Connect with us

Hi, what are you looking for?



San Francisco International Airport Discloses Data Breach

Hackers managed to breach two websites pertaining to the San Francisco International Airport (SFO) in March 2020, the airport has revealed.

Hackers managed to breach two websites pertaining to the San Francisco International Airport (SFO) in March 2020, the airport has revealed.

The incident involved and, two low-traffic websites designed to keep visitors informed on a variety of SFO-related topics, such as the COVID-19 crisis, alternate AirTrain routing, airfield operations, airport construction contracts, and the like.

In March 2020, the websites were targeted by cyber-criminals who injected malicious code into them, aiming to steal the login credentials of visiting individuals.

“Users possibly impacted by this attack include those accessing these websites from outside the airport network through Internet Explorer on a Windows-based personal device or a device not maintained by SFO,” the airport announced in a breach notice (PDF).

The hackers, SFO says, appear to have targeted the usernames and passwords that people use “to log on to those personal devices.” Basically, they were after the victims’ Windows login credentials.

Both of the affected websites were taken offline and the malicious code has been removed, the airport says. Moreover, all SFO-related email and network passwords were reset on March 23.

All those who visited either of the compromised websites outside of SFO’s managed networks via Internet Explorer on a Windows device are advised to change the passwords used to log in to that device.

They should also update the information on all accounts that might be using the same username and password combination.

Advertisement. Scroll to continue reading.

“This is a clear example of a Magecart-style attack. This data was stolen directly from the users’ browsers even before it reached SFO systems. Since this happened on the users’ devices, the website administrators would have had no visibility into it. This is what makes Magecart attacks so prevalent and hard to detect,” Ameet Naik, security evangelist at PerimeterX, said in an emailed comment.

“Attackers know that people tend to reuse passwords across different websites and take credentials collected from other sites, then try to use them to log into more valuable websites, such as banks. It is vital to ensure that people are taught about the dangers of reusing passwords across multiple websites and that people enable multi-factor authentication, such as a text message with a code or a code generated from an app on a smart phone, wherever possible,” James McQuiggan, security awareness advocate at KnowBe4, commented.

Related: New Marriott Data Breach Impacts Up to 5.2 Million Guests

Related: GE Says Some Employees Hit by Data Breach at Canon

Related: Cruise Operator Carnival Discloses 2019 Data Breach

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.


People on the Move

Data security startup Reco adds Merritt Baer as CISO

Chris Pashley has been named CISO at Advanced Research Projects Agency for Health (ARPA-H).

Satellite cybersecurity company SpiderOak has named Kip Gering as its new Chief Revenue Officer.

More People On The Move

Expert Insights