Menu
OPM, Anthem hackers reportedly also breached United Airlines

OPM, Anthem hackers reportedly also breached United Airlines

Flight manifests including passenger information and destinations were stolen, report claims

A United Airlines Boeing 747 at San Francisco International Airport on May 21, 2015

A United Airlines Boeing 747 at San Francisco International Airport on May 21, 2015

The cyberespionage group that stole the personal records of millions of Americans from U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM) has also reportedly breached United Airlines.

The data stolen from United includes flight manifests, which contain information on passengers, their travel origins and destinations, Bloomberg reported Wednesday citing unnamed people familiar with the investigation.

The breach may have been discovered with the help of investigators in the OPM case who built a list of other potential victims after analyzing the domain names, phishing emails and attack infrastructure used by the group, the media organization reported.

United Continental Holdings, the airline's parent company, did not immediately respond to a request for comment.

The hacker group is believed to have ties to the Chinese government and also broke into the computer systems of at least ten companies and organizations, including Anthem, according to the Bloomberg report.

Security researchers from Symantec attributed the Anthem breach to a sophisticated cyberespionage group dubbed Black Vine that has been operating since 2012 and has targeted organizations from a variety of industries including aerospace, healthcare, energy, military and defense, finance, agriculture and technology.

Over 80 percent of victims were from the United States, the Symantec researchers said in a blog post that accompanied a white paper on the group's activities, published Tuesday.

The OPM breach, which exposed sensitive information on 21.5 million current and former U.S. government employees, including those who underwent background checks, is not mentioned in the paper, but the Anthem attack is.

The Anthem breach was announced in February and involved the theft of 78.8 million records with names, birth dates, Social Security numbers, addresses, phone numbers, email addresses and member IDs of health insurance holders.

According to Symantec, Black Vine is a well resourced group with access to exploits for previously unknown vulnerabilities -- zero-day exploits -- through an attack platform called the Elderwood framework that is shared by multiple cyberespionage groups, all based in China. The group also uses three custom malware programs known as Hurix, Sakurel and Mivast.

While United Airlines is not mentioned as a Black Vine victim in Symantec's white paper, there is circumstantial evidence that the group has an interest in airlines.

In May 2014, security researchers from Trend Micro reported in a blog post that a spear phishing campaign directed at an unnamed major global airline used Citrix products as a lure. The rogue emails contained a URL that appeared to be for the targeted airline's Citrix XenApp login page, a product that the organization actually used.

The URL, however, led to a page that distributed an executable file that was actually the Hurix backdoor, the Trend Micro researchers said at the time.

The blog post has since been removed from Trend Micro's website, but it still exists indexed in full on some other websites.

On July 8, United Airlines was forced to temporarily suspend all U.S. flights because of computer problems, following a similar incident on June 2. No connection was found between the July 8 downtime and the security breach, but a possible connection to the June 2 incident has not been ruled out, Bloomberg reported, citing two unnamed sources close to the investigation.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags United AirlinesUnited Continental HoldingsintrusionsymantecsecurityU.S. Office of Personnel Managementdata breachmalwareAnthem

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments