British Airways Data Breach 2019: Magecart Attack, £20M ICO Fine, and Lessons for Aviation
In September 2018, British Airways disclosed that its website and mobile app had been compromised for approximately two months. The attackers — later attributed to the Magecart threat group — injected malicious JavaScript into the BA booking flow, silently harvesting payment card details, names, email addresses, and travel information from around 500,000 customers before the compromise was detected. The ICO initially announced an intention to fine BA £183.39 million — the largest GDPR fine proposed in the UK at that time. After representations and the economic impact of the COVID-19 pandemic, the final fine was £20 million. The case established the benchmark for GDPR enforcement in aviation and remains the defining incident in UK aviation cybersecurity.
£20M ICO fine for British Airways — the defining GDPR enforcement action in UK aviation, covering 500,000 customers' payment and personal data.
The Magecart Attack: How BA Was Compromised
The British Airways breach was a classic Magecart supply chain attack. Attackers compromised a third-party JavaScript library loaded by the BA website — baways.com — and injected a 22-line script that intercepted payment form submissions. For 56 days between August and September 2018, the malicious script forwarded payment card details, CVV codes, names, email addresses, and billing addresses to an attacker-controlled server at a convincingly named domain. The attack was sophisticated: the malicious script only activated on the payment confirmation page, minimising its footprint. BA was not aware of the compromise until it was alerted by a third party.
- Attack vector: Compromised third-party JavaScript component loaded from the BA website
- Duration: 22 August to 5 September 2018 — 15 days of active exfiltration (ICO identified a longer compromise window)
- Data exfiltrated: Payment card data (number, CVV, expiry), name, email, billing address for ~500,000 customers
- Detection: BA was notified by an external party, not its own monitoring
- Attribution: RiskIQ and other researchers attributed the attack to Magecart — a loose consortium of criminal groups using web-skimming techniques
The ICO Investigation and £20M Fine
The ICO investigation found that British Airways had failed to implement appropriate technical and organisational security measures to protect personal data — a violation of UK GDPR Article 5(1)(f) and Article 32. The ICO's findings included: inadequate monitoring of network traffic that would have detected the exfiltration; failure to restrict third-party scripts from accessing payment pages; absence of multi-factor authentication on VPN and remote access systems; and insufficient technical controls generally for a company of BA's size and data handling volume. The original notice of intent to fine was £183.39 million. The final penalty was reduced to £20 million, reflecting representations by BA and the economic impact of COVID-19 on the airline.
What the BA Breach Means for Other Aviation Operators
The BA enforcement established several important precedents for aviation GDPR compliance:
- Third-party script risk: Any website loading third-party JavaScript — booking widgets, analytics, chat tools — introduces supply chain risk. Aviation operators must audit and monitor all third-party scripts.
- Monitoring is not optional: The ICO found BA's network monitoring was insufficient. Effective monitoring of booking flows and payment environments is a GDPR security obligation.
- MFA is baseline: BA's VPN lacked MFA. The ICO treats absence of MFA on systems handling personal data as a failure of appropriate security measures.
- Proportionality to scale: The £20M fine reflected that BA, as a major airline with 500,000 affected customers, should have had more sophisticated controls than a smaller operator.
- The ICO investigates attacks, not just breaches: The investigation focused on whether adequate controls were in place — not just on the breach outcome.
Technical Controls That Would Have Prevented or Limited the BA Breach
Specific technical controls relevant to the BA attack vector:
- Content Security Policy (CSP): A properly configured CSP would have prevented the malicious JavaScript from sending data to an external domain
- Subresource Integrity (SRI): Cryptographic verification of third-party script integrity would have detected modification of the compromised library
- Network traffic monitoring: Monitoring of outbound data flows from the payment environment would have detected unusual data exfiltration patterns
- Third-party script audit: A register of all third-party JavaScript loaded on payment pages, with regular review and monitoring
- MFA on administrative systems: Strong authentication on VPN, email, and administrative interfaces is baseline — relevant to how attackers accessed BA's environment
- PCI DSS scope management: Ensuring payment card data handling environments are properly scoped and protected under PCI DSS
The BA Breach and Aviation Regulatory Compliance in 2025
Since the BA breach, the UK aviation cybersecurity regulatory landscape has evolved significantly. CAA CAP 1753 now establishes cybersecurity expectations for all regulated aviation entities. EASA Part-IS requires documented ISMS implementation. NIS2 creates binding minimum security measures for essential entities in aviation. The BA fine remains the benchmark — but the frameworks that would have prevented the breach are now regulatory requirements, not optional best practice. Aviation operators with public-facing booking portals and mobile apps should treat the BA case as a worked example of exactly what regulators expect — and what they will examine after a breach.
Frequently Asked Questions
Was the British Airways breach a GDPR or pre-GDPR breach?
The breach occurred from 22 August 2018 — after GDPR came into force on 25 May 2018. This is why the ICO was able to investigate under GDPR and the DPA 2018 rather than the previous Data Protection Act 1998. The £20M fine was applied under the DPA 2018, which implements GDPR in the UK. The maximum fine under the old DPA 1998 regime would have been £500,000 — the BA case demonstrates the step-change in enforcement power that GDPR created.
Why was the original £183M fine reduced to £20M?
The ICO issued a Notice of Intent to fine £183.39 million in July 2019 — reflecting 1.5% of BA's 2017 global turnover. Following representations by BA and the ICO's consideration of the COVID-19 pandemic's impact on the airline industry, the final penalty was reduced to £20 million. The ICO also considered BA's cooperation with the investigation and steps taken after the breach. The reduction was significant but the £20M fine remains the largest GDPR fine the ICO has issued to a UK-based company.
What cybersecurity controls did the ICO say BA should have had?
The ICO's investigation identified that BA should have had: multi-factor authentication on VPN and remote access; restricted third-party script access to payment pages; network traffic monitoring capable of detecting unusual data exfiltration; and more robust testing of its systems and controls given the volume and sensitivity of personal data processed. The ICO did not specify exact technologies but found that BA's controls were insufficient relative to its size, the nature of its data processing, and available best practice.
Does PCI DSS compliance overlap with the GDPR security requirements that BA failed?
There is significant overlap. PCI DSS requires network monitoring, access control, and system testing that aligns with the GDPR Article 32 security requirements the ICO found BA failed to meet. However, PCI DSS compliance does not automatically satisfy GDPR security obligations — they have different scopes and requirements. The BA breach demonstrated that PCI DSS certification does not guarantee GDPR-adequate security, particularly for third-party script risks that PCI DSS v3 did not address as comprehensively as v4 (published 2022).
Get a booking flow security review
Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.
Get in touchReady to secure your iGaming operation?
MGA-licensed operators across Malta trust Kyanite Blue.