Data leak
β Supply Chain
British Airways Magecart Payment Card Skimming Breach
Primary Source βIncident Details
Between 21 August and 5 September 2018, a Magecart Group 6 skimmer silently exfiltrated payment card details from approximately 500,000 British Airways customers who purchased tickets online or via mobile app. The skimmer was injected through a compromised Modernizr JavaScript library served from BA’s own infrastructure after the attackers gained access to BA’s network. Customer names, billing addresses, email addresses, and full payment card details including CVV codes were exfiltrated to the attacker-controlled domain baways.com. BA detected the breach on 5 September 2018 and publicly disclosed it on 6 September. The UK ICO investigated and issued a Β£183.39 million fine (subsequently reduced to Β£20 million due to COVID-19 economic considerations) β at the time the largest GDPR fine ever issued, equivalent to 1.5% of BA’s global annual turnover. The attack was attributed to FIN6/Magecart Group 6 based on shared infrastructure and tactics. This was one of the first and most prominent GDPR enforcement actions, establishing that payment card skimming via web-injection constitutes a major personal data breach subject to GDPR Article 33 notification obligations within 72 hours.
Technical Details
- Initial Attack Vector
- Magecart Group 6 injected a 22-line JavaScript skimmer into British Airways' website and mobile app via a compromised third-party Modernizr JavaScript library; skimmer exfiltrated payment card data to attacker-controlled domain baways.com
- Vendor / Product
- British Airways website / mobile app (Modernizr library)
- Malware Family
- Magecart skimmer
- Supply Chain Attack
- β Confirmed third-party / vendor compromise
Timeline
- 2018-08-21 Breach occurred
- 2018-09-06 Publicly disclosed
- 2018-09-06 Customers notified