Virgin America has notified its staff and contractors that a hacker may have gained unauthorized access to their login details.

The airlines monitoring systems spotted an intrusion attempt on March 13, 2017. After the attempt was discovered, Virgins’ incident response plan was executed and investigators were brought in and law enforcement notified of the breach.

The “login information and password that you use to access Virgin America’s corporate network” was said to have been accessed by the unauthorized third party.

The company believes follow-up phishing attacks will be targeting the company and its staff which may use the login details in an attempt to elicit further sensitive information from the impacted users, such as passwords, Social Security numbers, and bank account information.  

Reports suggest that 3,100 staff and contractors could have had their login credentials stolen, and around 110 may have also had their personal information stolen, including email addresses, Social Security numbers, and drivers license details.

This swift approach made by Virgin to spot the breach, stop the breach, act accordingly, and execute their incident response plan is a perfect example of using security best practices to limit the damage made by a data breach. Their security monitoring tools in place were able to notify them in real time that internal systems were breached and allowed them to mitigate the impact of the risk and ensure the impacted individuals were notified immediately.

This approach needs to be taken by organizations worldwide. If an organization wants to maintain security and reduce the financial fall out of these attacks, the emphasis has to change. The chances of stopping all breaches are unlikely at best with a prevention only strategy. Instead, with non-stop, continuous visibility of what is going on in the IT estate, an organization can at least spot in real-time the unusual changes that may represent a breach, and take action before it is too late.

NNT’s Breach Detection solution using Host Intrusion Detection Technology provides you with closed-loop, intelligent change control, so if and when defenses are breached, you’re alerted in real-time and can take action before data theft and damage goes too far.


Read this article on InfoSecurity Magazine






NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
1175 Peachtree St NE
Atlanta, Georgia, 30361.
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.