ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

We are part of the Iberia Group, the leading low-cost airline at Madrid airport and on routes to the Canary and Balearic Islands. Our hybrid “low cost, high quality” business model combines great efficiency with a customer experience that includes connecting flights and Business Class service. In 2024, we were the world’s most punctual low-cost airline and the most punctual airline in Europe, according to consultancy firm Cirium. We operate a highly efficient fleet of 25 aircraft, which will help us meet our commitment to net zero emissions by 2050. The Iberia Express team is made up of more than 900 employees who share and promote the values of teamwork, warmth, and kindness, which are the core of our company’s DNA, as well as diversity in all areas.

Iberia Express A.I CyberSecurity Scoring

Iberia Express

Company Details

Linkedin ID:

iberia-express

Employees number:

634

Number of followers:

92,462

NAICS:

481

Industry Type:

Airlines and Aviation

Homepage:

iberiaexpress.com

IP Addresses:

Scan still pending

Company ID:

IBE_1694211

Scan Status:

In-progress

AI scoreIberia Express Risk Score (AI oriented)

Between 600 and 649

https://images.rankiteo.com/companyimages/iberia-express.jpeg
Iberia Express Airlines and Aviation
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreIberia Express Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/iberia-express.jpeg
Iberia Express Airlines and Aviation
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Iberia Express

Poor
Current Score
646
Caa (Poor)
01000
2 incidents
-62.0 avg impact

Incident timeline with MITRE ATT&CK tactics, techniques, and mitigations.

JANUARY 2026
646
DECEMBER 2025
642
NOVEMBER 2025
705
Breach
23 Nov 2025 • Iberia
Iberia Airlines Data Breach via Third-Party Supplier

Spanish airline **Iberia** suffered a **significant data breach** on **November 23, 2025**, originating from a **third-party supplier**. Hackers compromised the vendor’s systems, gaining access to **sensitive customer data**, including **names, email addresses, loyalty program details (Iberia Plus tier statuses, point balances, travel histories)**, and **77GB of proprietary technical documents** (e.g., **aircraft maintenance files, engine specifications, internal certificates**). While **payment information and passwords were not exposed**, the breach heightened risks of **phishing, identity theft, and potential operational risks** if technical data was exploited. The threat actor advertised the stolen data on **dark web forums for $150,000**, accelerating public disclosure. Iberia isolated affected systems, engaged cybersecurity experts, and offered **free credit monitoring** to impacted customers. The incident underscored **supply-chain vulnerabilities** in aviation, prompting regulatory scrutiny under **GDPR** and industry-wide reviews of third-party security protocols.

641
critical -64
IBE5015650112525
Data Breach Supply Chain Attack
Third-Party Vendor Compromise Misconfigured Cloud Storage (speculated) Inadequate Access Controls (speculated)
Outdated Security Protocols (vendor) Potential Configuration Flaws in Shared Platforms (e.g., Salesforce-like systems)
Financial Gain (data sold for $150,000 on dark web)
Customer Names Email Addresses Loyalty Program Details (Iberia Plus tier statuses, point balances, travel histories) Technical Documents (aircraft maintenance files, engine specifications, internal certificates for A320/A321 models) Third-Party Supplier Systems Potentially Shared CRM/Booking Platforms Potential Risk to Aviation Safety (if technical documents exploited) Disruption to Customer Trust Increased Scrutiny on Vendor Security Practices Customer Complaints: Expected (specific numbers not disclosed) Brand Reputation Impact: High (eroded consumer trust, potential market position decline) Potential GDPR Fines (under investigation by EU regulators) Lawsuits from Affected Customers Identity Theft Risk: High (phishing and fraud risks due to exposed PII) Payment Information Risk: None (confirmed not compromised)
Incident Response Plan Activated: Yes (systems isolated, forensic investigation launched) Third Party Assistance: Yes (cybersecurity experts engaged) Isolation of Affected Systems Dark Web Monitoring for Data Leaks Forensic Investigation Supplier Security Audit Customer Notifications Free Credit Monitoring for Affected Individuals Prompt Public Disclosure Customer Advisories (password changes, account monitoring) Enhanced Monitoring: Yes (real-time monitoring of data flows with suppliers)
Personal Identifiable Information (PII) Loyalty Program Data Proprietary Technical Documents Sensitivity Of Data: High (includes PII and sensitive aviation technical data) Data Exfiltration: Yes (77GB of data advertised on dark web) Customer Databases PDF/Technical Manuals Internal Certificates Names Email Addresses Loyalty Program Details (travel histories, tier statuses)
Potential GDPR Non-Compliance (under investigation) EU Regulatory Inquiry (Spain’s data protection agency) Potential Lawsuits Customers Notified Regulators Informed (EU GDPR authorities)
Supply chain vulnerabilities are critical attack vectors in aviation. Outdated vendor security protocols can cascade risks across interconnected systems. Proactive dark web monitoring can accelerate breach detection. Transparency in disclosure helps mitigate reputational damage. Zero-trust architectures and real-time supplier monitoring are essential.
Enforce mandatory security certifications for all third-party vendors. Implement zero-trust frameworks and multi-factor authentication (MFA). Conduct regular penetration testing and AI-driven threat detection. Adopt blockchain-based data verification for supply chain integrity. Enhance employee training on phishing and secure data handling. Establish collaborative threat intelligence sharing within the aviation industry. Invest in AI tools for predictive breach analysis.
Ongoing (forensic investigation, regulatory inquiries by EU/Spain)
Password changes recommended Free credit monitoring offered to affected loyalty program members
Customers advised to enable two-factor authentication and monitor accounts
Entry Point: Third-Party Supplier’s Systems (likely via misconfigured cloud storage or access controls) Customer PII Aircraft Maintenance Documents Internal Certificates Data Sold On Dark Web: Yes (77GB for $150,000)
Vendor’s outdated security protocols Potential misconfigured cloud storage or access controls Lack of real-time monitoring for third-party data flows Enhanced supplier oversight with mandatory security certifications Implementation of zero-trust architectures and MFA AI-driven threat detection and regular penetration testing Collaborative threat intelligence sharing with industry peers
OCTOBER 2025
704
SEPTEMBER 2025
703
AUGUST 2025
702
JULY 2025
701
JUNE 2025
699
MAY 2025
757
Breach
01 May 2025 • Iberia
Iberia Third-Party Data Breach (November 2025)

Iberia, Spain’s national flag carrier airline, suffered a **third-party data breach** after a threat actor claimed to have exfiltrated **77 GB of its sensitive data**. The incident, reported by *Security Affairs*, suggests the compromise involved external vendor systems, potentially exposing corporate, operational, or customer-related information. While the exact nature of the stolen data (e.g., employee records, flight operations, passenger details) remains undisclosed, the scale (77 GB) indicates a **significant data leak** with possible reputational, financial, and regulatory repercussions. The breach underscores vulnerabilities in supply chain cybersecurity, where third-party vendors serve as attack vectors for targeting high-profile organizations. Iberia has not confirmed whether the stolen data includes **customer personal information** or **internal employee records**, but the volume suggests a high-risk exposure. The incident may trigger investigations under **GDPR** (given Iberia’s EU operations) and could erode customer trust, particularly if financial or identity-related data was compromised.

697
critical -60
IBE40104140112625
Data Breach (Third-Party)
Data Compromised: 77 GB
Data Exfiltration: 77 GB
APRIL 2025
757
MARCH 2025
757
FEBRUARY 2025
757

Frequently Asked Questions

According to Rankiteo, the current A.I.-based Cyber Score for Iberia Express is 646, which corresponds to a Poor rating.

According to Rankiteo, the A.I. Rankiteo Cyber Score for December 2025 was 642.

According to Rankiteo, the A.I. Rankiteo Cyber Score for November 2025 was 705.

According to Rankiteo, the A.I. Rankiteo Cyber Score for October 2025 was 704.

According to Rankiteo, the A.I. Rankiteo Cyber Score for September 2025 was 703.

According to Rankiteo, the A.I. Rankiteo Cyber Score for August 2025 was 702.

According to Rankiteo, the A.I. Rankiteo Cyber Score for July 2025 was 701.

According to Rankiteo, the A.I. Rankiteo Cyber Score for June 2025 was 699.

According to Rankiteo, the A.I. Rankiteo Cyber Score for May 2025 was 697.

According to Rankiteo, the A.I. Rankiteo Cyber Score for April 2025 was 757.

According to Rankiteo, the A.I. Rankiteo Cyber Score for March 2025 was 757.

According to Rankiteo, the A.I. Rankiteo Cyber Score for February 2025 was 757.

Over the past 12 months, the average per-incident point impact on Iberia Express’s A.I Rankiteo Cyber Score has been -62.0 points.

You can access Iberia Express’s cyber incident details on Rankiteo by visiting the following link: https://www.rankiteo.com/company/iberia-express.

You can find the summary of the A.I Rankiteo Risk Scoring methodology on Rankiteo by visiting the following link: Rankiteo Algorithm.

You can view Iberia Express’s profile page on Rankiteo by visiting the following link: https://www.rankiteo.com/company/iberia-express.

With scores of 18.5/20 from OpenAI ChatGPT, 20/20 from Mistral AI, and 17/20 from Claude AI, the A.I. Rankiteo Risk Scoring methodology is validated as a market leader.