Post

Everest Leaks AT&T Records, Demands M for Dublin Airport Passenger Data

Everest ransomware group leaks alleged AT&T Carrier data, demanding million for Dublin Airport files and million for Air Arabia employee records.

An analysis by Hackread.com found that the leak includes two CSV files, one titled user_list and the other customer_list. The user_list file contains personal data such as email addresses, full names, and phone numbers of 429,103 individuals. The customer_list file includes email addresses, phone numbers, and last names of 147,621 individuals.

According to their claims, the data includes the following information:

  1. Full name
  2. Flight date
  3. Passenger ID
  4. Seat number
  5. Flight number
  6. Departure airport code
  7. Destination airport code
  8. Fast track or priority status
  9. Compartment or travel class
  10. Timestamp and barcode format
  11. Departure date and workstation ID
  12. Frequent flyer airline, number, and tier
  13. Operating carrier and marketing carrier
  14. Sequence number and passenger status
  15. Version number and number of segments
  16. Airline designator of the boarding pass issuer
  17. Free baggage allowance and baggage tag numbers
  18. Date of issue of the boarding pass and document type
  19. Airline numeric code and document form serial number
  20. Source of check-in and source of boarding pass issuance
  21. Device name, device ID, and device type used for check-in
  22. First and second non-consecutive baggage tag plate numbers
  23. Selectee indicator and international document verification status

To read the complete article see: Hackread - Everest Leaks AT&T Records

This post is licensed under CC BY 4.0 by the author.