this time – will I be affected?

If you cancelled and refunded your booking between 22:58 BST August 21, 2018 and 21:45 September 5, 2018, you will not have been impacted.

---------------------------------------------------------------------------------------------------------

What should I do if I think I am affected?

Should I call my bank or cancel my credit cards?

We recommend that all customers who made bookings or changes to their bookings with ba.com or the mobile app, between 22:58 BST August 21, 2018 and 21:45 BST September 5, 2018, contact their banks or credit card providers and follow their advice.

I think my card was compromised when I made a booking on ba.com outside of the time period – what should I do?

The data theft relates to customer bookings made or changed between 22:58 BST August 21, 2018 and 21:45 September 5, 2018 only.

We advise any concerned customers to contact their banks or credit card providers and follow their advice.

How would I know if I have been a victim of identity theft?

There are a number of signs to look out for that may indicate that you might have been a victim of identity theft:-
  • Post from your bank or utility provider doesn’t arrive.
  • You apply for state benefits, but are told you are already claiming.
  • Refused financial services, credit cards or a loan, despite having a good credit rating.
  • Receiving letters in your name from solicitors or debt collectors for debts that aren’t yours.
If you think that you might be a victim of identity theft, then you should:
  • Request a copy of your credit file to check for any suspicious credit applications.
  • Report the theft of personal information and suspicious credit applications to the police and ask for a crime reference number.
  • If fraud has been committed, contact Action Fraud.
I have had some suspicious emails or phone calls – are they legitimate?

If you are concerned about an email, we recommend that you don't click on any links, open any documents or reply to it until you have looked into it further.

Official emails relating to this theft will be sent from: [email protected] You should hover over the sent email address to confirm this is where the email has been sent from before clicking on it.

British Airways will never proactively contact you to request your personal or confidential information. If you ever receive an email or call, claiming to be from us, requesting this information, please report it to us straight away.

We've put the details of the scams we're aware of on our ba.com website security page. There's also security essentials information to help you, along with details of how to report any new scams to us (or other emails/calls that have concerned you).

Will I be reimbursed?

We take the protection of our customers’ data seriously and are very sorry for the concern that this criminal activity has caused.

We will continue to keep our customers updated with the very latest information.

No customer will be out of pocket as a direct result of the criminal theft of data from ba.com and the airline’s mobile app. Any customer who made a booking between 22:58 BST August 21 2018 and 21:45 BST September 5 2018 will be reimbursed for any fraudulent activity on their accounts as a direct result of the data theft and we shall advise the process for this in due course.

We will be offering a 12-month credit rating monitoring service to any affected customer who is concerned about an impact to their credit rating, provided by specialists in the field and will share details of this in the near future.

Will BA pay for costs associated with getting new cards, e.g. postage costs?

No customer will be out of pocket as a direct result of the criminal theft of data from ba.com and the airline’s mobile app. We are working through the process and will update our customers as soon as we can.

How do I reset my ba.com password?

ba.com and Executive Club accounts have not been compromised and your login details are safe.

However, if you’d like to change your password, first ensure you are logged out of ba.com and click the Forgotten Pin/Password link on the top right-hand corner of the homepage. We recommend you choose a unique password that you do not use for any other online account.

We are aware of some customers experiencing intermittent issues when attempting to reset their passwords. We are working on resolving this as quickly as possible.

---------------------------------------------------------------------------------------------------------

How does this affect my bookings?

What shall I do if I am due to travel today?

The incident has been resolved and all systems are working normally so customers due to travel can check-in online as normal.

Will I still be able to check in?

Yes, all customers booked on our flights will be able to check in as normal.

Will this affect any future bookings?

The incident has been resolved and ba.com is working normally so future bookings will not be affected.

Will bookings made over the period of this incident remain confirmed?

Yes, all bookings made remain valid for travel.

If I cancelled the card my booking was made with what do I need to bring to the airport?

The payment card that was used to pay for the booking should be brought to the airport if you are the owner of the card and are travelling. However, if the payment card has expired since the booking was made and you have a new card, or you don't have the original card used for payment, please print out a copy of your flight itinerary from Manage my Booking.

I have now cancelled my credit card, but I had used that card to make a future flight booking, so how will I be able to access that booking?
You do not need to enter your payment card details when retrieving an existing booking via Manage My Booking on ba.com, so access to future booking is not restricted due to the cancellation of the payment card.
As of Wednesday 12th September, affected customers are being emailed with the following additional information

We deeply apologise for any worry and inconvenience this criminal activity has caused. For your reassurance, we’re offering you 12 months of free credit and identity monitoring services, provided by Experian, one of the UK’s leading Credit Reference agencies.

Your free ProtectMyID membership
To help you to monitor your personal information for certain signs of potential identity theft, we are offering you a free 12 month membership to Experian ProtectMyID. This service helps detect possible misuse of your personal data and provides you with identity monitoring support, focussed on the identification and resolution of identity theft.

Activating your free ProtectMyID membership
1. Ensure that you sign up for the service by 12 December 2018. Your code expires after this date.
2. Visit the ProtectMyID website to get started.
3. Click on ‘Join ProtectMyID’ (top right-hand side).
4. Enter your details along with the following activation code: XXXXXXXX
This code is unique to you and only available in this email – please keep this email for reference.

Once your membership is activated, you’ll have access to the following features:
1. Unlimited access to your Experian Credit Report.
2. Credit Alerting – an email or text to let you know when certain changes happen on your Experian Credit Report, such as the addition of a new credit search.
3. Access to an Identity Theft Resolution service if you do become a victim of fraud, where you’ll have a dedicated case worker who will support you in resolving fraud that has occurred.
4. If you are at higher risk of fraud, Experian can add protective Cifas registration to your credit report which can help prevent credit being taken in your name. The Cifas Protective Registration service places a flag alongside your name and personal details in the National Fraud Database. Companies and organisations who are signed up as members of the database will see you’re at risk and take extra steps to protect you.

If you have any questions regarding this service, then please contact Experian’s Customer Support Centre on 03444 818182*. They are open Monday to Friday, 8am to 8pm and Saturday, 9am to 5pm.
Note that the email from BA gives you a personal "Activation Code". However, when you get to the signup forms for ProtectMyID, you put the code into the second page of the sign up form in the "Promotional Code" field.
Print Wikipost

Reply

Old Sep 11, 18, 4:16 am
  #886  
 
Join Date: May 2010
Location: Oxon, UK
Programs: Mucci des canapes, Skywards Gold, BAEC Gold, IC Plat Amb, Accor Gold
Posts: 1,839
Originally Posted by pomkiwi View Post
Wonder if they will be calling all of us lowly gold card holders as well?

Although I am not sure there will much to be gained wasting more of my time than I have already keeping up to date with news and trying to work out what I need to do to mitigate risk.
Probably safe to assume that BA's interest in making personal contact (as opposed to generic e-mails) stopped at the GGL level. Nor reply received to an e-mail I sent them about this either...
pomkiwi is offline  
Reply With Quote
Old Sep 11, 18, 4:16 am
  #887  
dsf
 
Join Date: May 2006
Location: Surbiton, Surrey, UK.
Programs: BA Gold
Posts: 1,475
Originally Posted by babats View Post
Or more likely an outside job as BA outsource most, if not all, of their IT work.
My knee-jerk reactions are:
  • BA's "normal" defences (firewalls, etc) may not have been breached
  • there's the possibility of an audit trail to find the culprit
  • BA (or their outsourcer) has an extraordinarily lax code review/release process, or there was collusion between at least two people with the requisite access
armouredant likes this.
dsf is offline  
Reply With Quote
Old Sep 11, 18, 4:17 am
  #888  
 
Join Date: Mar 2011
Location: Here, there and everywhere
Posts: 71
Originally Posted by armouredant View Post
Here's RiskIQ's report on the JS card skim: https://www.riskiq.com/blog/labs/mag...irways-breach/
Very interesting! A key point is that it appears the hackers had access to the BA servers (not a 3rd party server) long before the attack and they had a substantial level of access. What else were they were able to do/view???

"While we can never know how much reach the attackers had on the British Airways servers, the fact that they were able to modify a resource for the site tells us the access was substantial, and the fact they likely had access long before the attack even started is a stark reminder about the vulnerability of web-facing assets" Bolding mine.

This brings up a whole set of new concerns.
Calchas likes this.
Where am I today? is offline  
Reply With Quote
Old Sep 11, 18, 4:22 am
  #889  
 
Join Date: Sep 2018
Posts: 14
Originally Posted by pomkiwi View Post
Probably safe to assume that BA's interest in making personal contact (as opposed to generic e-mails) stopped at the GGL level. Nor reply received to an e-mail I sent them about this either...
i have not heard anything back. I wrote to them on Friday and I am a GGL. Not surprised really, it’s clear that BA really doesn’t care. After all, it’s not their fault right?!?! 🤬
Marilenad27 is offline  
Reply With Quote
Old Sep 11, 18, 4:24 am
  #890  
 
Join Date: May 2012
Location: Munich, Algarve, Sussex or S.F Bay Area
Programs: BA Gold, A3*Gold, AA Plat, HH Gold, IHG Plat, SPG Gold
Posts: 2,789
I had an interesting experience booking a flight on the Gold line this morning. Apart from the fact that this was an ex-CAI booking too complex for ba.com, I really do not trust the web site after everything I have been hearing. The agent was courteous and friendly but when it came to payment and I asked her to use the Amex from my profile, she told me that they are having to enter full card details into a different payment system. She needed full card details, full billing address and cvv. She also said, that would now be stored in the new payments system replacing my previously stored card. This does point to the payment system for telephone bookings having previously been compromised as well as the fact that they now have a new one, so I guess we should assume it's safer.
Tafflyer is offline  
Reply With Quote
Old Sep 11, 18, 4:26 am
  #891  
Ambassador: Emirates Airlines
 
Join Date: Sep 2004
Location: Manchester, UK
Posts: 13,482
Originally Posted by dsf View Post
My knee-jerk reactions are:
  • BA's "normal" defences (firewalls, etc) may not have been breached
  • there's the possibility of an audit trail to find the culprit
  • BA (or their outsourcer) has an extraordinarily lax code review/release process, or there was collusion between at least two people with the requisite access
It's quite easy for somebody with the appropriate server access to just modify the script with a text editor. I could have done this at a number of clients (if I had the JS skills and the inclination). A lot of companies are quite lax in who they give root access to, so it can be difficult to see who made the change.
DYKWIA is offline  
Reply With Quote
Old Sep 11, 18, 4:27 am
  #892  
 
Join Date: Jul 2005
Location: London, CPH, ARN or HEL
Programs: Mucci Silver, BA GFL / GGL, HH Diamond, Radisson Gold, Hertz Gold 5*
Posts: 4,211
Originally Posted by Marilenad27 View Post


i have not heard anything back. I wrote to them on Friday and I am a GGL. Not surprised really, it’s clear that BA really doesn’t care. After all, it’s not their fault right?!?! 🤬
I wonder if they were calling just a few GGLs to gauge reaction / thoughts. I have 3 affected bookings but I didn't get a call either.
ThatT1Feeling is offline  
Reply With Quote
Old Sep 11, 18, 4:30 am
  #893  
 
Join Date: Jul 2005
Location: London, CPH, ARN or HEL
Programs: Mucci Silver, BA GFL / GGL, HH Diamond, Radisson Gold, Hertz Gold 5*
Posts: 4,211
Originally Posted by Tafflyer View Post
I had an interesting experience booking a flight on the Gold line this morning. Apart from the fact that this was an ex-CAI booking too complex for ba.com, I really do not trust the web site after everything I have been hearing. The agent was courteous and friendly but when it came to payment and I asked her to use the Amex from my profile, she told me that they are having to enter full card details into a different payment system. She needed full card details, full billing address and cvv. She also said, that would now be stored in the new payments system replacing my previously stored card. This does point to the payment system for telephone bookings having previously been compromised as well as the fact that they now have a new one, so I guess we should assume it's safer.
BA apparently record their calls with customers. I sincerely hope that when you gave the agent your full card details etc., the recording was paused. It should be, and reputable organisations tell you that they're doing so. Otherwise it's full payment details stored on a voice recording for a non-defined period of time.
ThatT1Feeling is offline  
Reply With Quote
Old Sep 11, 18, 4:36 am
  #894  
 
Join Date: Mar 2012
Location: BHX
Programs: BA GGL, Marriott Plat, SPG Plat, HH Diamond, Accor Plat, Cafe Nero Loyalty Card
Posts: 6,290
My BA Amex was used in the US overnight for a load of small transactions. I haven't been in the US this year, hardly ever use this card (as the voucher triggered a while ago). It was, however, used on BA.com in this window.

Not a problem as Amex are decent with this kind of thing, but looks like cards are starting to be hit now.
Wozza2404 is offline  
Reply With Quote
Old Sep 11, 18, 4:37 am
  #895  
dsf
 
Join Date: May 2006
Location: Surbiton, Surrey, UK.
Programs: BA Gold
Posts: 1,475
Originally Posted by DYKWIA View Post
It's quite easy for somebody with the appropriate server access to just modify the script with a text editor. I could have done this at a number of clients (if I had the JS skills and the inclination). A lot of companies are quite lax in who they give root access to, so it can be difficult to see who made the change.
Right. That's what I consider to be 'extraordinarily lax' in 2018
dsf is offline  
Reply With Quote
Old Sep 11, 18, 4:38 am
  #896  
 
Join Date: May 2012
Location: Munich, Algarve, Sussex or S.F Bay Area
Programs: BA Gold, A3*Gold, AA Plat, HH Gold, IHG Plat, SPG Gold
Posts: 2,789
Originally Posted by ThatT1Feeling View Post
BA apparently record their calls with customers. I sincerely hope that when you gave the agent your full card details etc., the recording was paused. It should be, and reputable organisations tell you that they're doing so. Otherwise it's full payment details stored on a voice recording for a non-defined period of time.
Hmm, no she did not mention pausing the recording. But in any case, at the beginning of the call, full identity details for confirmation were also sought, which could potentially be just if not more damaging than card information.
ThatT1Feeling likes this.
Tafflyer is offline  
Reply With Quote
Old Sep 11, 18, 4:45 am
  #897  
 
Join Date: Mar 2018
Location: UK
Programs: BA Blue, Hilton Diamond, IHG Platinum
Posts: 175
Originally Posted by Tafflyer View Post
Hmm, no she did not mention pausing the recording. But in any case, at the beginning of the call, full identity details for confirmation were also sought, which could potentially be just if not more damaging than card information.
This would almost certainly be automated. Most call recording products have a programmable interface that can be used to stop and start recordings. Typically this would pause when the agent opens the payment application, or clicks into the card number field on the webpage, and resume when they click away to something else.
ThatT1Feeling likes this.
notakeenflyer is offline  
Reply With Quote
Old Sep 11, 18, 5:01 am
  #898  
 
Join Date: Jul 2009
Location: UK
Programs: BA Gold
Posts: 2,063
Originally Posted by armouredant View Post
Here's RiskIQ's report on the JS card skim: https://www.riskiq.com/blog/labs/mag...irways-breach/
Very interesting reading and it means that if this was the only attack that took place then the information that BA has shared about stored cards (that were used) being at risk is at least partially incorrect. The CVC numbers from those cards would have been redirected but not the card number itself. They would have any other information entered on the booking page which could add some puzzle pieces to data from another attack.
Steve_ZA is offline  
Reply With Quote
Old Sep 11, 18, 5:01 am
  #899  
 
Join Date: Jan 2003
Location: London, UK
Posts: 4,637
Excellent article from the The Register too:
https://www.theregister.co.uk/2018/0...bsite_scripts/

It essentially summarises the RiskIQ report linked about saying that it was likely down to poor security practices on the payment page.
Dave_C is offline  
Reply With Quote
Old Sep 11, 18, 5:07 am
  #900  
Ambassador: Emirates Airlines
 
Join Date: Sep 2004
Location: Manchester, UK
Posts: 13,482
Originally Posted by Steve_ZA View Post
Very interesting reading and it means that if this was the only attack that took place then the information that BA has shared about stored cards (that were used) being at risk is at least partially incorrect. The CVC numbers from those cards would have been redirected but not the card number itself. They would have any other information entered on the booking page which could add some puzzle pieces to data from another attack.
Looking at the other report, it appears that BA also stores the CC number locally (rather than just the token). So, it could be that the payment process retrieves the CC and sends it to the payment engine. At this point, the script would have access.
frank_poulankh likes this.
DYKWIA is offline  
Reply With Quote

Thread Tools
Search this Thread