Korean Air Confirms 30,000 Employee Records Stolen in Supplier Breach
Hackers exploited Oracle EBS vulnerability at catering subsidiary to steal employee data including bank account numbers. Second major Korean airline breach this week.
Korean Air has confirmed that hackers stole personal information for approximately 30,000 current and former employees through a breach at its former subsidiary, Korean Air Catering & Duty-Free (KC&D). The incident marks the second major data breach affecting a South Korean airline in less than a week.
The attackers exploited a vulnerability in Oracle E-Business Suite (EBS) to gain access to KC&D's systems. While KC&D was spun off from Korean Air, it continues to serve as the airline's catering supplier, maintaining access to employee data from their shared operational history.
What Was Stolen
The compromised data includes:
- Employee names
- Bank account numbers
- Contact information
- Employment records for both current and former staff
Bank account exposure is particularly concerning. Unlike email addresses or phone numbers, changing bank accounts is disruptive and time-consuming. Affected employees now face the inconvenience of monitoring for fraudulent transactions or switching accounts entirely.
Korean Air hasn't disclosed when the breach occurred or how long attackers maintained access. The company is reportedly working with cybersecurity firms to assess the full scope and implement additional protections.
Oracle EBS Vulnerabilities
Oracle E-Business Suite has been a recurring target for attackers. The integrated business software platform handles everything from HR and payroll to supply chain management, making it a high-value target. When exploited, EBS vulnerabilities can expose the sensitive operational data flowing through these systems.
Organizations running EBS should review their patch status. Oracle releases quarterly Critical Patch Updates, but many enterprises lag behind on updates due to the complexity of testing changes against customized implementations.
Second Korean Airline Hit This Week
The Korean Air incident follows closely behind a separate breach at Asiana Airlines, which disclosed that information for approximately 10,000 employees may have been compromised. Investigators haven't found evidence linking the two incidents, but the timing raises questions about whether threat actors are specifically targeting South Korean aviation.
Both airlines carry sensitive passenger and employee data, and their operational systems connect to airport infrastructure across Asia. A determined adversary could use employee credentials as a foothold for deeper network access.
Supply Chain Risk on Display
This breach demonstrates why third-party risk management matters. Korean Air spun off KC&D, but the catering company retained access to employee data from their shared history. That data became the attack surface.
Supply chain compromises have become one of the most reliable paths into enterprise networks. Attackers know that large organizations often have better security than their vendors, partners, and subsidiaries. Targeting the weaker link gets results.
For security teams, the takeaway is straightforward: audit data sharing relationships with former subsidiaries and current suppliers. Understand what data they hold, how they protect it, and whether that access is still necessary.
What Affected Employees Should Do
Korean Air employees—past and present—should take immediate precautions:
- Monitor bank accounts for unauthorized transactions. Set up alerts if your bank offers them.
- Be suspicious of communications claiming to be from Korean Air or KC&D. Attackers often use stolen data for targeted phishing.
- Consider account changes if you're particularly concerned. Talk to your bank about fraud protection options.
- Watch for identity theft beyond banking. Employee data can be combined with other breached datasets.
Why This Matters
Korean Air is a major international carrier and one of the largest airlines in Asia. A breach affecting 30,000 employees represents a significant incident, but the Oracle EBS exploitation method is what security teams should pay attention to.
EBS deployments are common across industries. Many were implemented years ago and have accumulated technical debt that makes patching difficult. The same vulnerabilities that exposed Korean Air's supplier could exist in manufacturing, retail, and healthcare organizations running similar configurations.
The aviation sector specifically has seen increased attention from both criminal groups and state-sponsored actors. Airlines handle passenger manifests, loyalty program data, and operational information that intelligence services find valuable. Employee data provides a starting point for social engineering attacks aimed at more sensitive systems.
South Korea's Personal Information Protection Commission will likely investigate both airline incidents. Under Korean data protection law, companies face penalties for inadequate security measures. Whether KC&D's Oracle EBS configuration met regulatory standards will be part of that review.
Related Articles
ShinyHunters Demands $1.5M From Wynn Resorts Over Stolen Data
ShinyHunters claims 800,000+ Wynn Resorts employee records including SSNs, salaries, and personal details. Group demands 22 Bitcoin by February 23, exploited Oracle PeopleSoft.
Feb 23, 2026Australian Court Files Exposed via Third-Party Offshoring Breach
VIQ Solutions confirms sensitive Australian court data including domestic violence and national security cases accessed by unauthorized Indian subcontractor e24 Technologies.
Feb 23, 2026Flickr Breach Exposes User Data via Email Vendor Flaw
Flickr discloses a data breach through a third-party email provider vulnerability that exposed names, emails, and IP addresses for up to 35 million users.
Feb 8, 2026Ingram Micro Confirms Ransomware Breach Affecting 42,000
SafePay ransomware group allegedly stole 3.5TB from the $48B IT distributor. Employee SSNs, passports, and performance reviews exposed.
Jan 20, 2026