Korean Air data breach exposes data of thousands of employees
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是大韩航空的数据泄露事件。他们是因为旗下的KC&D被黑客攻击,导致员工个人信息泄露。大韩航空有2万多员工,这次泄露涉及姓名、银行账户等信息。虽然公司没有透露具体有多少人受影响,但新闻报道说有3万条数据被窃取。他们已经向当局报告,并提醒员工注意诈骗邮件和短信。 另外,文中提到Clop勒索软件团伙声称对此负责,并在暗网上发布了被盗数据。之前Clop还攻击过其他大公司和机构,比如全球逻辑、哈佛法学院等。 所以,总结的时候要包括:大韩航空的数据泄露事件、原因(KC&D被黑)、泄露的信息类型、受影响人数、应对措施以及责任归属(Clop团伙)。 接下来,我需要把这些信息浓缩到100字以内,确保涵盖所有关键点:事件发生、原因、影响范围、应对措施和责任方。 可能的结构是:大韩航空因KC&D被黑导致员工数据泄露,涉及姓名和银行账户等信息。约3万条数据被盗。公司已报告并提醒员工防范诈骗。Clop团伙声称负责。 </think> 大韩航空因旗下公司KC&D遭黑客攻击,导致约3万名员工的个人信息泄露。事件涉及姓名和银行账户等敏感数据,公司已向当局报告并提醒员工警惕诈骗邮件和短信。Clop勒索软件团伙声称对此负责。 2025-12-29 13:15:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

Korean Air

Korean Air experienced a data breach affecting thousands of employees after Korean Air Catering & Duty-Free (KC&D), its in-flight catering supplier and former subsidiary, was recently hacked.

Korea's flag carrier has over 20,000 employees, a fleet of over 160 aircraft, and has reported over $11 billion in revenue after carrying more than 23 million passengers in 2024.

The airline issued an internal notice on Monday, disclosing a data breach after KC&D (which spun off as a separate in-flight meals and retail company in 2020) notified it that it had been recently hacked.

Wiz

"During this incident, personal information (names, bank account numbers) of our employees stored in the company's ERP system on the affected servers was compromised," Korean Air CEO Woo Kee-hong said in an internal memo.

"Although this incident occurred within the management domain of an external partner company spun off from us, the company views this matter with the utmost seriousness as it involves the information of our employees."

Although the company didn't share further details on how many employees had their information stolen in the breach, local news outlets report that the attackers exfiltrated approximately 30,000 data records.

​Korean Air has since reported the incident to the relevant authorities and, while it has yet to find evidence that the stolen data was used for fraud, it has advised employees to be on the lookout for emails and messages impersonating the company.

"We are currently focusing our efforts on identifying the precise scope and targets of the leak. To date, no evidence of additional employee information leakage beyond the aforementioned items has been identified," Kee-hong added.

"However, to prevent potential secondary damage, all employees are urged to exercise extreme caution regarding suspicious texts or emails requesting transfers impersonating the company or financial institutions, or demanding security card numbers."

While Korean Air has yet to attribute the attack, the Clop ransomware gang has claimed responsibility for the KC&D attack in November and later published the allegedly stolen data on its dark web leak site, making it available for download via Torrent.

KC&D entry on Clop's leak site
KC&D entry on Clop's leak site (BleepingComputer)

​As part of the same series of data theft attacks, Clop compromised the Oracle EBS instances of dozens of victims worldwide, including GlobalLogic, Logitech, Harvard University, the University of Pennsylvania, The Washington Post, and the American Airlines subsidiary Envoy Air, leaking the stolen data on its leak site.

In the past, the ransomware group was behind other data theft campaigns targeting GoAnywhere MFT, Accellion FTA, Cleo, and MOVEit Transfer, and, most recently, Gladinet CentreStack customers.

The U.S. Department of State now offers a $10 million bounty to anyone who can provide any information tying Clop's attacks to a foreign government.

A Korean Air spokesperson was not immediately available for comment when contacted by BleepingComputer earlier today.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/korean-air-data-breach-exposes-data-of-thousands-of-employees/
如有侵权请联系:admin#unsafe.sh