Cebu Pacific’s GetGo server breached

Aika Rey

This is AI generated summarization, which may have errors. For context, always refer to the full article.

Cebu Pacific’s GetGo server breached
(UPDATED) Hackers' group Pinoy LulzSec claims responsibility for the breach

UNAVAILABLE. Cebu Pacific's GetGo website is unavailable as of April 25, 2019. Screenshot from GetGo website

MANILA, Philippines (UPDATED) – The rewards platform of Cebu Pacific, GetGo, experienced unauthorized access to its server, prompting the budget carrier to shut it down temporarily and launch a probe.

In a statement on Thursday, April 25, Cebu Pacific said the GetGo application server was breached on Wednesday night, April 24.

“Cebu Pacific confirms that there was an unauthorized access to a GetGo application server last night. This server has been secured. We can also confirm that credit card information was not stored on that server,” Cebu Pacific said.

Hackers’ group Pinoy LulzSec, in a tweet on Wednesday night, claimed responsibility for the breach.

“Large data breach coming from GetGo to [Cebu Pacific]. Active directory is life,” the Pinoy LulzSec account tweeted, seemingly done by a person with the alias “Kangkong.”

 

The hackers’ group also tagged the National Privacy Commission (NPC) in another tweet, saying it may want to “ping Cebu Pacific for the breach notification.”

Cebu Pacific said on Thursday that it temporarily disabled logging into its website and mobile app using GetGo credentials.

“All GetGo online channels have also been temporarily disabled as we continue to investigate the matter. We have informed the National Privacy Commission, and are working with them on the investigation,” the airline said.

Cebu Pacific gave assurances that both its website and mobile app remain secure.

NPC probe

In a separate statement, Privacy Commissioner Mon Liboro said Cebu Pacific emailed a preliminary notification to the NPC at 11:37 am on Thursday.

“In the notification, the company’s data protection officer Randall Evangelista said the ‘extent and nature’ of the breach is still being determined,” Liboro said.

The NPC asked Evangelista “to also ascertain if there is a need to inform affected data subjects of the breach” and to relay measures they can take to protect themselves.

“We have instructed Evangelista to personally report tomorrow (Friday, April 26) to the NPC complaints and investigation team,” added Liboro.

In 2018, Pinoy LulzSec was also responsible for defacing several government websites, some of which experienced leakage of information to the public.

Back in 2016, a group known as LulzSec Pilipinas hacked into the Commission on Elections database– Rappler.com

Add a comment

Sort by

There are no comments yet. Add your comment to start the conversation.

Summarize this article with AI

How does this make you feel?

Loading
Download the Rappler App!
Sleeve, Clothing, Apparel

author

Aika Rey

Aika Rey is a business reporter for Rappler. She covered the Senate of the Philippines before fully diving into numbers and companies. Got tips? Find her on Twitter at @reyaika or shoot her an email at aika.rey@rappler.com.