Company Details
american-airlines
57,213
1,198,922
481
aa.com
0
AME_2540413
In-progress

American Airlines Company CyberSecurity Posture
aa.comEmbark on an adventure with a commitment to service, excellence and humanity. Our team is what powers our airline. We are proudly dedicated to our purpose of caring for people on life’s journey, including connecting our customers to the people and places they love or providing our team members development and leadership opportunities to acquire new skills and explore their potential. With more than 1,300 aircraft in our mainline and regional fleets combined and an extensive route network that touches six continents, we’ve got a place for you to start — or continue — your career. Whether you’re stationed at one of our hundreds of airports, working out of our state-of-the-art headquarters in Fort Worth, Texas, or serving customers over the phone from your home office, there are endless opportunities for you to grow and lead at American.
Company Details
american-airlines
57,213
1,198,922
481
aa.com
0
AME_2540413
In-progress
Between 600 and 649

American Airlines Global Score (TPRM)XXXX

Description: American Airlines reported a data breach involving its third-party vendor, pilotcredentials.com, on June 23, 2023. The breach occurred on or around April 30, 2023, and potentially exposed personal information of applicants, including names and Social Security numbers. Approximately 1,000 individuals were affected.
Description: American Airlines suffered from a data breach incident, an unauthorized actor gained access to the personal information of customers and employees through a phishing campaign. The exposed information includes address, phone number, driver's license number, passport number, and certain medical information. They engaged a third-party cybersecurity forensic firm for the investigation and implemented additional technical safeguards to prevent a similar incident from occurring in the future.
Description: The California Office of the Attorney General reported that American Airlines experienced unauthorized access to its online AAdvantage accounts, with the incident occurring on or about December 30, 2014. The breach potentially exposed personal information, including names, email addresses, phone numbers, and the last four digits of credit/debit cards, affecting an unspecified number of individuals. The breach was reported on January 15, 2015.
Description: The Maine Office of the Attorney General reported on September 16, 2022, a data breach affecting American Airlines from July 3 to July 7, 2022, due to external system hacking. This breach involved personal data, including driver's license numbers, and affected a total of 1,708 individuals.
Description: A preliminary report from the National Transportation Safety Board found indications maintenance errors could be at fault for an American Airlines plane that caught fire after making an emergency landing at Denver International Airport in March. Investigators discovered some parts were loose and appeared to be installed incorrectly, with one allowing fuel to leak from the fitting. The fire was put out in less than a minute by ground crews in Denver. Twelve people were taken to a hospital with minor injuries following the fire.


American Airlines has 56.25% more incidents than the average of same-industry companies with at least one recorded incident.
American Airlines has 29.87% more incidents than the average of all companies with at least one recorded incident.
American Airlines reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
American Airlines cyber incidents detection timeline including parent company and subsidiaries

Embark on an adventure with a commitment to service, excellence and humanity. Our team is what powers our airline. We are proudly dedicated to our purpose of caring for people on life’s journey, including connecting our customers to the people and places they love or providing our team members development and leadership opportunities to acquire new skills and explore their potential. With more than 1,300 aircraft in our mainline and regional fleets combined and an extensive route network that touches six continents, we’ve got a place for you to start — or continue — your career. Whether you’re stationed at one of our hundreds of airports, working out of our state-of-the-art headquarters in Fort Worth, Texas, or serving customers over the phone from your home office, there are endless opportunities for you to grow and lead at American.


Marhaba! Welcome to Etihad Airways. We are proud to be the national airline of the UAE, flying to 100+ destinations via Abu Dhabi. At Etihad, we don't stop at the border of what's possible, we go beyond it. Proudly inspired by our Emirati identity, we are dedicated to delivering extraordinary trave

At Saudia Group, we're on a mission to inspire people to go beyond borders. Our purpose is rooted in unlocking human potential and connecting the world in ways never thought possible. We are committed to reshaping the aviation ecosystem in our region and beyond, by embracing innovation and a custome
How time flies. #18YearsOfIndiGo IndiGo is India’s largest passenger airline. We primarily operate in India’s domestic air travel market as a low-cost carrier with focus on our three pillars – offering low fares, being on-time and delivering a courteous and hassle-free experience. IndiGo has become

Ethiopian Airlines Group (Ethiopian) is a true African success story, transforming a visionary dream into a globally renowned reality for nearly eight decades. Operating flights to more than 160 domestic and international passenger, and cargo destinations across five continents, Ethiopian bridges th

Based in Dubai, the Emirates Group employs over 103,363 staff from more than 160 nationalities. The Emirates Group’s extensive and diverse international portfolio includes the world’s largest international airline, Emirates, and one of the largest combined air services provider in the world, dnata.

Welcome aboard Singapore Airlines on LinkedIn. Discover travel inspirations, business travel tips, cultural insights, our latest updates, and more. Singapore Airlines is a global company dedicated to providing air transportation services of the highest quality and to maximising returns for the ben

Depuis 1933, la compagnie Air France porte haut les couleurs de la France à travers le monde entier. Avec une activité, répartie entre le transport aérien de passagers, le fret, la maintenance et l’entretien aéronautique, Air France est un acteur majeur du secteur aérien. Plus de 45 000 collaborateu

When JetBlue first took flight in February 2000, our founding goal was to bring humanity back to air travel, and over two decades later, we still put our customers, crewmembers and communities at the center of everything we do. Before we even had aircraft to fly, our founders selected five values

People. Passion. Pride. These have driven our team since 1833. Since that time, we have developed to become a critical partner in the global aviation industry, delivering time-critical logistics services at over 300 locations in 65 countries, across six continents. But at the heart of our
.png)
Envoy Air, subsidiary of American Airlines, experienced a cyberattack. A spokesperson for the organization told Reuters that the company has...
Envoy Air, part of American Airlines, has confirmed that it was targeted by the CIop ransomware group. Written by. Gus Mallett.
American Airlines subsidiary Envoy Air has confirmed being impacted by the recent Oracle's E-Business Suite (EBS) hack.
Envoy Air, the largest regional carrier for American Airlines, has confirmed a data breach tied to a cyberattack campaign exploiting...
Envoy Air confirms Oracle E-Business Suite data breach linked to Clop ransomware exploiting a 2025 zero-day vulnerability.
Envoy Air joins Qantas, Aeroflot, and Vietnam Airlines in facing the worst cybersecurity breach of 2025. This massive cyberattack has shaken...
Envoy, a subsidiary of American Airlines, falls victim to a major Oracle cyberattack. Discover the impact and what this means for travelers...
Envoy Air, a wholly owned subsidiary of American Airlines, has confirmed it fell victim to a hacking campaign exploiting vulnerabilities in...
Envoy Air, American Airlines' largest regional carrier, suffered a hack in recent days as part of the wave of extortion attempts from...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of American Airlines is http://jobs.aa.com.
According to Rankiteo, American Airlines’s AI-generated cybersecurity score is 646, reflecting their Poor security posture.
According to Rankiteo, American Airlines currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, American Airlines is not certified under SOC 2 Type 1.
According to Rankiteo, American Airlines does not hold a SOC 2 Type 2 certification.
According to Rankiteo, American Airlines is not listed as GDPR compliant.
According to Rankiteo, American Airlines does not currently maintain PCI DSS compliance.
According to Rankiteo, American Airlines is not compliant with HIPAA regulations.
According to Rankiteo,American Airlines is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
American Airlines operates primarily in the Airlines and Aviation industry.
American Airlines employs approximately 57,213 people worldwide.
American Airlines presently has no subsidiaries across any sectors.
American Airlines’s official LinkedIn profile has approximately 1,198,922 followers.
American Airlines is classified under the NAICS code 481, which corresponds to Air Transportation.
No, American Airlines does not have a profile on Crunchbase.
Yes, American Airlines maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/american-airlines.
As of December 11, 2025, Rankiteo reports that American Airlines has experienced 5 cybersecurity incidents.
American Airlines has an estimated 3,515 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with engaged a third-party cybersecurity forensic firm, and remediation measures with implemented additional technical safeguards, and containment measures with fire put out by ground crews in less than a minute..
Title: American Airlines Data Breach
Description: American Airlines suffered from a data breach incident, an unauthorized actor gained access to the personal information of customers and employees through a phishing campaign.
Type: Data Breach
Attack Vector: Phishing
Threat Actor: Unauthorized actor
Title: American Airlines Plane Fire Incident
Description: A preliminary report from the National Transportation Safety Board found indications maintenance errors could be at fault for an American Airlines plane that caught fire after making an emergency landing at Denver International Airport in March.
Date Detected: March 2025
Type: Physical Incident
Vulnerability Exploited: Maintenance errors
Title: American Airlines Data Breach
Description: American Airlines reported a data breach involving its third-party vendor, pilotcredentials.com, on June 23, 2023. The breach occurred on or around April 30, 2023, and potentially exposed personal information of applicants, including names and Social Security numbers. Approximately 1,000 individuals were affected.
Date Detected: 2023-06-23
Date Publicly Disclosed: 2023-06-23
Type: Data Breach
Title: American Airlines Data Breach
Description: The Maine Office of the Attorney General reported on September 16, 2022, a data breach affecting American Airlines from July 3 to July 7, 2022, due to external system hacking. This breach involved personal data, including driver's license numbers, and affected a total of 1,708 individuals.
Date Detected: 2022-07-03
Date Publicly Disclosed: 2022-09-16
Type: Data Breach
Attack Vector: External System Hacking
Title: American Airlines AAdvantage Accounts Breach
Description: Unauthorized access to American Airlines' online AAdvantage accounts potentially exposed personal information, including names, email addresses, phone numbers, and the last four digits of credit/debit cards.
Date Detected: 2014-12-30
Date Publicly Disclosed: 2015-01-15
Type: Data Breach
Attack Vector: Unauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Address, Phone number, Driver's license number, Passport number, Certain medical information

Systems Affected: Airplane engine and escape slide
Operational Impact: Emergency landing, passenger evacuation

Data Compromised: Names, Social security numbers

Data Compromised: Driver's license numbers

Data Compromised: Names, Email addresses, Phone numbers, Last four digits of credit/debit cards
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information Of Customers And Employees, , Names, Social Security Numbers, , Personal Data, Names, Email Addresses, Phone Numbers, Last Four Digits Of Credit/Debit Cards and .

Entity Name: American Airlines
Entity Type: Company
Industry: Airline

Entity Name: American Airlines
Entity Type: Airline
Industry: Aviation
Location: Denver International Airport
Customers Affected: 172

Entity Name: American Airlines
Entity Type: Airline
Industry: Aviation
Customers Affected: 1000

Entity Name: American Airlines
Entity Type: Company
Industry: Aviation
Customers Affected: 1708

Entity Name: American Airlines
Entity Type: Corporation
Industry: Aviation
Location: United States

Third Party Assistance: Engaged a third-party cybersecurity forensic firm
Remediation Measures: Implemented additional technical safeguards

Containment Measures: Fire put out by ground crews in less than a minute
Third-Party Assistance: The company involves third-party assistance in incident response through Engaged a third-party cybersecurity forensic firm.

Type of Data Compromised: Personal information of customers and employees
Sensitivity of Data: High
Personally Identifiable Information: AddressPhone numberDriver's license numberPassport number

Type of Data Compromised: Names, Social security numbers
Number of Records Exposed: 1000
Sensitivity of Data: High

Type of Data Compromised: Personal Data
Number of Records Exposed: 1708
Sensitivity of Data: High
Personally Identifiable Information: Driver's License Numbers

Type of Data Compromised: Names, Email addresses, Phone numbers, Last four digits of credit/debit cards
Personally Identifiable Information: NamesEmail AddressesPhone Numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Implemented additional technical safeguards.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by fire put out by ground crews in less than a minute.

Lessons Learned: Investigation into maintenance errors and escape slide malfunction
Key Lessons Learned: The key lessons learned from past incidents are Investigation into maintenance errors and escape slide malfunction.

Source: CBS News

Source: Maine Office of the Attorney General
Date Accessed: 2022-09-16

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CBS News, and Source: Maine Office of the Attorney GeneralDate Accessed: 2022-09-16, and Source: California Office of the Attorney General.

Investigation Status: Under investigation by NTSB

Root Causes: Maintenance errors leading to fuel leak and fire
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Engaged a third-party cybersecurity forensic firm.
Last Attacking Group: The attacking group in the last incident was an Unauthorized actor.
Most Recent Incident Detected: The most recent incident detected was on March 2025.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2015-01-15.
Most Significant Data Compromised: The most significant data compromised in an incident were Address, Phone number, Driver's license number, Passport number, Certain medical information, , names, Social Security numbers, , Driver's License Numbers, , Names, Email Addresses, Phone Numbers, Last four digits of credit/debit cards and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Engaged a third-party cybersecurity forensic firm.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Fire put out by ground crews in less than a minute.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, Passport number, names, Phone Numbers, Certain medical information, Email Addresses, Address, Driver's license number, Last four digits of credit/debit cards, Names, Phone number and Driver's License Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 278.0.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Investigation into maintenance errors and escape slide malfunction.
Most Recent Source: The most recent source of information about an incident are California Office of the Attorney General, CBS News and Maine Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Under investigation by NTSB.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
