Cyber Security

Hackers hit deported airlines around the world, leaked flights show up and left “Donny” Trump

Global Airlines, the U.S. government’s charter airline used to deport outbound flights, has been attacked by hackers who claim to have detailed flight records and passenger performance.

The attackers claimed they operated under anonymous protection, not only would they quietly strip data from the airlines, assisting with controversial deportations—they also defamed the company’s website and replaced it with a message:

Aside from the almost forced image of a man wearing a “V for Vendetta”-style Guy Fawkes mask, part of the defiled webpage read:

“The anonymous person decided to execute the judge’s order because you and your nanny staff ignored the legal orders with your fascist plan. You lost again, Donny.”

Of course, if no one notices, tainting a website makes little sense – so hackers contact journalists, point them in the direction of security breach, and provide treasures of leaked data, including:

  • Flight log
  • Passenger List
  • Details of the itinerary across the month

The leaked details include information about flights used to deport hundreds of Venezuelan immigrants, including some people with the legality of their deportation from the United States, and the plane has been aired in the air. 404 Media.

Media Media said it has classified the data into folders – dated from January 19 to May 1 – containing details about its carefully verified details that have been verified against official ICE flight logs and court documents.

According to anonymous hacker. Data can be accessed after discovering the GlobalX developer’s token and using it to discover access and secret keys to the company’s AWS bucket.

In addition to stripping data and tearing down websites, hackers say they are able to send internal messages to pilots through flight action tools, and even access to the company’s GitHub.

Leaked files indicate that Globalx’s cybersecurity posture is not very good. Hackers claim they found a developer token, used it to mine AWS Access keys, and then stroll into the company’s cloud infrastructure. They also said they sent internal messages to pilots via Navblue, a flight operation tool made by AirBus, and even visited the company’s GitHub.

At the time of writing, there is no formal response to security breaches in global or U.S. immigration authorities.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button