Everest Leaks AT&T Records, Demands M for Dublin Airport Passenger Data
Everest ransomware group leaks alleged AT&T Carrier data, demanding million for Dublin Airport files and million for Air Arabia employee records.
An analysis by Hackread.com found that the leak includes two CSV files, one titled user_list and the other customer_list. The user_list file contains personal data such as email addresses, full names, and phone numbers of 429,103 individuals. The customer_list file includes email addresses, phone numbers, and last names of 147,621 individuals.
According to their claims, the data includes the following information:
- Full name
- Flight date
- Passenger ID
- Seat number
- Flight number
- Departure airport code
- Destination airport code
- Fast track or priority status
- Compartment or travel class
- Timestamp and barcode format
- Departure date and workstation ID
- Frequent flyer airline, number, and tier
- Operating carrier and marketing carrier
- Sequence number and passenger status
- Version number and number of segments
- Airline designator of the boarding pass issuer
- Free baggage allowance and baggage tag numbers
- Date of issue of the boarding pass and document type
- Airline numeric code and document form serial number
- Source of check-in and source of boarding pass issuance
- Device name, device ID, and device type used for check-in
- First and second non-consecutive baggage tag plate numbers
- Selectee indicator and international document verification status
To read the complete article see: Hackread - Everest Leaks AT&T Records
This post is licensed under CC BY 4.0 by the author.