Airline carrying out deportation flights confirms cyberattack to SEC

Avatar

An airline involved in deportation flights on behalf of the Trump administration confirmed reports of a cybersecurity incident with the U.S. Securities and Exchange Commission (SEC) on Friday.

Global Crossing Airlines Group said a cyberattack on May 5 gave hackers access to “systems supporting portions of its business applications.” The filing with the SEC confirms reporting this week from the news outlet 404 Media, which was contacted by a hacker with information allegedly stolen from the company about ICE deportation flights. 

The company, which has facilitated hundreds of ICE deportation flights through a subcontractor since last year, offered few details about the incident. 

Law enforcement has been contacted and a cybersecurity firm was hired but the company did not respond to several inquires about what data was taken and whether the hacker identified themselves. 

The FBI and DHS declined to comment. 

Global Crossing Airlines Group noted that none of its operations were disrupted and that it does not believe the incident will have a “material effect on the company’s financial condition.”

The alleged hacker behind the incident, who called themselves Anonymous, told 404 Media that they defaced the company’s website before stealing flight records and manifests. The data provided to 404 Media was verified against public reports and incidents of deportations — and includes evidence of the company’s involvement in two notable flights in March.

The company, which also refers to itself as GlobalX, is a Miami-based airline offering passenger and cargo flights in the U.S., Latin America, Europe and the Caribbean.

It reported a 2023 revenue of $160 million and makes about $65 million annually from its work with ICE. 

The Department of Homeland Security and ICE did not respond to requests for comment about the data stolen or the incident.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Fears ‘hackers still in the system’ leave Co-op shelves running empty across UK

Next Post

Moldova arrests suspect in ransomware attacks targeting Dutch firms

Related Posts

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called r77. The activity, condemned OBSCURE#BAT by Securonix, enables threat actors to establish persistence and evade detection on compromised systems. It's currently not known who is behind the campaign. The rootkit "has the ability to cloak or mask any file, registry key or task
Avatar
Read More

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a "major blind spot in Linux runtime security tools," ARMO said. "This mechanism allows a user application to perform various actions without using system calls," the company said in
Avatar
Read More