Company Details
koreanair
1
9,072
481
koreanair.com
0
KOR_2375919
In-progress

Korean Air Company CyberSecurity Posture
koreanair.comLeading Global carrier, a founding member of SkyTeam, operates more than 460 flights per day to 125 cities in 44 countries.
Company Details
koreanair
1
9,072
481
koreanair.com
0
KOR_2375919
In-progress
Between 650 and 699

Korean Air Global Score (TPRM)XXXX

Description: **Korean Air Employee Data Exposed in Cyberattack on Partner Firm** Korean Air, South Korea’s largest airline, confirmed that sensitive employee information was compromised following a cyberattack on KC&D, a third-party vendor responsible for in-flight meals and onboard sales. The breach, disclosed in an internal notice on Monday, exposed personal data—including names and phone numbers—stored on KC&D’s servers. The airline detected the incident after being alerted by KC&D and responded by implementing emergency security measures and reporting the breach to authorities. Employees were advised to monitor for potential follow-up attacks, such as phishing attempts via suspicious messages. This incident adds to a growing trend of data breaches affecting major South Korean companies, including recent attacks on Coupang, KT Corp., and Shinhan Card. Meanwhile, Korean Air is also navigating regulatory scrutiny over its merger with Asiana Airlines, with the Fair Trade Commission requiring revisions to its mileage integration plan by next month. The acquisition, finalized in December 2024 after a four-year review, allows Asiana customers to retain their mileage value for a decade post-merger.
Description: **Korean Air Reports Data Breach Affecting 30,000 Employees in Third-Party Cyberattack** Korean Air has disclosed a data breach exposing the personal information of approximately 30,000 employees, marking the second major incident in South Korea’s airline industry in recent weeks. The breach occurred after a cyberattack on KC&D Service, a former in-flight catering subsidiary of the airline, which was sold to private equity firm Hahn & Company in 2020. The leaked data includes names and bank account numbers, though Korean Air confirmed that no customer information was compromised. The airline was notified of the breach by KC&D, prompting an immediate internal investigation. In a message to employees, Vice Chairman Woo Kee-hong emphasized the severity of the incident, stating that the company is working to determine the full scope of the breach and identify affected individuals. Korean Air implemented emergency security measures following the discovery, including a review of service integrations with KC&D, and voluntarily reported the incident to authorities. The airline has also urged KC&D to conduct a thorough analysis to prevent future breaches and plans to enhance its data protection protocols. The incident follows a similar breach at Asiana Airlines last week, which exposed the personal information of around 10,000 employees. Both cases highlight growing cybersecurity risks in the aviation sector, particularly through third-party vendors.


Korean Air has 31.58% more incidents than the average of same-industry companies with at least one recorded incident.
Korean Air has 26.58% more incidents than the average of all companies with at least one recorded incident.
Korean Air reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Korean Air cyber incidents detection timeline including parent company and subsidiaries

Leading Global carrier, a founding member of SkyTeam, operates more than 460 flights per day to 125 cities in 44 countries.

Lufthansa is one of the world’s leading airlines, connecting passengers to over 200 destinations across 74 countries from our hubs in Frankfurt and Munich. As an industry pioneer, we are committed to shaping the future of sustainable aviation, investing in next-generation aircraft, cutting-edge tec
!BIenvenido al sitio oficial! Avianca es la primera aerolínea comercial fundada en las Américas y la segunda en el mundo. Enfocados en alcanzar la excelencia y eficiencia operacional, se dio marcha a una profunda reorganización de los procesos, la cual ha estado acompañada de la modernización
How time flies. #18YearsOfIndiGo IndiGo is India’s largest passenger airline. We primarily operate in India’s domestic air travel market as a low-cost carrier with focus on our three pillars – offering low fares, being on-time and delivering a courteous and hassle-free experience. IndiGo has become
We’re creating an airline people love. It begins with each Alaska Airlines employee, bringing unique strengths and energy to our work in the air and on the ground. Every day, we go beyond what’s expected and reach for the remarkable, together. Welcome to our LinkedIn page. We like conversations on
We would like to acknowledge the Traditional Custodians of the local lands and waterways on which we live, work and fly. We pay our respects to Elders past and present. Spirit is everything to us, and joining the Qantas team means bringing your spirit to ours. We have over 26,000 exceptional emplo

Welcome aboard Singapore Airlines on LinkedIn. Discover travel inspirations, business travel tips, cultural insights, our latest updates, and more. Singapore Airlines is a global company dedicated to providing air transportation services of the highest quality and to maximising returns for the ben

gategourmet has been serving the airline industry for more than 70 years and has become the world’s largest independent provider of airline catering and logistics. We prepare tens of thousands of tasty, nutritious passenger meals and snacks daily and reliably service more than 2 million flights a ye

Somos a maior Companhia Aérea do País e estamos entre as que mais crescem no mundo. A nossa história começou em 2001 e, desde então, somos responsáveis por inovar o mercado da aviação no Brasil. Tudo isso graças à dedicação do nosso Time para garantir o nosso Valor número 1, a Segurança, entregand

Ryanair Holdings plc, Europe’s largest airline group, is the parent company of Ryanair DAC, Lauda, Buzz and Ryanair UK. Carrying 160m+ guests p.a. on over 3,000 daily flights to/from 225 airports. Plan to carry 225m+ guests p.a. by 2026. Unfortunately, we are unable to answer customer service que
.png)
A data breach involving the personal information of Korean Air employees was recently reported — the second such incident in the airline...
Seoul, Dec 29 (IANS) Personal information of employees at Korean Air, South Korea's largest flag carrier, has been leaked after a partner...
Hana Bank has received the Financial Services Commission (FSC) Chairman's commendation for contributions to information protection in the...
Hyundai Motor Group has created its first group-level cyberthreat response team amid a rise in cybersecurity risks across various industrial...
Korea and the United States kicked off a joint cybersecurity exercise Monday to strengthen their combined readiness posture against...
Korean Air and Archer Aviation have signed an agreement to bring Archer's Midnight eVTOL aircraft to Korea, with Korean Air planning to buy...
Korean Air has become a new customer for the world's only all-new large freighter, following the conversion of seven of its existing...
The defense chiefs of South Korea and Estonia on Thursday signed an agreement to support Estonia's bid to acquire the Chunmoo, South Korea's...
Korean Air unveiled three unmanned aerial vehicles (UAVs) at the Seoul International Aerospace & Defense Exhibition (ADEX) 2025 in Seoul.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Korean Air is http://koreanair.com.
According to Rankiteo, Korean Air’s AI-generated cybersecurity score is 656, reflecting their Weak security posture.
According to Rankiteo, Korean Air currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Korean Air is not certified under SOC 2 Type 1.
According to Rankiteo, Korean Air does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Korean Air is not listed as GDPR compliant.
According to Rankiteo, Korean Air does not currently maintain PCI DSS compliance.
According to Rankiteo, Korean Air is not compliant with HIPAA regulations.
According to Rankiteo,Korean Air is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Korean Air operates primarily in the Airlines and Aviation industry.
Korean Air employs approximately 1 people worldwide.
Korean Air presently has no subsidiaries across any sectors.
Korean Air’s official LinkedIn profile has approximately 9,072 followers.
Korean Air is classified under the NAICS code 481, which corresponds to Air Transportation.
No, Korean Air does not have a profile on Crunchbase.
Yes, Korean Air maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/koreanair.
As of December 29, 2025, Rankiteo reports that Korean Air has experienced 2 cybersecurity incidents.
Korean Air has an estimated 3,653 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and containment measures with emergency security measures, safety check on service integrations with kc&d, and remediation measures with urged kc&d to analyze the incident and prevent recurrence, and communication strategy with internal notice to employees, public statement via representative, and incident response plan activated with emergency security measures, and law enforcement notified with reported to relevant authorities, and communication strategy with internal notice to employees urging vigilance against potential secondary damage..
Title: Korean Air Employee Data Breach via Third-Party Vendor
Description: A data breach involving the personal information of Korean Air employees occurred after a cyberattack on KC&D Service, a former in-flight catering subsidiary of Korean Air. The breach exposed names and bank account numbers of approximately 30,000 employees. No customer data was affected.
Type: Data Breach
Title: Korean Air Employee Data Exposed in KC&D Cyberattack
Description: Personal information of employees at Korean Air was leaked after a cyberattack hit KC&D, a partner firm handling its in-flight meals and onboard sales services. The breach exposed names and phone numbers of Korean Air employees stored on KC&D's servers.
Type: Data Breach
Threat Actor: Hacker group
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Names and bank account numbers
Brand Reputation Impact: Negative impact due to employee data breach
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Names and phone numbers of employees
Systems Affected: KC&D's servers
Identity Theft Risk: Potential secondary damage (e.g., phishing via suspicious text messages or emails)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and Personal information.

Entity Name: Korean Air
Entity Type: Airline
Industry: Aviation
Location: South Korea
Customers Affected: 0 (no customer data affected)

Entity Name: KC&D Service
Entity Type: Third-Party Vendor (Former Subsidiary)
Industry: Catering
Location: South Korea
Customers Affected: 30,000 employees

Entity Name: Korean Air
Entity Type: Airline
Industry: Aviation
Location: South Korea

Entity Name: KC&D
Entity Type: Supplier
Industry: Catering and Onboard Sales
Location: South Korea
Customers Affected: Korean Air employees

Incident Response Plan Activated: Yes
Containment Measures: Emergency security measures, safety check on service integrations with KC&D
Remediation Measures: Urged KC&D to analyze the incident and prevent recurrence
Communication Strategy: Internal notice to employees, public statement via representative

Incident Response Plan Activated: Emergency security measures
Law Enforcement Notified: Reported to relevant authorities
Communication Strategy: Internal notice to employees urging vigilance against potential secondary damage
Incident Response Plan: The company's incident response plan is described as Yes, Emergency security measures.

Type of Data Compromised: Personal Information
Number of Records Exposed: 30,000
Sensitivity of Data: High (bank account numbers, names)
Personally Identifiable Information: Yes

Type of Data Compromised: Personal information
Sensitivity of Data: Low to moderate (names and phone numbers)
Personally Identifiable Information: Names and phone numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Urged KC&D to analyze the incident and prevent recurrence.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by emergency security measures and safety check on service integrations with kc&d.

Regulatory Notifications: Voluntarily reported to relevant authorities

Recommendations: Strengthen personal data protection posture, improve third-party vendor security oversight
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Strengthen personal data protection posture and improve third-party vendor security oversight.

Source: Kim Kyung-mi

Source: Yonhap News Agency

Source: IANS
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Kim Kyung-mi, and Source: Yonhap News Agency, and Source: IANS.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Internal notice to employees, public statement via representative and Internal notice to employees urging vigilance against potential secondary damage.

Stakeholder Advisories: Internal notice to employees, public statement via representative
Customer Advisories: None (no customer data affected)
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Internal notice to employees, public statement via representative and None (no customer data affected).

Corrective Actions: Further analysis of breach details, prevention of recurrence
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Further analysis of breach details, prevention of recurrence.
Last Attacking Group: The attacking group in the last incident was an Hacker group.
Most Significant Data Compromised: The most significant data compromised in an incident were Names and bank account numbers and Names and phone numbers of employees.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Emergency security measures and safety check on service integrations with KC&D.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names and bank account numbers and Names and phone numbers of employees.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 30.0K.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Strengthen personal data protection posture and improve third-party vendor security oversight.
Most Recent Source: The most recent source of information about an incident are Yonhap News Agency, IANS and Kim Kyung-mi.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Internal notice to employees, public statement via representative, .
Most Recent Customer Advisory: The most recent customer advisory issued was an None (no customer data affected).
.png)
A vulnerability was found in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/PPTPUserSetting. Performing manipulation of the argument delno results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
A vulnerability has been found in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/PPTPServer. Such manipulation of the argument ip1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in omec-project UPF up to 2.1.3-dev. This affects the function handleSessionEstablishmentRequest of the file /pfcpiface/pfcpiface/messages_session.go of the component PFCP Session Establishment Request Handler. This manipulation causes null pointer dereference. The attack may be initiated remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was detected in floooh sokol up to 16cbcc864012898793cd2bc57f802499a264ea40. The impacted element is the function _sg_pipeline_desc_defaults in the library sokol_gfx.h. The manipulation results in stack-based buffer overflow. The attack requires a local approach. The exploit is now public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is identified as 5d11344150973f15e16d3ec4ee7550a73fb995e0. It is advisable to implement a patch to correct this issue.
A security vulnerability has been detected in PbootCMS up to 3.2.12. The affected element is the function get_user_ip of the file core/function/handle.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to use of less trusted source. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.