Incident Details
Victimized Company: | CommuteAir |
Incident Dates: | 2023-01-19 to 2023-01-19 |
Disclosure Date: | 2023-01-19 |
Current Status: | Incident contained |
Victimized Company: | CommuteAir |
Incident Dates: | 2023-01-19 to 2023-01-19 |
Disclosure Date: | 2023-01-19 |
Current Status: | Incident contained |
In January of 2023, CommuteAir suffered a breach that exposed the US Department of Homeland Security’s “No Fly” and Selective Screening lists containing over 1.5 million records, along with CommuteAir employee information. The attacker found an exposed Jenkins server and was able to access different build workspaces containing repositories for the build jobs. On the Jenkins server, the attacker found access keys that offered access to the CommuteAir environment. After investigating the AWS Infrastructure, the attacker found the No Fly List among test data on the Jenkins server.
In January 2023, an attacker began scanning the internet for exposed Jenkins servers using ZoomEye, a Chinese search engine similar to Shodan. Using ZoomEye, the attacker found an exposed Jenkins server that belonged to a regional airline, CommuteAir. This exposed Jenkins server gave the attacker access to repositories for around 70 different build jobs. While most of these projects were smaller, one project involved ACARS, a digital data link system for transmitting short messages between aircraft and ground stations. With a quick look at the directory, the attacker was able to access an SFTP server filled with incoming and outgoing ACARS messages. The attacker also gained access to APIs that controlled refueling, canceling, and updating flights.
The two projects that caught the attacker’s eye were “noflycomparison and noflycomparsionv2.” These projects contained hard-coded credentials and the names of S3 buckets related to the no-fly list. Using these credentials, the attacker accessed most of CommuteAir’s AWS infrastructure, including S3 buckets, dynamodb tables, and various servers.
While CommuteAir didn’t persist the No Fly Lists in S3, the attacker was able to find a copy in the repositories’ test data. The test data contained 3 CSV with employee information, The US Government’s No Fly list, and the Selective Screening List. These highly sensitive lists contained over 1.5 million records of different names. It was later discovered that this list is from 2019. The attacker then made the data available at DDOS Secrets.
Date | Event |
---|---|
January 19th, 2023 | maia arson crimew published her blog post outlining how she found the Jenkins servers and was able to download the No Fly List. |
January 25th, 2023 | TSA began an investigation |
Maia arson crimew, also known as Tillie Kottman, claimed responsibility. Kottman posted on her blog the technical details of how the breach occurred. Kottman was previously indicted on conspiracy to commit computer fraud, wire fraud, and aggravated identity fraud in 2021. Kottman currently remains in Switzerland.