Company Details
global-crossing-airlines
342
16,276
481
globalxair.com
0
GLO_2799210
In-progress

Global Crossing Airlines Company CyberSecurity Posture
globalxair.comGlobal Crossing Airlines (OTCQB: JETMF | JET: Cboe) is a US 121 domestic flag and supplemental airline flying the Airbus A320 family aircraft. GlobalX flies as an ACMI and wet-lease charter airline serving the US, Caribbean and Latin American markets. For more information, please visit www.globalxair.com.
Company Details
global-crossing-airlines
342
16,276
481
globalxair.com
0
GLO_2799210
In-progress
Between 700 and 749

GCA Global Score (TPRM)XXXX

Description: Global Crossing Airlines Group, a Miami-based airline facilitating ICE deportation flights, suffered a cyberattack on **May 5** by a hacker identifying as **Anonymous**. The breach granted unauthorized access to **business application systems**, allowing the theft of **flight records and manifests**—including sensitive details of ICE deportation operations. The hacker defaced the company’s website before exfiltrating data, which was later verified against public deportation reports by **404 Media**. While the company claimed **no operational disruption** and **no material financial impact**, the stolen data exposed its involvement in controversial deportation flights, risking **reputational damage** and potential **legal or regulatory scrutiny**. The incident prompted engagement with **law enforcement and a cybersecurity firm**, but the company did not disclose whether **personal data of employees, passengers, or deported individuals** was compromised. The FBI and DHS declined to comment. GlobalX, which earns **$65M annually from ICE contracts**, faces indirect consequences from the **public exposure of its role in deportations**, though no direct financial or operational harm was confirmed.
Description: In March, the hacktivist collective Anonymous targeted GlobalX Airlines in retaliation for the U.S. government’s decision to deport alleged members of the Venezuelan gang Tren de Aragua. The attackers launched a distributed denial-of-service (DDoS) operation that disrupted and defaced the airline’s public website, preventing customers from accessing booking tools and flight schedules for several hours. Concurrently, Anonymous exfiltrated the company’s flight manifest report, exposing sensitive passenger information such as names, contact numbers, crew details and other flight data. This stolen dataset was later cited by independent outlet 404 Media as evidence in a class action lawsuit aiming to block the forced removal of the accused gang members. Although GlobalX has since restored website functionality and taken measures to secure its infrastructure, the incident underscores significant lapses in the protection of personal data and raises concerns about potential identity theft, legal liabilities and damage to the carrier’s reputation. The breach also follows a related incident in which Anonymous released 10 TB of data purportedly containing corruption files and Trump-related information stolen from the Russian government, highlighting the group’s capacity for large-scale cyber intrusions.


Global Crossing Airlines has 222.58% more incidents than the average of same-industry companies with at least one recorded incident.
Global Crossing Airlines has 156.41% more incidents than the average of all companies with at least one recorded incident.
Global Crossing Airlines reported 2 incidents this year: 2 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
GCA cyber incidents detection timeline including parent company and subsidiaries

Global Crossing Airlines (OTCQB: JETMF | JET: Cboe) is a US 121 domestic flag and supplemental airline flying the Airbus A320 family aircraft. GlobalX flies as an ACMI and wet-lease charter airline serving the US, Caribbean and Latin American markets. For more information, please visit www.globalxair.com.


Red. Hot. Spicy. That’s not just our tagline, it’s how we fly. Red reflects the bold spirit we bring to every journey, energetic, passionate, and full of heart. Hot captures the warmth of our service and the vibrant destinations we connect. Spicy is our drive to keep travel exciting through innovati
How time flies. #18YearsOfIndiGo IndiGo is India’s largest passenger airline. We primarily operate in India’s domestic air travel market as a low-cost carrier with focus on our three pillars – offering low fares, being on-time and delivering a courteous and hassle-free experience. IndiGo has become

Turkish Airlines has soared to new heights since its first flight in 1933, becoming the airline that connects more countries than any other. Our commitment to excellence is reflected in the world-class service, comfort, and innovative travel experience we offer, designed to elevate every journey.

Qatar Airways is the national airline of the State of Qatar. Based in Doha, the Airline’s trendsetting on-board product focuses on: comfort, fine cuisine, the latest in-flight audio & video entertainment, award-winning service and one of the youngest and most advanced aircraft fleet in the sky. Awa

As a global airline and the UK’s flag carrier, British Airways has been flying its customers to where they need to be for more than 100 years. The airline connects Britain with the world and the world with Britain, operating one of the most extensive international scheduled airline route networks to

As one of the three major air carriers in China, headquartered in Shanghai, China Eastern Airlines operates 111 domestic and overseas branches across the globe. Flying a fleet of 730 aircraft which is one of the youngest fleets in major airlines worldwide. Moreover, it boasts the largest-scale in-fl
Canada's largest airline, the country’s flag carrier and a founding member of Star Alliance, the world's most comprehensive air transportation network celebrating its 25thanniversary in 2022, Air Canada provides scheduled passenger service directly to 51 airports in Canada, 51 in the United States a

Ethiopian Airlines Group (Ethiopian) is a true African success story, transforming a visionary dream into a globally renowned reality for nearly eight decades. Operating flights to more than 160 domestic and international passenger, and cargo destinations across five continents, Ethiopian bridges th

Welcome to our LinkedIn page! To learn how we can assist you, please check: http://klmf.ly/ContactCentre. KLM was founded in 1919 and is the oldest airline in the world. With a vast network of European and intercontinental destinations, KLM can offer direct flights to major cities and economic cen
.png)
Global Crossing Airlines Group (OTCQB: JETMF) will host its Q3 2025 conference call on Thursday, November 6, 2025 at 8:30 a.m. Eastern to...
Global Crossing Airlines Group (OTCQB: JETMF) signed a long-term wet-lease agreement with Sunrise Airways effective November 2025 to provide...
In a significant cybersecurity breach that has shaken the travel and business sectors, Qantas Airways has confirmed that sensitive data from...
Day 2 of the World Aviation Festival 2025 in Lisbon brought together some of the most influential voices in global aviation.
DHL Express has extended its trial contract with Global Crossing Airlines, a Miami-based provider of dedicated contract air and as-needed...
DHL Express has extended its trial contract with Global Crossing Airlines, a Miami-based provider of dedicated contract air and as-needed...
Sylvain Lefoyer discusses recent ICAO milestones, emerging threats, and how ICAO is strengthening global aviation security and facilitation.
MIAMI, July 14, 2025 (GLOBE NEWSWIRE) -- Global Crossing Airlines Group, Inc. (Cboe CA: JET, Cboe CA: JET.B, OTCQB: JETMF) (“GlobalX” or the...
For the latest discoveries in cyber research for the week of 19th May, please download our Threat Intelligence Bulletin.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Global Crossing Airlines is http://www.globalxair.com.
According to Rankiteo, Global Crossing Airlines’s AI-generated cybersecurity score is 724, reflecting their Moderate security posture.
According to Rankiteo, Global Crossing Airlines currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Global Crossing Airlines is not certified under SOC 2 Type 1.
According to Rankiteo, Global Crossing Airlines does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Global Crossing Airlines is not listed as GDPR compliant.
According to Rankiteo, Global Crossing Airlines does not currently maintain PCI DSS compliance.
According to Rankiteo, Global Crossing Airlines is not compliant with HIPAA regulations.
According to Rankiteo,Global Crossing Airlines is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Global Crossing Airlines operates primarily in the Airlines and Aviation industry.
Global Crossing Airlines employs approximately 342 people worldwide.
Global Crossing Airlines presently has no subsidiaries across any sectors.
Global Crossing Airlines’s official LinkedIn profile has approximately 16,276 followers.
Global Crossing Airlines is classified under the NAICS code 481, which corresponds to Air Transportation.
No, Global Crossing Airlines does not have a profile on Crunchbase.
Yes, Global Crossing Airlines maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/global-crossing-airlines.
As of December 16, 2025, Rankiteo reports that Global Crossing Airlines has experienced 2 cybersecurity incidents.
Global Crossing Airlines has an estimated 3,640 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with restored website functionality and taken measures to secure its infrastructure, and and third party assistance with cybersecurity firm (unnamed), and and communication strategy with sec filing, communication strategy with no public statement beyond regulatory disclosure..
Title: Anonymous Hacktivist Attack on GlobalX Airlines
Description: In March, the hacktivist collective Anonymous targeted GlobalX Airlines in retaliation for the U.S. government’s decision to deport alleged members of the Venezuelan gang Tren de Aragua. The attackers launched a distributed denial-of-service (DDoS) operation that disrupted and defaced the airline’s public website, preventing customers from accessing booking tools and flight schedules for several hours. Concurrently, Anonymous exfiltrated the company’s flight manifest report, exposing sensitive passenger information such as names, contact numbers, crew details and other flight data. This stolen dataset was later cited by independent outlet 404 Media as evidence in a class action lawsuit aiming to block the forced removal of the accused gang members. Although GlobalX has since restored website functionality and taken measures to secure its infrastructure, the incident underscores significant lapses in the protection of personal data and raises concerns about potential identity theft, legal liabilities and damage to the carrier’s reputation. The breach also follows a related incident in which Anonymous released 10 TB of data purportedly containing corruption files and Trump-related information stolen from the Russian government, highlighting the group’s capacity for large-scale cyber intrusions.
Date Detected: March
Type: Distributed Denial-of-Service (DDoS) Attack and Data Exfiltration
Attack Vector: DDoS, Data Exfiltration
Threat Actor: Anonymous
Motivation: Retaliation for U.S. government’s decision to deport alleged members of the Venezuelan gang Tren de Aragua
Title: Cyberattack on Global Crossing Airlines Group (GlobalX) Involving ICE Deportation Flight Data
Description: Global Crossing Airlines Group (GlobalX), an airline involved in ICE deportation flights, confirmed a cybersecurity incident on May 5, 2024. A hacker, identifying as 'Anonymous,' defaced the company’s website and stole flight records and manifests, including details of deportation flights. The company reported the incident to the SEC and law enforcement, stating no operational disruption occurred. The hacker provided stolen data to 404 Media, which verified its authenticity against public deportation records.
Date Detected: 2024-05-05
Date Publicly Disclosed: 2024-05-10
Type: Data Breach
Attack Vector: Website DefacementData Exfiltration
Threat Actor: Anonymous (self-identified)
Motivation: ActivismExposure of ICE Collaboration
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Website defacementBusiness application systems.

Data Compromised: Names, Contact numbers, Crew details, Other flight data
Systems Affected: Public website
Downtime: Several hours
Operational Impact: Disruption of booking tools and flight schedules
Brand Reputation Impact: Significant
Legal Liabilities: Class action lawsuit
Identity Theft Risk: High

Data Compromised: Flight records, Deportation manifests, Operational data
Systems Affected: Business application systemsWebsite
Downtime: None (no operational disruption reported)
Operational Impact: None reported
Brand Reputation Impact: Potential reputational damage due to exposure of ICE collaborationMedia scrutiny
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Contact Numbers, Crew Details, Other Flight Data, , Flight Records, Deportation Manifests, Operational Business Data and .

Entity Name: GlobalX Airlines
Entity Type: Airline
Industry: Aviation

Entity Name: Global Crossing Airlines Group (GlobalX)
Entity Type: Airline
Industry: Aviation, Logistics, Government Contracting
Location: Miami, Florida, USA

Remediation Measures: Restored website functionality and taken measures to secure its infrastructure

Incident Response Plan Activated: True
Third Party Assistance: Cybersecurity Firm (Unnamed).
Communication Strategy: SEC filingNo public statement beyond regulatory disclosure
Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity firm (unnamed), .

Type of Data Compromised: Names, Contact numbers, Crew details, Other flight data
Sensitivity of Data: High

Type of Data Compromised: Flight records, Deportation manifests, Operational business data
Sensitivity of Data: High (includes government-contracted deportation details)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Restored website functionality and taken measures to secure its infrastructure.

Data Exfiltration: True

Legal Actions: Class action lawsuit

Regulatory Notifications: U.S. Securities and Exchange Commission (SEC)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class action lawsuit.

Source: 404 Media

Source: 404 Media

Source: U.S. Securities and Exchange Commission (SEC) Filing by Global Crossing Airlines Group
Date Accessed: 2024-05-10
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: 404 Media, and Source: 404 Media, and Source: U.S. Securities and Exchange Commission (SEC) Filing by Global Crossing Airlines GroupDate Accessed: 2024-05-10.

Investigation Status: Ongoing (law enforcement involved, no public updates)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Sec Filing and No Public Statement Beyond Regulatory Disclosure.

Entry Point: Website Defacement, Business Application Systems,
High Value Targets: Ice Deportation Flight Records, Operational Manifests,
Data Sold on Dark Web: Ice Deportation Flight Records, Operational Manifests,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity Firm (Unnamed), .
Last Attacking Group: The attacking group in the last incident were an Anonymous and Anonymous (self-identified).
Most Recent Incident Detected: The most recent incident detected was on March.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-05-10.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Contact numbers, Crew details, Other flight data, , Flight records, Deportation manifests, Operational data and .
Most Significant System Affected: The most significant system affected in an incident was Public website and Business application systemsWebsite.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was cybersecurity firm (unnamed), .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Deportation manifests, Operational data, Crew details, Names, Other flight data, Contact numbers and Flight records.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class action lawsuit.
Most Recent Source: The most recent source of information about an incident are U.S. Securities and Exchange Commission (SEC) Filing by Global Crossing Airlines Group and 404 Media.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (law enforcement involved, no public updates).
.png)
Hitachi Vantara Pentaho Data Integration and Analytics Community Dashboard Framework prior to versions 10.2.0.4, including 9.3.0.x and 8.3.x display the full server stack trace when encountering an error within the GetCdfResource servlet.
Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.
A security flaw has been discovered in CTCMS Content Management System up to 2.1.2. The impacted element is an unknown function in the library /ctcms/libs/Ct_Config.php of the component Backend System Configuration Module. The manipulation of the argument Cj_Add/Cj_Edit results in code injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in CTCMS Content Management System up to 2.1.2. The affected element is the function Save of the file /ctcms/libs/Ct_App.php of the component Backend App Configuration Module. The manipulation of the argument CT_App_Paytype leads to code injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.