Show menu

Iberia Data Breach Exposes Customer Loyalty Details

Travelers queue at Iberia check in desks in Madrid after an Iberia customer data breach exposes loyalty account details and raises phishing risks
8 min read

Key points

  • Iberia says a third party supplier breach exposed some customer names emails and Iberia Club loyalty numbers
  • The airline reports no passwords payment card details or passport data were compromised in the incident
  • A threat actor claims to hold about 77 gigabytes of Iberia related data for sale while investigations continue
  • The Iberia incident follows cyberattacks against Qantas Hawaiian WestJet Air France KLM and Aeroflot in 2025
  • Travelers face higher risks of phishing targeted scams and potential loyalty point fraud after airline data breaches

Impact

Where Impacts Are Most Likely
The greatest impacts are on Iberia Club accounts linked to exposed email addresses and on any other travel accounts that reuse the same contact details
Account Security Priorities
Focus first on strengthening email security enabling multifactor authentication and checking Iberia Club activity for unfamiliar redemptions or profile changes
Onward Travel And Changes
Existing bookings are operating normally but travelers should be alert to fake schedule change emails and always confirm trips through official Iberia channels
What Travelers Should Do Now
Update passwords where reused add multifactor authentication where possible watch for phishing attempts and monitor loyalty balances and statements closely
Some of the links and widgets on this page are affiliates, which means we may earn a commission if you use them, at no extra cost to you.

A newly disclosed Iberia customer data breach tied to a third party supplier in Spain is now under investigation after emails went to affected travelers on November 23, 2025, warning that names, email addresses, and loyalty numbers may have been exposed. Iberia, Spain s flag carrier and part of International Airlines Group, says the compromise occurred on systems run by an external technology contractor rather than its own core infrastructure. While flights are operating normally, the incident raises fresh concerns about how airline data is handled and what travelers need to do to keep loyalty accounts and inboxes safe.

In plain terms, the Iberia customer data breach involves unauthorized access to a supplier system that stored basic personal details and Iberia Club loyalty identifiers, which increases phishing and social engineering risk for customers even though passwords and payment data were not taken.

What We Know About The Iberia Customer Data Breach

According to breach notification emails shared by threat intelligence firms and later confirmed by Iberia, an attacker accessed systems operated by one of the airline s suppliers and copied some customer data. The airline says the exposed information may include a passenger s first and last name, email address, and Iberia Club loyalty card identification number. At this stage, Iberia reports no evidence that account passwords, banking information, or full payment card details were stored on the affected system or accessed during the incident.

Iberia says it activated its security protocols as soon as the breach came to light, including working with the vendor to contain the intrusion, tightening controls around profile changes, and notifying regulators and law enforcement. One concrete change already rolled out is an extra verification step when customers attempt to change the email address associated with their Iberia account, a move meant to make it harder for criminals to hijack profiles using stolen contact data.

At the same time, multiple cybersecurity outlets have highlighted a separate listing on a criminal forum where a threat actor claims to be selling about 77 gigabytes of Iberia related data, including technical documentation and internal files, for a six figure sum. Investigators have not yet confirmed whether that listing reflects the same incident as the supplier breach or a second, deeper compromise, but its existence underscores how much is still unknown.

Background: How Third Party Airline Data Breaches Work

Although Iberia is the brand travelers recognize, the systems that touch their data often belong to a patchwork of external vendors that handle contact centers, customer support software, marketing platforms, or analytics. In this case, Iberia s own statements point to an Iberia supplier as the source of the compromise, not a direct break in to the airline s main systems.

Third party breaches like this typically happen when attackers target a vendor that manages large volumes of customer data for many clients but may have less mature security controls. If the vendor runs a service such as a customer relationship management or ticketing system, a single compromise can expose names, email addresses, loyalty numbers, and other details for millions of people in one move. For travelers, the practical effect is the same as if the airline had been hacked directly, because criminals can still use that information to craft convincing phishing messages or attempt account resets elsewhere.

Airlines As A Growing Cyber Target

Iberia is joining a long and growing list of airlines that have disclosed cyber incidents in 2025. Earlier in the year, Qantas reported a major data breach at a third party customer service platform that exposed personal details, including names, contact information, and frequent flyer numbers for millions of customers, though financial and passport data were not affected.

Around the same time, Canadian carrier WestJet and Hawaiian Airlines confirmed their own cyber incidents that disrupted internal systems and raised questions about data exposure, while Air France and KLM later acknowledged that a supplier breach had compromised customer contact details and Flying Blue loyalty information, again without touching card numbers or passwords. Russian airline Aeroflot has also been cited in analyses of this year s airline cyberattacks.

Security analysts have tied several of these attacks to sophisticated criminal groups that specialize in social engineering, for example impersonating staff to trick help desks into granting access to third party platforms. Industry reviews published in mid 2025 describe the aviation sector as a prime target because airlines rely on many interconnected vendors and hold rich datasets on customer identities, travel histories, and loyalty balances, all of which can be abused in extortion schemes or fraud attempts.

What This Means For Iberia Customers

For travelers with Iberia Club accounts, the most immediate risk is not someone logging directly in to their profile with a stolen password, but rather someone using the leaked details to make scams more believable. Knowing that a person flies with Iberia, has a loyalty card, and uses a particular email address allows criminals to send targeted messages that appear to come from Iberia or from partner airlines, banks, or card issuers.

These phishing attempts could claim that a flight has changed, that miles are expiring, or that identity verification is required, then direct recipients to fake login pages that capture real passwords or payment information. In other cases, attackers might try to reset passwords on other websites where the same email address is used, especially if that email inbox itself is not protected by multifactor authentication.

There is also a smaller but real risk of loyalty point fraud. While Iberia says it has no evidence of fraudulent use at this time, criminals who manage to combine leaked loyalty numbers with other stolen information could attempt to redeem miles, transfer balances, or book tickets that are later resold. That is another reason to keep a close eye on account activity over the coming weeks.

How Iberia Travelers Can Protect Themselves

Even though Iberia reports that passwords and payment data were not taken in this breach, there are several practical steps travelers should take now to reduce their exposure.

First, strengthen the security of the email account linked to your Iberia Club profile. If multifactor authentication, often called two step verification, is not enabled on that inbox, turning it on will make it much harder for attackers to hijack your email and then reset passwords elsewhere.

Second, if you have reused the same or similar passwords between your Iberia logins and other travel services, bank portals, or email accounts, this is a good moment to break that pattern. Use a unique, strong password for each important service, ideally stored in a reputable password manager, so that a compromise in one place does not cascade to others.

Third, monitor Iberia Club and any linked partner accounts for unusual activity. That includes redemptions you do not recognize, sudden changes to contact details or security questions, or new bookings that you did not make. If something looks off, contact Iberia through official channels, such as the airline s website, app, or published customer service numbers, rather than phone or email details that arrive in unsolicited messages.

Finally, be more cautious than usual with any communication that claims to be from Iberia or from brands you know through Iberia, especially if it requests personal data, login credentials, or immediate payment. Check sender addresses closely, navigate directly to official websites instead of clicking embedded links, and treat alarms about expiring miles or security checks with skepticism until you have verified them independently.

Will This Affect Flight Operations Or Future Bookings

At this point, all indications are that Iberia s flight schedule and operational systems remain unaffected by the breach, which appears confined to data stored by a third party supplier. Travelers can continue to book and fly with Iberia, including from its main hub at Adolfo Suarez Madrid Barajas Airport (MAD), but they should assume that basic contact details connected to Iberia Club membership may already be circulating among criminal actors.

Looking ahead, the Iberia customer data breach adds pressure on airlines to reassess how much customer information they share with vendors and how those partners secure their systems. For individual travelers, though, the core response is the same as with earlier airline cyber incidents, treat any airline related email or text as potentially suspicious until proven otherwise, ensure your email and loyalty accounts use unique passwords and multifactor authentication, and keep monitoring for signs of misuse in the months after the breach, not just in the first few days.

Sources