Stay updated with the latest Cybersecurity News on our TecnetBlog.

Iberia Data Breach: What Happened and What Customers Should Do

Written by Adan Cuevas | Nov 25, 2025 1:15:00 PM

When an airline the size of Iberia confirms a security incident, it’s never a minor issue. In this case, the breach didn’t occur within Iberia’s own systems but rather through a third-party vendor. Still, that didn’t prevent customer data from being exposed.

At TecnetOne, we break down what happened, what was compromised, and why this incident is a reminder of how fragile an unprotected digital supply chain can be.

 

What Really Happened: The Weak Link Was a Vendor

 

Iberia notified its customers about a security incident stemming from a vendor with access to the airline’s information. While Iberia maintains its own security controls, the attacker exploited a vulnerability in the external provider to access passenger data.

The breach involved the exposure of:

 

  1. Full names

 

  1. Email addresses

 

  1. Iberia Plus (Loyalty Club) membership numbers

 

The airline clarified that passwords, account access, and financial data were not compromised—some relief in an otherwise troubling event.

At TecnetOne, we often say: your cybersecurity is only as strong as your weakest vendor.

 

Iberia’s Official Response: Activating Its Security Protocol

 

In the customer notification, Iberia stated that it detected unauthorized access to data stored by a provider. Upon discovery, the company immediately activated its incident response protocol, which included:

 

  1. Technical measures to contain the breach

 

  1. Increased system monitoring

 

  1. Reinforcement of account change procedures

 

  1. Notification to regulatory authorities

 

  1. Direct coordination with the affected vendor

 

So far, Iberia says there’s no evidence the leaked data has been used fraudulently, but it urged customers to stay alert for suspicious emails or phishing attempts.

Notably, the airline has not disclosed the vendor’s name or the specific attack vector—common during ongoing investigations, but it leaves uncertainty about the full scope.

 

Read more: The Hidden Cost of Supply Chain Breaches (And How to Stop It)

 

Hacker Claims to Have 77 GB of Iberia Internal Data

 

Shortly after Iberia’s announcement, a malicious actor claimed on underground forums to possess 77 GB of Iberia’s internal data and offered it for sale at $150,000.

According to information shared by Hackmanac, the leaked package allegedly includes:

 

  1. Technical documents for A320 and A321 aircraft

 

  1. Maintenance AMP files

 

  1. Engine-related data

 

  1. Signed internal documents

 

  1. Files labeled under ISO 27001 and ITAR protocols

 

If this claim proves true, the breach goes far beyond customer data—it could affect aircraft operations, maintenance procedures, and internationally regulated processes.

Iberia has yet to confirm or deny the authenticity of the 77 GB claim. But even a partial leak could pose major risks.

 

Are We Facing One or Two Incidents?

 

This raises a major question:

Are the vendor-related breach and the 77 GB claim part of the same incident?

There are two possible scenarios:

 

Scenario A – Same Incident:

 

The vendor had access to both customer and technical documentation, and the attacker exploited this to extract everything.

 

Scenario B – Two Separate Attacks:

 

The vendor breach exposed only limited customer data, while the 77 GB claim results from a second, undisclosed intrusion.

This is common in the aviation sector, where systems are often siloed. And while Iberia denies a large-scale internal breach, the lack of detail leaves room for speculation.

Based on our global monitoring experience at TecnetOne, both scenarios are technically plausible.

 

You might also be interested in: Aeroméxico Suffers Alleged Cyberattack: 30 Million Records at Risk

 

Why Supply Chain Attacks Keep Rising

 

This case reinforces a clear trend: cybercriminals increasingly target not just the primary company, but its suppliers, contractors, integrators, and third-party services.

Why?

 

  1. Weaker security measures

 

  1. Legitimate access to critical systems

 

  1. Handling of sensitive third-party data

 

  1. Slower breach detection

 

From SolarWinds to MOVEit, from Kaseya to Iberia—the pattern is the same: the vendor is the easiest way in.

That’s why at TecnetOne, we emphasize continuous audits, strict segmentation, cybersecurity clauses in contracts, and regular third-party risk testing.

 

What Iberia Customers Should Do Now

 

While Iberia insists there’s no financial fraud risk, if you're an Iberia or Iberia Plus user, it’s wise to take precautions:

 

  1. Be wary of emails requesting personal info or passwords

 

  1. Don’t click on links claiming to be from Iberia—verify the URL

 

  1. Ensure communications come from official domains

 

  1. Change your password if you use the same one on other sites

 

  1. Enable two-factor authentication on any linked accounts

 

Most post-breach attacks are phishing or impersonation, not technical exploits.

 

Conclusion: One Incident, One Big Lesson

 

The Iberia breach proves once again: a company’s cybersecurity isn’t just about its own systems. It’s about its entire vendor ecosystem.

You can invest millions in internal protection, but if a third-party vendor uses weak credentials, outdated protocols, or flawed processes, it becomes the perfect gateway for attackers.

For an international airline, the impact goes beyond business: it affects compliance, reputation, and customer trust.

At TecnetOne, we always say: cybersecurity isn’t a product—it’s an ecosystem. And any weak link in that chain leaves you exposed.