Overview
On 6 August 2025, cyber threat intelligence sources detected a hacker forum post advertising the sale of customer data allegedly sourced from KLM Royal Dutch Airlines and its Flying Blue loyalty program. The dataset reportedly contains 350 records in CSV format, traced to systems linked with klm.com and flyingblue.com, and is offered for $10,000.
The data includes personally identifiable information (PII) alongside booking and loyalty account details, creating both privacy and operational security risks.
Notably, even data belonging to our colleagues was identified among the 350 records. KLM responded by reaching out directly to the affected individuals and sending notification emails.

What Happened?
A threat actor is offering what they claim to be extracted customer records from the KLM Royal Dutch Airlines customer database and Flying Blue loyalty program. The dataset allegedly contains:
- Full names and email addresses
- Flying Blue membership numbers and tier levels
- Booking amounts, insurance details, and customer IDs
- Contact history between the passenger and airline support teams
The records are described as originating directly from KLM’s primary domains (klm.com and flyingblue.com). Although the number of records (350) is comparatively small, the granularity and sensitivity of the information increases its value for targeted exploitation.
Threat actors could use tier level, booking details, and contact history to craft highly convincing phishing or social engineering campaigns, impersonating KLM or the Flying Blue program to obtain additional information or trigger fraudulent transactions.
Why This Matters for Aviation
Although 350 records may seem small in volume compared to recent large-scale breaches, the quality of the data – with detailed booking, tier, and contact history – makes it highly valuable to attackers.
Such targeted data can enable:
- Precision phishing campaigns impersonating the airline or loyalty program
- Fraudulent ticket purchases or mileage redemptions
- Social engineering of call center staff to gain additional access
Because frequent flyer program members often represent high-value, frequent-travel customers, their compromise can directly impact revenue, loyalty retention, and brand trust.
Recommended Actions
Immediate Containment
- Force password resets for all Flying Blue accounts that match the leaked dataset.
- Temporarily lock accounts showing suspicious access patterns until verified by the customer.
Incident Investigation
- Conduct forensic review of systems linked to klm.com and flyingblue.com to determine breach vector.
- Validate whether data was taken from live systems, backups, or partner integrations.
Customer Protection
- KLM has already notify potentially affected members with transparent, actionable information.
- Provide anti-phishing resources and identity protection options for high-value customers (elite tier).
Partner Coordination
- Share threat intelligence with SkyTeam partners to prevent cross-targeting.
- Audit API and data exchange points between KLM and partner systems.
In Summary
The alleged sale of KLM Royal Dutch Airlines and Flying Blue customer data represents a targeted risk to high-value passengers and loyalty operations. Even at a small scale, the specificity of the dataset heightens the potential for identity theft, fraud, and reputational harm.Verification of authenticity is critical, but precautionary measures – including credential resets, partner coordination, and proactive customer communication – should be enacted immediately to mitigate the threat and reinforce customer trust.