Company Details
korean-air
3,404
65,163
481
koreanair.com
0
KOR_1735068
In-progress

Korean Air Company CyberSecurity Posture
koreanair.comServing the world for more than 50 years, Korean Air is one of the world's top 20 airlines, carrying more than 27 million passengers in 2019, pre-COVID. With its global hub at Incheon International Airport (ICN), the airline serves 120 cities in 43 countries on five continents with a modern fleet of 155 aircraft and over 20,000 professional employees. Korean Air's outstanding performance and commitment to the highest level of safety and customer service was further highlighted during the pandemic; the airline was granted numerous awards including 2021 Airline of the Year and 2022 Cargo Operator of the Year by Air Transport World, and a 5-star COVID safety rating from Skytrax. Korean Air is a founding member of the SkyTeam airline alliance, and has grown into one of the largest transpacific airlines through its joint venture with Delta Air Lines. Dedicated to providing Excellence in Flight, Korean Air’s vision is to be a respected leader in the world airline community. For more information about Korean Air, please visit www.koreanair.com, Korean Air Newsroom, facebook.com/KoreanAir, instagram.com/KoreanAirworld and Twitter@KoreanAir_KE.
Company Details
korean-air
3,404
65,163
481
koreanair.com
0
KOR_1735068
In-progress
Between 750 and 799

Korean Air Global Score (TPRM)XXXX

Description: **Korean Air Employee Data Exposed in Cyberattack on Partner Firm** Korean Air, South Korea’s largest airline, confirmed that sensitive employee information was compromised following a cyberattack on KC&D, a third-party vendor responsible for in-flight meals and onboard sales. The breach, disclosed in an internal notice on Monday, exposed personal data—including names and phone numbers—stored on KC&D’s servers. The airline detected the incident after being alerted by KC&D and responded by implementing emergency security measures and reporting the breach to authorities. Employees were advised to monitor for potential follow-up attacks, such as phishing attempts via suspicious messages. This incident adds to a growing trend of data breaches affecting major South Korean companies, including recent attacks on Coupang, KT Corp., and Shinhan Card. Meanwhile, Korean Air is also navigating regulatory scrutiny over its merger with Asiana Airlines, with the Fair Trade Commission requiring revisions to its mileage integration plan by next month. The acquisition, finalized in December 2024 after a four-year review, allows Asiana customers to retain their mileage value for a decade post-merger.
Description: **Korean Air Reports Data Breach Affecting 30,000 Employees in Third-Party Cyberattack** Korean Air has disclosed a data breach exposing the personal information of approximately 30,000 employees, marking the second major incident in South Korea’s airline industry in recent weeks. The breach occurred after a cyberattack on KC&D Service, a former in-flight catering subsidiary of the airline, which was sold to private equity firm Hahn & Company in 2020. The leaked data includes names and bank account numbers, though Korean Air confirmed that no customer information was compromised. The airline was notified of the breach by KC&D, prompting an immediate internal investigation. In a message to employees, Vice Chairman Woo Kee-hong emphasized the severity of the incident, stating that the company is working to determine the full scope of the breach and identify affected individuals. Korean Air implemented emergency security measures following the discovery, including a review of service integrations with KC&D, and voluntarily reported the incident to authorities. The airline has also urged KC&D to conduct a thorough analysis to prevent future breaches and plans to enhance its data protection protocols. The incident follows a similar breach at Asiana Airlines last week, which exposed the personal information of around 10,000 employees. Both cases highlight growing cybersecurity risks in the aviation sector, particularly through third-party vendors.


Korean Air has 31.58% more incidents than the average of same-industry companies with at least one recorded incident.
Korean Air has 26.58% more incidents than the average of all companies with at least one recorded incident.
Korean Air reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Korean Air cyber incidents detection timeline including parent company and subsidiaries

Serving the world for more than 50 years, Korean Air is one of the world's top 20 airlines, carrying more than 27 million passengers in 2019, pre-COVID. With its global hub at Incheon International Airport (ICN), the airline serves 120 cities in 43 countries on five continents with a modern fleet of 155 aircraft and over 20,000 professional employees. Korean Air's outstanding performance and commitment to the highest level of safety and customer service was further highlighted during the pandemic; the airline was granted numerous awards including 2021 Airline of the Year and 2022 Cargo Operator of the Year by Air Transport World, and a 5-star COVID safety rating from Skytrax. Korean Air is a founding member of the SkyTeam airline alliance, and has grown into one of the largest transpacific airlines through its joint venture with Delta Air Lines. Dedicated to providing Excellence in Flight, Korean Air’s vision is to be a respected leader in the world airline community. For more information about Korean Air, please visit www.koreanair.com, Korean Air Newsroom, facebook.com/KoreanAir, instagram.com/KoreanAirworld and Twitter@KoreanAir_KE.


Ethiopian Airlines Group (Ethiopian) is a true African success story, transforming a visionary dream into a globally renowned reality for nearly eight decades. Operating flights to more than 160 domestic and international passenger, and cargo destinations across five continents, Ethiopian bridges th
The Lufthansa Group is an aviation company with operations worldwide. It plays a leading role in its European home market. With 109,509 employees, the Lufthansa Group generated revenue of EUR 32.770m in the financial year 2022. The Passenger Airlines segment includes, on the one hand, the network a

Depuis 1933, la compagnie Air France porte haut les couleurs de la France à travers le monde entier. Avec une activité, répartie entre le transport aérien de passagers, le fret, la maintenance et l’entretien aéronautique, Air France est un acteur majeur du secteur aérien. Plus de 45 000 collaborateu

gategourmet has been serving the airline industry for more than 70 years and has become the world’s largest independent provider of airline catering and logistics. We prepare tens of thousands of tasty, nutritious passenger meals and snacks daily and reliably service more than 2 million flights a ye
We would like to acknowledge the Traditional Custodians of the local lands and waterways on which we live, work and fly. We pay our respects to Elders past and present. Spirit is everything to us, and joining the Qantas team means bringing your spirit to ours. We have over 26,000 exceptional emplo
Grupo Aeromexico, S.A.B. de C.V. is a holding company whose subsidiaries are engaged in commercial aviation and the promotion of passenger loyalty programs in Mexico. Aeromexico, Mexico’s global airline, operates more than 600 daily flights and has its main hub in Terminal 2 of the Mexico City Inter

Turkish Airlines has soared to new heights since its first flight in 1933, becoming the airline that connects more countries than any other. Our commitment to excellence is reflected in the world-class service, comfort, and innovative travel experience we offer, designed to elevate every journey.

Qatar Airways is the national airline of the State of Qatar. Based in Doha, the Airline’s trendsetting on-board product focuses on: comfort, fine cuisine, the latest in-flight audio & video entertainment, award-winning service and one of the youngest and most advanced aircraft fleet in the sky. Awa

Ryanair Holdings plc, Europe’s largest airline group, is the parent company of Ryanair DAC, Lauda, Buzz and Ryanair UK. Carrying 160m+ guests p.a. on over 3,000 daily flights to/from 225 airports. Plan to carry 225m+ guests p.a. by 2026. Unfortunately, we are unable to answer customer service que
.png)
A data breach involving the personal information of Korean Air employees was recently reported — the second such incident in the airline...
Seoul, Dec 29 (IANS) Personal information of employees at Korean Air, South Korea's largest flag carrier, has been leaked after a partner...
Hana Bank has received the Financial Services Commission (FSC) Chairman's commendation for contributions to information protection in the...
Hyundai Motor Group has created its first group-level cyberthreat response team amid a rise in cybersecurity risks across various industrial...
Korea and the United States kicked off a joint cybersecurity exercise Monday to strengthen their combined readiness posture against...
Korean Air and Archer Aviation have signed an agreement to bring Archer's Midnight eVTOL aircraft to Korea, with Korean Air planning to buy...
Korean Air has become a new customer for the world's only all-new large freighter, following the conversion of seven of its existing...
The defense chiefs of South Korea and Estonia on Thursday signed an agreement to support Estonia's bid to acquire the Chunmoo, South Korea's...
Korean Air unveiled three unmanned aerial vehicles (UAVs) at the Seoul International Aerospace & Defense Exhibition (ADEX) 2025 in Seoul.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Korean Air is http://koreanair.com.
According to Rankiteo, Korean Air’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.
According to Rankiteo, Korean Air currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Korean Air is not certified under SOC 2 Type 1.
According to Rankiteo, Korean Air does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Korean Air is not listed as GDPR compliant.
According to Rankiteo, Korean Air does not currently maintain PCI DSS compliance.
According to Rankiteo, Korean Air is not compliant with HIPAA regulations.
According to Rankiteo,Korean Air is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Korean Air operates primarily in the Airlines and Aviation industry.
Korean Air employs approximately 3,404 people worldwide.
Korean Air presently has no subsidiaries across any sectors.
Korean Air’s official LinkedIn profile has approximately 65,163 followers.
Korean Air is classified under the NAICS code 481, which corresponds to Air Transportation.
No, Korean Air does not have a profile on Crunchbase.
Yes, Korean Air maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/korean-air.
As of December 29, 2025, Rankiteo reports that Korean Air has experienced 2 cybersecurity incidents.
Korean Air has an estimated 3,653 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and containment measures with emergency security measures, safety check on service integrations with kc&d, and remediation measures with urged kc&d to analyze the incident and prevent recurrence, and communication strategy with internal notice to employees, public statement via representative, and incident response plan activated with emergency security measures, and law enforcement notified with reported to relevant authorities, and communication strategy with internal notice to employees urging vigilance against potential secondary damage..
Title: Korean Air Employee Data Breach via Third-Party Vendor
Description: A data breach involving the personal information of Korean Air employees occurred after a cyberattack on KC&D Service, a former in-flight catering subsidiary of Korean Air. The breach exposed names and bank account numbers of approximately 30,000 employees. No customer data was affected.
Type: Data Breach
Title: Korean Air Employee Data Exposed in KC&D Cyberattack
Description: Personal information of employees at Korean Air was leaked after a cyberattack hit KC&D, a partner firm handling its in-flight meals and onboard sales services. The breach exposed names and phone numbers of Korean Air employees stored on KC&D's servers.
Type: Data Breach
Threat Actor: Hacker group
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Names and bank account numbers
Brand Reputation Impact: Negative impact due to employee data breach
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Names and phone numbers of employees
Systems Affected: KC&D's servers
Identity Theft Risk: Potential secondary damage (e.g., phishing via suspicious text messages or emails)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and Personal information.

Entity Name: Korean Air
Entity Type: Airline
Industry: Aviation
Location: South Korea
Customers Affected: 0 (no customer data affected)

Entity Name: KC&D Service
Entity Type: Third-Party Vendor (Former Subsidiary)
Industry: Catering
Location: South Korea
Customers Affected: 30,000 employees

Entity Name: Korean Air
Entity Type: Airline
Industry: Aviation
Location: South Korea

Entity Name: KC&D
Entity Type: Supplier
Industry: Catering and Onboard Sales
Location: South Korea
Customers Affected: Korean Air employees

Incident Response Plan Activated: Yes
Containment Measures: Emergency security measures, safety check on service integrations with KC&D
Remediation Measures: Urged KC&D to analyze the incident and prevent recurrence
Communication Strategy: Internal notice to employees, public statement via representative

Incident Response Plan Activated: Emergency security measures
Law Enforcement Notified: Reported to relevant authorities
Communication Strategy: Internal notice to employees urging vigilance against potential secondary damage
Incident Response Plan: The company's incident response plan is described as Yes, Emergency security measures.

Type of Data Compromised: Personal Information
Number of Records Exposed: 30,000
Sensitivity of Data: High (bank account numbers, names)
Personally Identifiable Information: Yes

Type of Data Compromised: Personal information
Sensitivity of Data: Low to moderate (names and phone numbers)
Personally Identifiable Information: Names and phone numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Urged KC&D to analyze the incident and prevent recurrence.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by emergency security measures and safety check on service integrations with kc&d.

Regulatory Notifications: Voluntarily reported to relevant authorities

Recommendations: Strengthen personal data protection posture, improve third-party vendor security oversight
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Strengthen personal data protection posture and improve third-party vendor security oversight.

Source: Kim Kyung-mi

Source: Yonhap News Agency

Source: IANS
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Kim Kyung-mi, and Source: Yonhap News Agency, and Source: IANS.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Internal notice to employees, public statement via representative and Internal notice to employees urging vigilance against potential secondary damage.

Stakeholder Advisories: Internal notice to employees, public statement via representative
Customer Advisories: None (no customer data affected)
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Internal notice to employees, public statement via representative and None (no customer data affected).

Corrective Actions: Further analysis of breach details, prevention of recurrence
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Further analysis of breach details, prevention of recurrence.
Last Attacking Group: The attacking group in the last incident was an Hacker group.
Most Significant Data Compromised: The most significant data compromised in an incident were Names and bank account numbers and Names and phone numbers of employees.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Emergency security measures and safety check on service integrations with KC&D.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names and phone numbers of employees and Names and bank account numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 30.0K.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Strengthen personal data protection posture and improve third-party vendor security oversight.
Most Recent Source: The most recent source of information about an incident are Yonhap News Agency, IANS and Kim Kyung-mi.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Internal notice to employees, public statement via representative, .
Most Recent Customer Advisory: The most recent customer advisory issued was an None (no customer data affected).
.png)
A vulnerability was found in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/PPTPUserSetting. Performing manipulation of the argument delno results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
A vulnerability has been found in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/PPTPServer. Such manipulation of the argument ip1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in omec-project UPF up to 2.1.3-dev. This affects the function handleSessionEstablishmentRequest of the file /pfcpiface/pfcpiface/messages_session.go of the component PFCP Session Establishment Request Handler. This manipulation causes null pointer dereference. The attack may be initiated remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was detected in floooh sokol up to 16cbcc864012898793cd2bc57f802499a264ea40. The impacted element is the function _sg_pipeline_desc_defaults in the library sokol_gfx.h. The manipulation results in stack-based buffer overflow. The attack requires a local approach. The exploit is now public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is identified as 5d11344150973f15e16d3ec4ee7550a73fb995e0. It is advisable to implement a patch to correct this issue.
A security vulnerability has been detected in PbootCMS up to 3.2.12. The affected element is the function get_user_ip of the file core/function/handle.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to use of less trusted source. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.