
In what I can refer to as not too shocking/surprising, customer flight and financial information of ARIK air has been leaked by hackers and the information is public. An American security expert while scanning for vulnerable Amazon S3 buckets discovered something odd. His investigation led him to a bucket owned by West Africa's leading airline, @flyarikair (swipe to read). The information he discovered could be very useful to identity thiefs.
What he found includes:
_
Customer email address.
_
Customer name
_
Customer's IP at time of purchase
_
A hash of the customer's credit card
_
What appears to be last 4 digits of the credit card used.
_
What appears to be maybe be the first 6 digits of the credit card used.
_
A unique device fingerprint (presumably the user's mobile or desktop device?)
_
Type of currency used
_
Payment card type
_
Business name related to the purchase
_
Amount of purchase
_
Date of purchase
_
Country of origin of the purchaser
_
The specific departing airport and arriving airport
_
A further investigation revealed that sensitive information that leaked included customer names, email addresses, internet protocol addresses (IPs) registered at point of purchasing tickets, the hashes of credit cards used and what appears to be the first six digits and last four digits of the credit card used for purchase.
A malicious person could potentially use this sensitive information to target one of these customers of Arik Air for identify theft. With the information included in this leak a fraudster would have plenty of useful data points.
It is possible to map out all flights this user has taken in the 3.5 months contained by this leaked data.

Posted: at | |