The No-Fly List Has Been Leaked, TSA Investigating ‘Cybersecurity Incident’

Image for article titled The No-Fly List Has Been Leaked, TSA Investigating 'Cybersecurity Incident'

The Transportation Safety Administration’s No-Fly Checklist is without doubt one of the most vital ledgers in the US, containing because it does the names of people who find themselves perceived to be of such a risk to nationwide safety that they’re not allowed on airplanes. You’d have been forgiven then for considering that checklist was a tightly-guarded state secret, however lol, nope.

A Swiss hacker often known as “maia arson crimew” has bought maintain of a replica of the checklist—albeit a model from just a few years in the past—not by getting previous fortress-like layers of cybersecurity, however by…discovering a regional airline that had its knowledge mendacity round in unprotected servers. They introduced the invention with the photograph and screenshot above, through which the Pokémon Sprigatito is wanting awfully happy with themselves.

As they explain in a blog post detailing the process, crimew was poking round on-line after they discovered that CommuteAir’s servers had been simply sitting there:

like so many different of my hacks this story begins with me being bored and looking shodan (or effectively, technically zoomeye, chinese language shodan), in search of uncovered jenkins servers which will include some attention-grabbing items. at this level i’ve most likely clicked via about 20 boring uncovered servers with little or no of any curiosity, when i instantly begin seeing some familar phrases. “ACARS”, plenty of mentions of “crew” and so forth. plenty of phrases i’ve heard earlier than, most probably whereas binge watching Mentour Pilot YouTube movies. jackpot. an uncovered jenkins server belonging to CommuteAir.


Amongst different “delicate” info on the servers was “NOFLY.CSV”, which hilariously was precisely what it says on the field: “The server contained knowledge from a 2019 model of the federal no-fly checklist that included first and final names and dates of delivery,” CommuteAir Company Communications Supervisor Erik Kane told the Daily Dot, who worked with crimew to sift through the data. “As well as, sure CommuteAir worker and flight info was accessible. Now we have submitted notification to the Cybersecurity and Infrastructure Safety Company and we’re persevering with with a full investigation.”

That “worker and flight info” contains, as crimew writes:

grabbing pattern paperwork from varied s3 buckets, going via flight plans and dumping some dynamodb tables. at this level i had discovered just about all PII conceivable for every of their crew members. full names, addresses, telephone numbers, passport numbers, pilot’s license numbers, when their subsequent linecheck is due and way more. i had journey sheets for each flight, the potential to entry each flight plan ever, a complete bunch of picture attachments to bookings for reimbursement flights containing but once more extra PII, airplane upkeep knowledge, you identify it.


The government is now investigating the leak, with the TSA telling the Each day Dot they’re conscious of a possible cybersecurity incident, and we’re investigating in coordination with our federal companions”.

For those who’re questioning simply what number of names are on the checklist, it’s laborious to inform. Crimew tells Kotaku that on this model of the information “there are about 1.5 million entries, however given lots are completely different aliases for various folks it’s very laborious to know the precise variety of distinctive folks on it” (a 2016 estimate had the numbers at “2,484,442 information, consisting of 1,877,133 particular person identities”).


Apparently, given the checklist was uploaded to CommuteAir’s servers in 2022, it was assumed that was the 12 months the information had been from. As an alternative, crimew tells me “the one motive we [now] know [it] is from 2019 is as a result of the airline retains confirming so in all their press statements, earlier than that we assumed it was from 2022.”

You’ll be able to take a look at crimew’s weblog here, whereas the Each day Dot put up—which says names on the checklist embrace members of the IRA and an eight year-old—is here.


Leave a Reply

Your email address will not be published. Required fields are marked *