SIA added that this data breach specifically does not involve KrisFlyer and PPS member passwords, credit card information and other customer data such as itineraries, reservations, ticketing, passport numbers and email addresses.
Such information is not shared with other Star Alliance member airlines for this data transfer, the airline said.
All Star Alliance member airlines provide a restricted set of frequent flyer programme data to the alliance, which is then sent on to other member airlines to reside in their respective passenger service systems.
SIA said this data transfer is necessary to enable verification of the membership tier status, and to accord to member airlines' customers the relevant benefits while travelling.
One of the Star Alliance member airlines is a SITA PSS customer. As a result, SITA has access to the restricted set of frequent flyer programme data for all 26 Star Alliance member airlines including Singapore Airlines.
"The information involved is limited to the membership number and tier status and, in some cases, membership name, as this is the full extent of the frequent flyer data that Singapore Airlines shares with other Star Alliance member airlines for this data transfer," said SIA.
SIA said none of its IT systems have been affected by the breach and that they are reaching out to all KrisFlyer and PPS members to inform them about the incident. "The protection of our customers' personal data is of utmost importance to Singapore Airlines, and we sincerely regret the incident and apologise for the inconvenience caused."
SITA confirmed in a separate statement that it was the "victim of a cyber-attack" which led to the data security incident.
After confirming the seriousness of the incident on February 24, SITA said it took immediate action to contact the affected SITA passenger service system customers and all related organisations.
"We recognise that the COVID-19 pandemic has raised concerns about security threats, and, at the same time, cyber-criminals have become more sophisticated and active. This was a highly sophisticated attack," the Channel quoted the company as saying.
SITA added that the matter remains under continued investigation by its security incident response team with the support of "leading external experts in cyber-security".
(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)
Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.
We, however, have a request.
As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.
Support quality journalism and subscribe to Business Standard.