Company Details
airasia
14,245
919,986
481
airasia.com
0
AIR_3357924
In-progress


AirAsia Vendor Cyber Rating & Cyber Score
airasia.comIt all starts here. 23 years ago, a dream took flight - shaping and forever changing the travel industry in Asia. The idea was simple: Make flying affordable for everyone. We made that dream happen. We started an airline in 2001. Today, we’ve evolved to become something much bigger. We’re now a world-class brand, a leading Asean airline, a digital travel and lifestyle platform; and we’re not stopping. If you’re passionate about connecting people and transforming lives, we want you onboard. When it comes to your career, your Allstar journey will be an adventure. Find your dream career destination with us.
Company Details
airasia
14,245
919,986
481
airasia.com
0
AIR_3357924
In-progress
Between 600 and 649

AirAsia Global Score (TPRM)XXXX

Description: Qilin Ransomware Group Claims Attack on Malaysia Airlines The Qilin ransomware gang has listed Malaysia Airlines on its dark web leak site, marking the latest in a series of cyberattacks targeting the aviation sector. The group, which operates under a ransomware-as-a-service (RaaS) model, has rapidly escalated its activities, emerging as the most active ransomware operation of 2025 with over 1,000 victims that year and more than 200 additional claims in early 2026. The incident, dated February 22, 2026, remains unconfirmed by Malaysia Airlines or investigators, as Qilin has yet to provide proof of stolen data unlike its typical tactic of releasing file samples to pressure victims. The lack of evidence leaves uncertainty about whether the attack involved a confirmed breach, a failed intrusion, or a negotiation ploy. No details have been disclosed regarding potential exposure of passenger data, employee records, or operational systems. This follows a March 2025 ransomware attack on Kuala Lumpur International Airport (KLIA), also attributed to Qilin, which disrupted flight information displays, check-in systems, and baggage handling for over 10 hours. The aviation industry has become a prime target for ransomware groups, drawn by the combination of operational leverage and access to sensitive personal and corporate data. Qilin, linked to Russian cybercriminal networks, has expanded its victim pool beyond traditional sectors like finance and healthcare to include critical infrastructure, government agencies, and transportation entities. Past attacks on airlines and airports have exposed passenger names, passport details, and internal documents, raising concerns about identity fraud and phishing risks. Malaysia’s aviation sector has faced repeated cyber threats, including a 2022 ransomware attack on AirAsia by the Daixin Team and a 2020–2021 data breach at Malaysia Airlines. While the current claim lacks verification, analysts note that ransomware groups often withhold evidence during negotiations, with data dumps or public disclosures occurring only if talks fail. The incident underscores the growing vulnerability of global aviation to cyber extortion, with ransomware gangs increasingly prioritizing high-impact targets for financial gain and operational disruption.
Description: AirAsia Group was targeted by Daixin ransomware group that exposed 5M UNIQUE Passenger personal data, and all employee's personal data leaked. The exposed information includes the date of birth, country of birth, where that person is from when employed for employees and the “secret question and answer” used to secure accounts. The group claims that after encrypting its database and requesting an unspecified price to unlock it and reveal how it gained access to the network, it gave AirAsia a sample of the data. In order to avoid encrypting or destroying anything that would be life-threatening, Daixin Team stated it had avoided locking up crucial files linked to flying equipment. However, it has entirely restricted access to staff and passenger records until payment has been received.


AirAsia has 41.52% fewer incidents than the average of same-industry companies with at least one recorded incident.
AirAsia has 14.53% fewer incidents than the average of all companies with at least one recorded incident.
AirAsia reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
AirAsia cyber incidents detection timeline including parent company and subsidiaries

It all starts here. 23 years ago, a dream took flight - shaping and forever changing the travel industry in Asia. The idea was simple: Make flying affordable for everyone. We made that dream happen. We started an airline in 2001. Today, we’ve evolved to become something much bigger. We’re now a world-class brand, a leading Asean airline, a digital travel and lifestyle platform; and we’re not stopping. If you’re passionate about connecting people and transforming lives, we want you onboard. When it comes to your career, your Allstar journey will be an adventure. Find your dream career destination with us.


We’re on a mission to make low-cost travel easy. Whatever your role, you’ll connect millions of people to what they love using Europe’s best airline network, great value fares, and friendly service. And to help us get there we’ll give you everything you need to make a personal impact on our growing
Welcome aboard Singapore Airlines on LinkedIn. Discover travel inspirations, business travel tips, cultural insights, our latest updates, and more. Singapore Airlines is a global company dedicated to providing air transportation services of the highest quality and to maximising returns for the ben
We’re creating an airline people love. It begins with each Alaska Airlines employee, bringing unique strengths and energy to our work in the air and on the ground. Every day, we go beyond what’s expected and reach for the remarkable, together. Welcome to our LinkedIn page. We like conversations on
!BIenvenido al sitio oficial! Avianca es la primera aerolínea comercial fundada en las Américas y la segunda en el mundo. Enfocados en alcanzar la excelencia y eficiencia operacional, se dio marcha a una profunda reorganización de los procesos, la cual ha estado acompañada de la modernización

Welcome to AISATS! As India's leading gateway services company headquartered in Mumbai and operating in Delhi, Bengaluru, Hyderabad, Thiruvananthapuram, Mangaluru and Ranchi airports, we at AISATS, care for our client airlines and their passengers. Our customers know when they do business with us
Qatar Airways is the national airline of the State of Qatar. Based in Doha, the Airline’s trendsetting on-board product focuses on: comfort, fine cuisine, the latest in-flight audio & video entertainment, award-winning service and one of the youngest and most advanced aircraft fleet in the sky. Awa
Red. Hot. Spicy. That’s not just our tagline, it’s how we fly. Red reflects the bold spirit we bring to every journey, energetic, passionate, and full of heart. Hot captures the warmth of our service and the vibrant destinations we connect. Spicy is our drive to keep travel exciting through innovati

JetBlue — New York's Hometown Airline — was born at JFK in 1999 with the mission of bringing humanity back to air travel, and is now a leading carrier in NYC, Boston, Fort Lauderdale, Orlando, and San Juan. JetBlue serves 40M+ customers annually, with low fares and award-winning service to 100+ dest

People. Passion. Pride. These have driven our team since 1833. Since that time, we have developed to become a critical partner in the global aviation industry, delivering time-critical logistics services at over 350 locations in 65 countries, across six continents. But at the heart of our
.png)
Qilin ransomware has listed Malaysia Airlines on its leak site without providing proof or data samples, raising new questions about possible...
Malaysia has launched the Civil Aviation Authority of Malaysia (CAAM) Cybersecurity Framework and Policy, a move designed to bolster the...
KUALA LUMPUR (Nov 23): AirAsia Group fell victim to a ransomware attack earlier this month on Nov 11 and 12 by Daixin Team. According to DataBreaches...
In a symbolic gesture celebrating the role of the media, Communications Minister Datuk Fahmi Fadzil announced that AirAsia will name one of...
Malaysia-based Capital A's online travel agent (OTA) platform AirAsia MOVE has achieved higher monthly active users (MAUs) and number of...
The AirAsia group has expressed plans to establish a maintenance, repair, and operations (MRO) facility in the Philippines, according to the Department of...
On Friday, a flawed update from U.S. cybersecurity company CrowdStrike crashed Windows PCs all over the world, with computers displaying the...
Emerging largely unharmed from the global tech disruption shows that mainland China's push for 'safe and controllable' computing systems has...
Indonesia AirAsia ensured that all flight operations on Saturday, July 20, 2024, began to gradually normalize after experiencing disruptions due to global IT...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of AirAsia is http://www.airasia.com.
According to Rankiteo, AirAsia’s AI-generated cybersecurity score is 636, reflecting their Poor security posture.
According to Rankiteo, AirAsia currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, AirAsia has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, AirAsia is not certified under SOC 2 Type 1.
According to Rankiteo, AirAsia does not hold a SOC 2 Type 2 certification.
According to Rankiteo, AirAsia is not listed as GDPR compliant.
According to Rankiteo, AirAsia does not currently maintain PCI DSS compliance.
According to Rankiteo, AirAsia is not compliant with HIPAA regulations.
According to Rankiteo,AirAsia is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
AirAsia operates primarily in the Airlines and Aviation industry.
AirAsia employs approximately 14,245 people worldwide.
AirAsia presently has no subsidiaries across any sectors.
AirAsia’s official LinkedIn profile has approximately 919,986 followers.
AirAsia is classified under the NAICS code 481, which corresponds to Air Transportation.
No, AirAsia does not have a profile on Crunchbase.
Yes, AirAsia maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/airasia.
As of April 02, 2026, Rankiteo reports that AirAsia has experienced 2 cybersecurity incidents.
AirAsia has an estimated 3,760 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: AirAsia Group Data Breach by Daixin Ransomware
Description: AirAsia Group was targeted by Daixin ransomware group that exposed 5 million unique passenger personal data, and all employee's personal data leaked. The exposed information includes the date of birth, country of birth, where that person is from when employed for employees and the “secret question and answer” used to secure accounts. The group claims that after encrypting its database and requesting an unspecified price to unlock it and reveal how it gained access to the network, it gave AirAsia a sample of the data. In order to avoid encrypting or destroying anything that would be life-threatening, Daixin Team stated it had avoided locking up crucial files linked to flying equipment. However, it has entirely restricted access to staff and passenger records until payment has been received.
Type: Ransomware
Threat Actor: Daixin Ransomware Group
Motivation: Financial Gain
Title: Qilin Ransomware Group Claims Attack on Malaysia Airlines
Description: The Qilin ransomware gang has listed Malaysia Airlines on its dark web leak site, marking the latest in a series of cyberattacks targeting the aviation sector. The incident remains unconfirmed by Malaysia Airlines or investigators, with no proof of stolen data provided by Qilin. The attack may involve a confirmed breach, a failed intrusion, or a negotiation ploy, but details about potential exposure of passenger data, employee records, or operational systems are undisclosed.
Date Detected: 2026-02-22
Date Publicly Disclosed: 2026-02-22
Type: Ransomware
Threat Actor: Qilin ransomware gang
Motivation: Financial gain, operational disruption
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Passenger personal data, Employee personal data
Systems Affected: Database
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Data, , Passenger Names, Passport Details, Internal Documents and .

Entity Name: AirAsia Group
Entity Type: Airline
Industry: Aviation
Customers Affected: 5 million passengers and all employees

Entity Name: Malaysia Airlines
Entity Type: Airline
Industry: Aviation
Location: Malaysia

Type of Data Compromised: Personal data
Number of Records Exposed: 5 million unique passenger personal data, All employee personal data
Sensitivity of Data: High
Personally Identifiable Information: Date of birthCountry of birthEmployment locationSecret question and answer

Type of Data Compromised: Passenger names, Passport details, Internal documents
Sensitivity of Data: High
Personally Identifiable Information: Potential

Ransom Demanded: Unspecified price
Ransomware Strain: Daixin
Data Encryption: Yes
Data Exfiltration: Yes

Ransomware Strain: Qilin
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Dark web leak siteDate Accessed: 2026-02-22.

Investigation Status: Unconfirmed
Last Ransom Demanded: The amount of the last ransom demanded was Unspecified price.
Last Attacking Group: The attacking group in the last incident were an Daixin Ransomware Group and Qilin ransomware gang.
Most Recent Incident Detected: The most recent incident detected was on 2026-02-22.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2026-02-22.
Most Significant Data Compromised: The most significant data compromised in an incident were Passenger personal data, Employee personal data and .
Most Significant System Affected: The most significant system affected in an incident was Database.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Passenger personal data and Employee personal data.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 5.0M.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was Unspecified price.
Most Recent Source: The most recent source of information about an incident is Dark web leak site.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Unconfirmed.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.