Four Years of the Same Exploit, Broken Controls, and a $12 Billion Asset in Question
Alaska Air Group value their loyalty programme at over $12 billion. At this report's publication, their market cap is $4.4 billion. The programme is central to Alaska's valuation, financing structure, and equity story.
This investigation reveals that Alaska has been unable to secure this asset for 4 years, knows it, and has not told its investors.
The authentication is broken. In controlled testing, full account access can be obtained in seconds with no password, no MFA, and no login prompt. The stolen session survives a password change.
Worst of all, compromising an account without the victim's password is painfully straightforward for a malign actor. The most basic security protocols are absent on Alaska's website, meaning any one of dozens of firms with cookies on the website need just one hostile line of code to extract millions of user credentials.
Management has known for years that a password change does not secure a victim. Alaska's standing response is to restore the miles, blame the customer, and permanently remove online booking behind a telephone PIN. That policy has existed for at least 4 years.
This is not hypothetical. This investigation found Alaska accounts hacked and drained at 25 times the rate of peer airlines. 425 documented victims shared their incomprehension at thousands of dollars of miles being stolen, many reporting strong, unique, randomly generated passwords.
Once inside, the attackers own the account. They change passwords and emails at will. 96% of victims discover the loss themselves, sometimes years later. That moment of discovery is when Alaska learns of it too, and when Alaska's most loyal and lucrative customers, with an average theft of 218,000 miles, are told the compromise was their fault and permanently restricted from online award booking.
The compromised accounts are sold on public forums and dark web marketplaces. Sellers advertise on Facebook and operate on WhatsApp. Their marketplace listings offer $10,000 flights for $40, claim 3 year dormancy on stolen accounts, and guarantee that no buyer has ever been intercepted. These are seller representations, not verified facts, but the pricing is consistent across 6 independent sellers and corroborated by a separate dark web marketplace listing.
The sellers' wallets trace to high throughput cryptocurrency infrastructure. 2 wallets flow through 5 intermediary steps to addresses processing over $1 billion in cumulative throughput, terminating at KYC regulated exchanges where account holder identities are a subpoena away from disclosure.
No arrest in connection with stolen Alaska miles has been publicly documented. Victims report that Alaska representatives have discouraged attempts to involve law enforcement. In at least 1 documented case, a foreign national flew into the United States on stolen miles after the victim reported the theft before departure.
The loyalty programme in 2025 was also challenged by a separate set of loyalty related balance sheet movements that Alaska's public filings do not clearly reconcile. The most striking was approximately $180 million of excess loyalty liability creation in Q2 2025 relative to Alaska's own historical relationship between liability creation and loyalty revenue. In the same period, loyalty partner receivables rose sharply, and in Q3 reported current receivables fell as Other Non Current Assets increased. Benign explanations may exist. The problem is that Alaska's public filings do not clearly identify which explanation applies to which movement, when it arose, or how the balances reconcile. That is a disclosure problem before it is anything else.
Management has offered no disclosure that specifically reconciles the observed loyalty liability, receivable, and non current asset movements, and no meaningful quantified disclosure on loyalty account fraud incidence. This report documents numerous instances of investors being told the absolute minimum, and often less.
The direct cost of the stolen accounts is likely in the tens of millions. Even at the higher bound, the direct cost can be endured. The critical danger to any investor is that the loyalty programme appears to have a critical dearth of controls and that management has not addressed these questions.
The next forcing date is 31 March 2026. Alaska's officers must then certify the security of the pledged loyalty collateral with this evidence in the public domain. Conceivably they may well have done so, which does not affect the scrutiny that certification should receive.
In August 2025, the author saw a LinkedIn post. An Alaska Airlines loyalty member had logged in to find his account drained. 185,000 miles gone. Used to book business class flights for a stranger. Alaska had refunded the points. Others responded to the post to announce the same experience.
Three things about the story did not make sense.
The questions were perplexing enough for this rather idle author to launch an investigation.
Some months later, the reasoning that answers all three is clear. Answering them unearthed a remarkable set of findings:
All three questions are answered by the close of this document. The discoveries made in answering them present a mosaic that may undermine the valuation fundamentals of Alaska Air Group.
Alaska Air Group is the holding company for Alaska Airlines, the fifth largest US carrier by revenue. In September 2024, it closed a $1.9 billion acquisition of Hawaiian Airlines. The combined entity reported $14.2 billion in revenue and $100 million in net profit for 2025. At the time of publication, market capitalisation stands at $4.4 billion. Enterprise value is approximately $9.1 billion.
At its December 2024 Investor Day, management valued the loyalty programme at over $12 billion. The programme generates over $2 billion in annual cash remuneration from co brand credit card partnerships, predominantly with Bank of America. The programme is the stable, high-margin engine upon which the airline is built, and it is pledged as security against $2 billion of secured notes held by a special purpose lender. If Alaska ever breaches its covenants, that lender can claim the cash flows directly from Bank of America.
The implied value of everything else, the aircraft, the routes, the gates, the employees, the entire Hawaiian integration, is negative $2.9 billion.
The loyalty programme is not a feature of the business. It is the business. It is the asset underwriting the equity, the debt, and the company's future.
This report presents evidence that the programme's front door has been open for at least 4 years.
Section 1 described the asset. This section presents the first evidence that its custodian has known, for years, that it is not secure.
Every documented victim of an Alaska loyalty account theft receives the same treatment. The victim is told the compromise was their fault, a consequence of poor password hygiene. Points are then restored as a "one-time courtesy." The victim is warned that any future theft will receive no refund. And the victim's account is permanently restricted: online award booking is disabled behind a 4 digit PIN. To book, the victim must telephone Alaska, recite the PIN, and wait for a 1 hour window during which online award booking is temporarily re-enabled. Once the window closes, the restriction reapplies.
This protocol appears universal. It has been applied to every victim the investigation has documented, across hundreds of cases and at least 4 years. Commentators on public forums have cited the restriction as far back as 2017. The earliest directly documented instance is April 2022. It is not a reaction to individual incidents. It is a standing policy.
Why would Alaska permanently restrict a victim's account after the compromised password has been changed?
If the vulnerability were passwords, a new password would resolve it. Alaska could require a longer password, mandate rotation, add security questions, or implement MFA. American Airlines, Delta, and United already require MFA. Any of these measures would address a password based attack while preserving online access.
Instead, Alaska disables online award booking entirely. Permanently.
If the vulnerability were the password, a new password would fix it. Alaska does not fix it with a new password. Alaska disables the online channel entirely. The only rational explanation is that Alaska knows the attacker's access does not depend on the password.
The mechanism, confirmed forensically in Section 3, is the session cookie. A session cookie is a small file stored in the browser that proves to a website the user is already logged in. It can be acquired without ever knowing the victim's password. It persists after a password change. It cannot be revoked from the server. A password change updates a credential the attacker is not using.
The PIN restriction is Alaska's only available defence: remove the account from the system the attacker can reach. Force award bookings through a telephone channel that bypasses the vulnerable web infrastructure.
Members report the restriction as indefinite. If the restriction were a precaution against a compromised password, it would last weeks, not years. The duration implies that Alaska has modelled the persistence window of the session vulnerability and set the restriction to match.
The logical inference, before any forensic evidence is considered, is that the vulnerability has persisted for at least as long as the restriction. The restriction is not a security enhancement. It is an operational acknowledgement that the underlying problem has not been fixed.
The victims subjected to this protocol are not casual travellers. The documented cases had an average of 218,262 miles in their accounts at the time of theft. These are Alaska's most loyal and highest value customers. Many hold the co brand Bank of America credit card that generates the $2 billion annual cash flow described in Section 1. They chose Alaska over competitors with larger networks precisely because of the programme's perceived value.
There are only 2 ways to secure an account against this vulnerability. Fix the underlying cybersecurity weakness. Or make the customer suffer.
Alaska chose the second. A member who previously booked award travel with a few clicks must now telephone Alaska, recite a PIN, and wait for a temporary unlock. Multi hour hold times are common, with some exceeding 5 hours. Award availability that appeared at 2am is gone by the time Customer Care opens. The restriction is not temporary. It is a permanent handicap imposed on blameless customers because Alaska will not repair the system that exposed them.
On 7 October 2025, Alaska VP of Loyalty Brett Catlin was asked on a Reddit AMA whether there were "any plans to introduce two factor authentication to better protect user accounts." He responded:
"We know this is a major pain point, and honestly, fraud attempts are getting worse almost daily. It's something we take very seriously, and it has visibility all the way up to our CEO."
Brett Catlin, VP Loyalty, Alaska Airlines, Reddit AMA, 7 October 2025This is the head of the loyalty programme, on the public record, confirming 3 things: the fraud is known, it is accelerating, and the CEO has direct knowledge.
No corresponding disclosure appears in customer communications or public investor materials.
The next section presents the evidence that confirms the mechanism and documents the scale.
Section 2 established that Alaska knows a password change does not secure an account. This section presents the forensic proof of why and documents the scale of the resulting harm.
On 16 March 2026, the author logged into his own Atmos account, extracted 2 session cookies from his authenticated browser, and pasted them into a clean browser on a separate device. From that second browser, with no password entry and no login prompt, the author changed the password, email, phone number, postal address, passport number, and nationality on his account. None required re-authentication. The only notification, that the email had changed, arrived approximately 10 minutes later. No notification was sent for the password change. By the time the alert arrived, every piece of identifying information had been replaced and every self service recovery path closed.
3 properties combine into a single systemic failure. Session tokens are not revoked on password change: an attacker with a valid session continues receiving fresh tokens regardless. No MFA exists at login; Alaska's recent limited mobile rollout does not address session persistence, since an attacker holding a stolen cookie bypasses the login flow entirely. No anomaly detection flags high risk redemptions: a last minute international business class flight booked for a stranger proceeds without review.
The previous subsections show what a stolen token does. This one addresses how easily it can be stolen.
Alaska stores the login token in a cookie called "guestsession" without the HttpOnly flag, a single configuration setting, standard for over a decade, that prevents other code on the page from reading it. Delta, United, American, and every major bank set it. Alaska does not.
On 16 March 2026, 14 separate companies were running code on Alaska's authenticated pages: Google, Facebook, Adobe (3 products), The Trade Desk, Microsoft/Bing, Tealium, FullStory, Quantum Metric, Optimizely, AppDynamics, Airtrfx, and Everest Technologies. Every 1 can read the login token. If any were compromised, a rogue employee, a hacked server, a supply chain attack, a single added line of code would send every visitor's token to any server the attacker chooses. 1 compromised script, served for 1 day, harvests the tokens of every single customer who logs in that day.
The industry deploys 3 standard defences. HttpOnly prevents scripts from reading the cookie. A Content Security Policy restricts where scripts can send data. Subresource Integrity verifies scripts have not been tampered with. Alaska has deployed none of them. Its entire Content Security Policy is a single directive that upgrades HTTP to HTTPS. It restricts nothing.
This is not theoretical. In 2018, Magecart compromised a third-party script on British Airways' site. It ran for 15 days, stole 500,000 customers' payment details. The mechanism is identical to what is possible on Alaska's site today. In June 2025, Scattered Spider breached Hawaiian Airlines, Alaska's own subsidiary. The FBI warned the group was "expanding its targeting to include the airline sector." If Scattered Spider accessed Alaska's codebase directly, they would not need a third party: they could inject exfiltration into Alaska's own files, served from Alaska's own servers, with no Content Security Policy to block the outbound transmission.
Alaska's Spanish language site (alaskaair.convertlanguage.com) is operated by a third party, ConvertLanguage. On 16 March 2026, the investigator discovered that the proxy issues tokens with "offline_access" scope, a permission absent from the main site. In plain terms: the main site's token works when visiting the website; the proxy's token works from any computer, at any time, without a browser, indefinitely.
This more powerful token does not stay on the proxy. Both domains write to .alaskaair.com, so visiting the Spanish site overwrites the main site's token with the escalated version. Any customer redirected there, by a search engine, an ad, or a link, returns carrying a token readable by all 14 third-party scripts that now grants programmatic, indefinite access. The proxy also bypasses Alaska's cookie consent framework entirely: tracking scripts execute with no consent mechanism configured.
The full technical analysis, JWT comparisons, cookie inventory, third-party script audit, proxy token decode, and complete takeover sequence, is in Appendix C.
The investigation documented 425 unique account compromises reported across public internet forums during calendar year 2025. Every case was individually verified, deduplicated, and archived. The full dataset is published in Workbook B.
| Platform | Principal Group | Members | Count | % of Total |
|---|---|---|---|---|
| r/AlaskaAirlines | 67,000 | 181 | 43% | |
| Alaska Airlines Atmos Rewards Points and Hacks | 50,000 | 111 | 26% | |
| US Card Forum | uscardforum.com | 28,000 | 48 | 11% |
| Others | 85 | 20% |
These are small, obscure corners of the internet. The Reddit cases come overwhelmingly from a single subreddit. The Facebook cases come from a single private frequent flyer group. Alaska's own social media monitoring team will have member accounts on every one of these platforms. None of this was hidden. Fox13 Seattle and KIRO 7 ran stories on the hacked accounts in July 2025. The Seattle Times followed in November. These are Seattle's local newsrooms covering a Seattle headquartered company. No corrective action followed. No public statement. No direct communication to affected members.
The distribution through the year is uneven. Reports fell to near zero in late April and May before a sharp inflection in late June, coinciding with the Hawaiian Airlines cyberattack disclosure. A second surge in December exceeded the summer peak. If this were credential stuffing, one would expect a roughly even distribution as compromised credentials circulate through databases at a steady rate. The wave pattern is more consistent with coordinated criminal campaigns that scale up and subside. The methodology is not scientific; we are catching only a fraction of what is occurring. But the shape of the data gives an observer reason to pause.
The thefts followed an identical script, unchanged since 2022. Accounts were compromised to book flights within a day or 2 of travel, invariably on partner airlines in premium cabins. The member's notification email was changed to prevent discovery. In 96% of documented cases, the theft was discovered by the victim, not by Alaska.
Dozens of victims reported strong, unique, randomly generated passwords and were compromised regardless. 4 were compromised either side of a password change. Credential stuffing cannot explain either pattern.
Customer service representatives, speaking without the filter of corporate communications, provide their own corroboration.
| Date | CSR Statement |
|---|---|
| 14 May 2025 | "She has to do this 3-5 times per day and if the flight has already flown then miles are gone." |
| 19 Jul 2025 | "They had a huge influx since the Hawaiian miles transfers started, especially since the end of June." |
| 6 Aug 2025 | "This is happening quite a bit recently." |
| 11 Sep 2025 | "Ever since they launched the new Atmos rewards program they have been seeing a lot of fraud." |
| 30 Oct 2025 | "It happens often though." |
| 2 Nov 2025 | "This is happening quite frequently." |
| 15 Dec 2025 | "There was a data breach and this has been happening a lot. But they still haven't added heightened security measures or multifactor authentication." |
The 14 May 2025 statement warrants attention. A single representative handling 3 to 5 reinstatement calls per day implies a problem far larger than the 425 publicly documented cases. The precise scale cannot be determined from these observations alone, but the call centre staff describe volumes consistent with a systemic failure affecting thousands of accounts, not hundreds. The point is that no one outside Alaska can know the true figure, and, as discussed below, neither can Alaska.
Is this an industry problem, or an Alaska problem?
Adjusted for subreddit community size, Alaska's theft report rate on Reddit is 14.0 per 10,000 members. American Airlines stands at 1.0, Delta at 0.4, United at 0.0, and Southwest at 1.9. The peer average, weighted by subreddit size, is 0.55. Alaska is 25.5 times the peer average.
The investigation also checked the comparison against reported deferred revenue liabilities: Alaska at $3.4 billion, American at $10.6 billion, Delta at $9.3 billion, United at $7.8 billion, and Southwest at $4.3 billion. Against that measure, the multiple is 20.3 times Alaska versus the peer group. The disparity is not an artefact of Reddit usage patterns. The methodology does not profess scientific exactitude, but the delta is a chasm. Alaska is not suffering from a problem common to the airline industry. Alaska is suffering uniquely. Full methodology is set out in Appendix B.
The 425 documented cases were drawn exclusively from public internet forums. That methodology captures only victims who satisfy every condition in a narrow funnel:
Each condition eliminates a population of victims who are not counted.
Consider US Card Forum. It is a niche enthusiast community: approximately 12,000 weekly active users, discussing credit cards, loyalty programmes, and travel rewards. In a typical week, the forum hosts around 970 new discussion topics. Fewer than 20 of those concern Alaska Airlines in any capacity. Alaska is less than 2% of the forum's conversation. And yet, from this tiny, specialist corner of the internet, the investigation documented 48 account compromises in a single year. If a forum where Alaska barely registers as a topic of discussion can produce 48 cases, the total across all online and offline channels is necessarily tens of thousands. The full extrapolation methodology is set out in Appendix B.
And Alaska does not know either. In 96% of documented cases, the compromise was discovered by the victim, not by the airline. Alaska has no independent detection capability. It cannot tell the market how many accounts have been compromised because it does not know. That does not automatically mean the deferred revenue balance is misstated. It does mean investors are not told whether fraudulent redemptions, reinstatements, or related partner reimbursements materially affect the inputs, assumptions, or contract balances used in the loyalty model.
Hundreds of reported cases. An unknown multiple that did not report. Every single one following the same script. The criminal marketplace that trades on this failure is documented in Section 4.
Sections 2 and 3 documented the victims and the vulnerability. This section documents the industry that profits from both.
Ernest quoted $120 for an account containing 220,000 miles.
To understand what $120 buys, consider a single routing. Miami to Barcelona, one way, business class, nonstop on American Airlines. The cash fare is $8,664. The miles cost: 55,000 Alaska miles and $19 in taxes. Ernest's price for 220,000 miles is $120. That is 4 business class flights across the Atlantic for $196 all in, taxes included.
Akis, a Hungarian based seller with 3,000 stolen accounts in inventory, offered the same product at the same price. He volunteered a personal testimonial: business class, Madrid to Santiago, $80. The retail fare was $9,900.
"Alaska is the Best. Best price ratio amount Alaska."
Akis, WhatsApp, 22 February 2026Delta accounts carry a 20% premium. Alaska is the cheapest product on the criminal market because it is the easiest to exploit. The marketplace has priced both the security gap and the product quality into a single number.
No dark web browser was required. No Tor circuit. No encrypted marketplace. The sellers advertise on Facebook. The fourth entry to this Google search below takes you straight to a seller. They are not even hiding anymore.
The investigation identified 6 independent sellers. Every one of them was found through ordinary Facebook searches. They advertise next to card scammers, SIM swappers, and phishing kit vendors. They communicate on WhatsApp. They accept Bitcoin, Ethereum, and PayPal. They operate in the open because the platform they exploit has given them no reason to hide.
Asad operates from Pakistan. He has been in this business for 3 to 4 years. His team of 6 processes 50 to 60 Alaska Airlines bookings per week.
He is not a credential seller. He is a full service operator. His team takes a passport number and travel dates, selects a victim account, and delivers a confirmed ticket. The customer never touches Alaska's website. The customer flies under their own real name, on a seat paid for with someone else's miles.
On 25 February 2026, the investigator asked Asad to price a San Francisco to Tokyo flight. He quoted $220.
On 2 March, he offered a direct Japan Airlines flight on the same route for $280. A paid JAL business class ticket sells for $5,000 to $10,000.
When asked why Alaska specifically, Asad was direct:
"That's not secured."
Asad, WhatsApp, 2 March 2026"Yes brother. Easier than other airlines like American or Delta."
Asad, WhatsApp, 2 March 2026"Alaska is safer than other."
Asad, WhatsApp, 2 March 2026, using "safer" to mean safer for the criminalHe targets dormant accounts deliberately. Victims who do not log in cannot discover the theft until Alaska eventually notifies them, which, as Section 3 documented, happens in only 4% of cases. Alaska's blindness is his business model.
His estimated annual revenue from Alaska bookings alone, at 50 bookings per week and an average of $250 per ticket, is $650,000. This is one seller. There are at least 5 others.
The sellers documented in this report were contacted through Facebook and WhatsApp. They are not the only distribution channel. A dark web marketplace, highlighted in a NordVPN investigation, offers stolen Alaska Airlines miles accounts as off the shelf products with tiered pricing, inventory counts, and terms of service.
The listing is structured like a retail storefront. Accounts are sorted by mileage balance. 5 units of the 100k to 200k tier are in stock at $35 each. The 500k to 1m tier is $150. The 1m to 5m tier is $700. The seller enforces terms: replacement is available only if less than 50% of the initial balance has been used, and changing login credentials or reporting the compromise voids the guarantee.
These prices are consistent with the seller conversations documented in this report. Ernest quoted $120 for 220,000 miles. The dark web marketplace prices 200k to 300k miles at $60. The criminal market has converged on a narrow band because the underlying product, an Alaska account with no multi factor authentication and no session persistence controls, has a known and stable value to buyers.
Each of the 6 sellers profiled during the investigation operates independently. All converge on the same target. Their own words tell the story most efficiently.
"I have 3000 account."
Akis, WhatsApp, 22 February 2026Akis, based in Hungary, has maintained a stable source for 5 years. He sells Alaska and Delta accounts at $120 and $144 respectively, with a 12 hour validity guarantee and an 85% booking success rate. He offered a reseller commission structure. He was unconcerned about detection:
"There are millions of accounts. A few thousand accounts is not a big deal. 70,000 people fly Alaska every day."
Akis, WhatsApp, 22 February 2026Robert, contacted through Facebook advertising, held 1 million Alaska miles across 8 to 12 accounts at the time of contact. He operates a 2 tier model: basic credentials at $0.52 per thousand miles, or full access with email and OTP interception at $2.40 per thousand. The premium tier enables the buyer to lock the victim out permanently:
"Even if the owner tries to change it's you that'll be receiving the OTP which means it's not much they can do from there end."
Robert, WhatsApp, 21 February 2026Baadshah, contacted through Facebook Messenger, held 11 Alaska accounts. He was the most succinct:
"Alaska is the easiest one. Alaska is simple and easy."
Baadshah, call recordingErnest, the Oman passport holder, identified himself as a hacker and demonstrated a tracking pixel during the conversation. He operates across 14 airlines and 3 hotel chains. When asked about the safety of flying on stolen miles, he was philosophical:
"These are dormant accounts. For 3 years above. Likely dead people or otherwise."
Ernest, WhatsApp, 12 February 2026"Ghosts don't have use for miles."
Ernest, WhatsApp, 12 February 2026Eddie Dolla, the sixth seller, offered Alaska accounts at $120 for 200,000 miles and volunteered to guide buyers through the booking process. His Bitcoin payment address is a Crypto.com deposit wallet, KYC regulated and subpoena-ready.
Every seller provided a cryptocurrency wallet address. What those wallets reveal, when traced on the public blockchain, separates a story about stolen airline miles from a story about organised crime with over $1 billion in traced infrastructure.
The investigation obtained 11 wallet addresses from 6 sellers. Three had never been used on-chain: disposable addresses created for a single buyer, discarded when the sale fell through. The remaining 8 connect, through public blockchain records, to a network of KYC regulated exchanges spanning 3 continents.
The Bitcoin pipeline. Ernest's Bitcoin address collected a single $56 deposit before going silent. On 24 January 2026, it was swept alongside 48 other wallets in a consolidation transaction totalling $15,059. Ernest's $56 was one envelope in a bag of 49. That bag went to a clearinghouse: automated infrastructure that has now processed 3,941 transactions and was last active at 09:05 UTC on 15 March 2026, twelve minutes before the investigator checked it.
From the clearinghouse, funds move in standardised batches to a staging wallet holding $262,000 in live balance. From there, they flow to an aggregation address that blockchain explorer OKLink independently labels as a deposit address for Nazza, a cryptocurrency exchange serving African and Middle Eastern markets. Nazza was not previously identified. The aggregation address holds $490,000 and has processed 9,578 transactions since November 2023. Total throughput across the traced network: $759 million across 8,869 transactions. Daily volume: $5 to $6 million. On 7 February 2026, one transaction alone moved $1,047,556.
The exit is Binance. Every outgoing transaction from the Nazza aggregation wallet flows to a Binance deposit address. In a 7 day sample from February 2026, that address received $12.98 million across 32 transactions. Binance is KYC regulated. A verified identity sits behind the account receiving these funds.
The Ethereum pipeline. Ernest also disclosed an Ethereum wallet. That address is not dormant. It has processed 107 transactions, was last active on 13 March 2026, and operates as an automated pass through: funds arrive and are forwarded within 60 to 90 seconds to a clearinghouse processing over 11,472 transactions.
OKLink's entity labelling revealed who is paying Ernest. The buyers withdraw cryptocurrency from PayPal (via its backend operator Paxos) and from Crypto.com before sending it to Ernest's wallet. Both are KYC regulated platforms. The buyers are identifiable.
From the clearinghouse, funds move to a staging address that OKLink labels as a Kdctrade user account. Kdctrade is a cryptocurrency exchange and OTC platform not previously identified in this investigation. The staging address forwards to a second Kdctrade address labelled "Deposit_1", which functions as the aggregation point. That address has processed 21,739 transactions across 33 blockchain networks over more than 2 years and has deposited over $600 million at Binance through a publicly labelled deposit address.
The architecture mirrors the Bitcoin pipeline precisely: an intermediary exchange (Nazza for Bitcoin, Kdctrade for Ethereum) sits between the criminal infrastructure and the final Binance cashout. Two different intermediary exchanges on two different blockchains, both feeding into Binance.
The direct deposits. Some sellers bypass the layering infrastructure entirely. Asad's direct payment address is a confirmed Bybit deposit address. Eddie Dolla's is a Crypto.com deposit. These wallets route payments straight into regulated exchange accounts bearing verified identities. One subpoena. One name.
Asad's wider infrastructure tells a different story from his $29 direct deposit. Two wallets linked to him through Arkham Intelligence cluster analysis have collectively processed 107 Kraken transactions totalling $2.31 million. The second of these wallets has 38,743 transactions and has paid $474,000 in transaction fees alone. This is exchange grade infrastructure.
Together, the Bitcoin and Ethereum pipelines represent over $1 billion in traced cryptocurrency throughput flowing through infrastructure directly connected to the sellers documented in this report. These sellers traffic in credentials across multiple industries; stolen airline miles are one revenue stream among many. The Alaska-attributable fraction of this throughput is unknown. What is known is that the pipeline is on the public ledger, the exchanges are KYC regulated, and nobody has served a single subpoena.
Every infrastructure address checked on 15 March 2026 was active. The ETH clearinghouse processed its most recent transaction at 09:11 UTC that morning. The BTC clearinghouse at 09:05. The operation is fully live.
6 sellers with thousands of accounts in standing inventory means thousands of flights per year booked under names bearing no relation to the account holder. Tickets procured through organised crime. Passengers passing through US ports of entry. Partner airlines have no visibility into whether a redemption is legitimate. CBP has no way of knowing that the passenger presenting a boarding pass obtained that seat through criminal enterprise.
On a date documented in Appendix I, a victim's stolen miles were used to book a business class ticket from Dubai to Houston via Doha. The victim called Alaska with the passenger's name, the booking details, and the arrival time. The victim asked Alaska to have police meet the individual at the airport upon landing.
Alaska refused.
The passenger entered the United States without interdiction.
"I actually asked Alaska Air to have police meet the person at the airport but they wouldn't."
Victim statement, documented in Appendix FThis is not isolated. Every person who flew on a stolen ticket gave their real name, passport details, and contact information to the airline. Every single one of them is identifiable. The data exists. Alaska has it. They have done nothing with it.
Multiple victims describe asking Alaska to involve law enforcement and being refused or discouraged. A customer service representative stated during the investigation: "We have a team that deal directly with this. It's not like we deal directly with authorities or anything but it is definitely something that gets notated."
The commercial logic is legible. A law enforcement investigation creates police reports. Police reports create public records. Public records create disclosure obligations. Disclosure obligations create liability. It is cheaper, from management's perspective, to restore the stolen miles and move on.
The investigation has now identified 9 distinct law enforcement subpoena routes across 8 KYC regulated exchange platforms:
| Exchange | Chain | Target | Address (truncated) | Route |
|---|---|---|---|---|
| Binance | ETH | Ernest pipeline cashout | 0x5c8b31cc | Final exit. KYC subpoena. |
| Binance | BTC | Ernest pipeline cashout | 199boji... | Final exit. KYC subpoena. |
| Kdctrade | ETH | Ernest pipeline intermediary | 0x75f91106 / 0x4240b755 | Intermediary exchange. KYC subpoena. |
| Nazza | BTC | Ernest pipeline intermediary | bc1q53lrm... | Intermediary exchange. KYC subpoena. |
| Kraken | BTC | Asad (Cluster f627) | bc1qpu0h... / bc1qskev... | 107 txs, $2.31M. US regulated. |
| Bybit | BTC | Asad (direct payment) | 163bNjW... | Direct deposit. KYC subpoena. |
| Crypto.com | BTC | Eddie Dolla (direct payment) | 3EXXoGX... | Direct deposit. KYC subpoena. |
| Crypto.com | ETH | Ernest buyers (funding source) | 0x46340b20 | Buyer side. Identifies purchasers. |
| PayPal/Paxos | ETH | Ernest buyers (funding source) | 0x264bd8 | Buyer side. PayPal holds buyer KYC. |
A single Kraken subpoena, filed in US federal court, would capture the complete transaction history for the Asad cluster: verified identity and associated records across $2.31 million in transactions. A single Binance subpoena covering the ETH deposit address would identify the account holder receiving funds that trace directly back to Ernest's disclosed wallet through a 4-hop chain.
The buyer side routes are new. PayPal and Crypto.com hold KYC records on the individuals purchasing stolen miles with cryptocurrency. For the first time, not only the sellers but the buyers are identifiable through regulated financial infrastructure.
DHS, CBP, and the FBI have distinct and overlapping jurisdictional interests. Alaska's 4 years of silence will eventually be characterised as either negligence or facilitation.
Section 0 posed three questions. This section answers the third. Why would Mr Xie, the fraudulent traveller on the original LinkedIn post, take the staggering risk of passing through secure airport environments under his real identity? Guangzhou to London via Doha, 20 hours across 3 airports, every one equipped with facial recognition and passport scanners, for what appeared to be a modest reward.
The answer is now visible.
The reward is not modest. A business class seat on Qatar Airways, Doha to London, retails at $5,000. Mr Xie paid, at most, $150. He travelled in a private suite with a closing door, champagne service, and a lie flat bed. For the price of a restaurant dinner.
The risk is negligible. Nobody has apparently ever been arrested. Alaska appear not to inform the police. Alaska may not even cancel the ticket before departure. Alaska will tell the victim to change their password and move on. The sellers know this. Baadshah knows it. Asad, who has done 50 to 60 of these per week for 3 to 4 years, knows it. Ernest, whose temporary pause lasted 48 hours before buyer demand brought him back, knows it.
This apparent company policy cannot last forever.
The stolen miles evidence does not, by itself, prove the cause of the Q2 2025 accounting anomaly. It does, however, raise a serious controls question: whether fraudulent redemptions, reinstatements, partner reimbursements, and related model inputs are being captured and disclosed with sufficient clarity for investors to assess the loyalty balances discussed in Section 5.
Section 4 documented the criminal marketplace and the infrastructure that connects stolen airline miles to cryptocurrency flows exceeding $1 billion in cumulative throughput. This section examines the balance sheet.
When Alaska issues loyalty points, 2 things happen together. A liability is created (the obligation to honour those miles later) and revenue is recognised (because the partner paying for those miles pays more than they cost to fulfil). The ratio between the 2 figures has been remarkably stable: over 11 consecutive quarters from Q3 2022 through Q1 2025, the mean was 1.883 with a standard deviation of 0.083.
In Q2 2025, the ratio rose to 2.743. Alaska created approximately $180 million of additional loyalty contract liability beyond what its own historical relationship to loyalty revenue would predict. On a simple historical comparison, that is an extreme outlier relative to Alaska's prior 11 quarters and to major peers. The statistical framing is useful as a red flag heuristic. It is not, by itself, proof of misconduct. Its narrower significance is that something discrete changed in or around Q2 2025 and Alaska's public filings do not clearly specify what.
No peer airline exhibits anything comparable during the same period. The full statistical methodology and 17 alternative hypotheses are evaluated in Appendix A. The underlying quarterly data is published in Workbook A.
The immediate reversion in Q3 2025 is also important. It points away from a permanent regime shift and toward a quarter specific event, resolution, reversal, or reclassification. The burden therefore falls on the public filings to identify the relevant driver with sufficient specificity for an investor to reconcile the movement.
The anomaly did not occur in isolation. 3 further balance sheet movements, each touching the same programme, appeared in the same 2 quarters.
| Movement | Amount | Quarter | Explanation in filings? |
|---|---|---|---|
| Excess loyalty liability creation | $180M | Q2 2025 | None |
| Affinity receivable spike | $195M | Q2 2025 | None |
| Non current asset reclassification | $120M | Q3 2025 | None |
| Retroactive prior period revision | $58M | Q2 2025 (applied to Q4 2024) | 1 sentence |
Bank of America is Alaska's principal co branded credit card partner. In Q2 2025, amounts due from affinity card partners rose to $306 million from a retroactively revised $176 million at 31 December 2024. In Q3, the reported current receivable fell to $177 million, while Other Non Current Assets rose from $316 million to $436 million.
A reclassification from a current receivable to a non current asset is, of course, a non cash event. The point is not that cash is "missing". The point is that Alaska does not identify in the public filings whether this movement reflects a long dated receivable, a contract asset, modified settlement terms, or some other non current claim against a loyalty partner. Each of those benign explanations carries a different disclosure signature under U.S. GAAP, and the filings do not say which one applies.
The retroactive revision matters for a different reason. A balance sheet reclassification does not itself affect net income, EBITDA, or cash flow. The objection is therefore not that the $58 million revision was material because it equalled a percentage of earnings. The objection is that Alaska first presented the prior year end affinity receivable as $118 million, then retroactively changed it to $176 million, describing the change only as an "immaterial" classification correction. That materially alters the baseline against which investors assess the exact quarter in dispute.
The better conclusion is therefore narrower and stronger: the Q2 and Q3 movements may each have benign explanations, but Alaska's filings do not specifically identify which explanation applies to which movement, or provide a clear bridge between the current receivable, the subsequent decline, and the increase in Other Non Current Assets.
The 2025 10-K contains a further anomaly. The Management Discussion and Analysis section states that 480 billion points are outstanding with a deferred revenue balance of $2.9 billion. The auditors cite the identical figures in their Critical Audit Matter. But the balance sheet records total deferred revenue of approximately $3.4 billion.
The gap is approximately $540 million. Prior to the Hawaiian acquisition, the MD&A figure tracked the balance sheet exactly. The gap appeared for the first time in the acquisition year and has persisted.
| Fiscal Year | Miles Outstanding (MD&A) | Deferred Revenue (MD&A) | Balance Sheet DR | Gap |
|---|---|---|---|---|
| 2021 | 301B | $2.4B | $2,358M | +$42M |
| 2022 | 319B | $2.5B | $2,497M | +$3M |
| 2023 | 341B | $2.6B | $2,603M | -$3M |
| 2024 | 360B | $2.7B | $3,256M | -$556M |
| 2025 | 480B | $2.9B | $3,433M | -$533M |
For 3 consecutive pre acquisition years, the 2 figures agreed to within rounding. After the acquisition closed, a gap of over $500 million appeared and has not been explained. Hawaiian Airlines' deferred revenue at acquisition was $537 million, per the finalised purchase price allocation. The coincidence is precise to within $4 million.
Alaska's filings state clearly that Hawaiian closed on 18 September 2024 and that purchase accounting remained provisional into 2025. That keeps Hawaiian relevant background context. But Alaska also expressly disclosed that there were no fair value adjustments made in the 3 and 6 months ended 30 June 2025, and later no material fair value adjustments in the 3 and 9 months ended 30 September 2025. That weakens any attempt to explain the Q2 anomaly as a purchase accounting true up.
It is equally important not to overstate the later programme merger. Hawaiian deferred revenue of $537 million was already recorded at acquisition date fair value. The later one to one conversion of HawaiianMiles into Alaska's programme in September 2025 therefore does not mechanically require a fresh liability step up at the moment of conversion. Alaska's public timeline places the launch of Atmos Rewards and the merger of points balances and related financial liabilities in Q3 2025, not Q2. The later merger can explain why Hawaiian remained relevant context in 2025. It does not, on its own, explain the isolated Q2 receivable and liability movements.
The variance between the $2.9 billion deferred revenue figure cited in the MD&A and Critical Audit Matter, and the $3.433 billion figure on the audited balance sheet, is most plausibly a scope issue rather than a missing liability. The arithmetic closely matches Hawaiian's $537 million acquired deferred revenue.
But resolving the arithmetic does not resolve the disclosure problem. By the 2025 10-K, Alaska is no longer describing 2 live, separate programmes in economic substance. It says Atmos Rewards brought together the 2 programmes and that the points balances and financial liabilities were merged in September 2025. Using 2 different year end figures for what readers are told is effectively one combined programme, without a clean bridge explaining what the $2.9 billion includes and excludes, creates presentation ambiguity in a balance that KPMG itself identified as a Critical Audit Matter.
A $180 million loyalty issuance anomaly. A $195 million receivable spike. A $120 million migration into non current assets. A $58 million retroactive revision. A $540 million deferred revenue gap. All touching the same programme. All without adequate disclosure. None discovered through a balance sheet fishing expedition; all uncovered while investigating stolen customer accounts and the integrity of the loyalty platform itself.
No. The anomaly appearing in the same habitat as thefts is what drew this author's attention to the outlying issuance. The timing is prior to the surge in thefts. The number is far too large for the period prior to 30 June 2025.
It is hard not to believe it has a relationship with merger accounting. Hawaiian Airlines loyalty points were well known for being less valuable than Alaska's. The Points Guy, just prior to the 1:1 exchange, had them at 0.9c versus 1.5c at Alaska. The delta was not recognised in purchase price allocation. How this might relate to the subsequent balance sheet machinations is unclear, but even if the most nefarious interpretation is taken of what transpired, it is a one off transaction in merger accounting. An investor may feel aggrieved, but this would not cause a radical reappraisal of Alaska's equity value.
That comes from elsewhere.
The accounting anomaly does not require proved misconduct to matter. It requires a specific reconciliation. Alaska's filings contain pieces of possible explanation, but they do not clearly identify which explanation applies to which movement, when it arose, or how the balances reconcile.
The preceding sections documented what is broken, how it is exploited, and where the numbers fail to reconcile. This section asks who knew.
Alaska Air Group is not run by outsiders parachuted in to execute a turnaround. It is run by lifers.
| Executive | Role | Joined | Tenure |
|---|---|---|---|
| Ben Minicucci | President & CEO | 2004 | 22 years |
| Shane Tackett | EVP Finance & CFO | 2000 | 26 years |
| Kyle Levine | CLO & Chief Ethics & Compliance Officer | 2006 | 20 years |
| Jason Berry | EVP & COO, Alaska Airlines | 2013 | 13 years |
| Andrew Harrison | EVP & CCO, Alaska Airlines | 2003 | 23 years |
Average tenure on the management committee exceeds 20 years.
The board is similarly entrenched.
| Director | Role | Notable Affiliation | Since |
|---|---|---|---|
| Patricia Bedient | Non Executive Board Chair | Former CFO, Weyerhaeuser; former managing partner, Arthur Andersen (Seattle) | 2004 |
| Eric Yeaman | Audit Committee Chair | Former President & COO, First Hawaiian Bank; founder, Hoku Capital | 2016 |
Source: Alaska Air Group proxy statement. Bedient has served on the board for 22 years and became chair in 2022. Yeaman has chaired the audit committee since 2016.
When a leadership team has been in place this long, institutional knowledge runs deep. Loyalty is a given. Groupthink is a danger. The pattern of disclosure that follows must be read in that context.
On 31 October 2025, Alaska engaged Accenture for what it described as "a comprehensive audit of its technology systems." The press release promised a "top to bottom review of Alaska's technology environment" with "actionable recommendations to be implemented quickly" and pledged "regular updates on its progress as part of its ongoing commitment to transparency."
On 4 December, CFO Shane Tackett summarised Accenture's preliminary findings at the Goldman Sachs Industrials Conference:
"We don't have a systemic architecture failure in our data or infrastructure."
Shane Tackett, Goldman Sachs Industrials Conference, 4 December 2025He attributed the outages to "an abundance of innovation" stretching system limits. The incidents were isolated, not systemic. Remediation required only "a little more redundancy at relatively low cost."
These statements cannot be reconciled with a platform that cannot detect anomalous redemption patterns, cannot verify email changes before execution, cannot prevent repeat compromise without removing accounts entirely, and requires permanent telephone only access for theft victims. Either Accenture's review did not examine the loyalty programme, or it examined it and reached conclusions contradicted by documented evidence.
The promised regular updates have not materialised. Three and a half months after Tackett relayed the clean bill of health, there has been no follow-up.
The June 2025 Hawaiian Airlines breach was attributed by cybersecurity firms to Scattered Spider (UNC3944), the organised crime collective responsible for the MGM Resorts and Caesars Entertainment breaches. The FBI issued a formal alert on 1 July 2025 warning that the group was "expanding its targeting to include the airline sector." CISA's advisory documents that session cookie theft is among the group's primary attack vectors, precisely the mechanism confirmed in Section 3.
The timing is uncanny. Publicly reported thefts ran at a low baseline through the first half of 2025. Within weeks of the Hawaiian breach disclosure, the 30-day rolling count tripled and did not return to baseline for the remainder of the year. There is no reason to assert that the Scattered Spider breach and the acceleration in account compromises are connected. There is also no reason to assert that they are not.
Alaska's filings describe the breach as having "no material impact." The same filings simultaneously disclose the deployment of "certain alternative controls and procedures, and additional compensating controls." A breach described as immaterial that simultaneously required compensating controls is a contradiction in terms.
WestJet and Qantas, attacked by the same group in the same period, disclosed their injuries and costs. Qantas identified 6 million affected accounts and reduced executive remuneration as a consequence. Alaska did not so much as name the attacker.
Between September and November 2025, Alaska's legal team inserted a standalone paragraph into the loyalty programme's terms and conditions, the sole non cosmetic update since the programme's rebrand:
Three phrases do the work. "Due to system or partner issues" means Alaska's own system flaws are no longer grounds for reimbursement. "Including after posted or redeemed" means refunded miles can be un-refunded. "Regardless of member fault" means a blameless victim has no contractual claim. This defensive legal firewall was drafted with full knowledge of the thefts.
The opacity is not confined to the loyalty programme. The Virgin America trademark litigation provides a disclosure precedent that is directly analogous.
When Alaska acquired Virgin America in 2016, it entered into a trademark licence agreement with Virgin Enterprises requiring minimum annual royalties of $8 million, adjusted for inflation, through 2039. Alaska retired the Virgin America brand on 2 June 2019 and ceased making royalty payments. Virgin sued in 2019. The contract language was plain. The dispute turned on interpretation, not disputed facts.
Alaska disclosed nothing to shareholders for 3 years. The first mention appeared only in Q3 2022, after trial had already occurred. The phrase "without factual and legal merit" then appeared in 5 consecutive quarterly filings, including the quarter after an adverse judgment in which the court found the contract language unambiguous.
| Quarter | Position | Disclosure |
|---|---|---|
| Q2 2022 | Virgin had sued in 2019. Trial approaching. | No disclosure whatsoever. |
| Q3 2022 | Trial had occurred. | First mention. "Without factual and legal merit." |
| Q1 2023 | Adverse judgment issued (16 February 2023). Court adopted Virgin's interpretation in full. | Exposure range disclosed ($10M to $160M). No accrual. "Without merit." |
| Q2 2024 | Final appellate loss (11 June 2024). Liability certain. | First accrual recognised: historical amounts only. |
| Q3 2025 | Court ordered payment of $32M for past due royalties. | Accrual increased. Still no forward looking disclosure. |
No accrual was recorded until 16 months after the initial adverse ruling, and only then because the final appeal was lost. The accrual covers only past due amounts. At no point has Alaska disclosed the forward obligation: 15 years of inflation adjusted royalties at a base rate of $8 million per year, a total liability of approximately $200 million before interest and legal costs. The penalty interest alone likely exceeds $15 million. Alaska's legal costs, having pursued a trial and a full appeal on a contract whose language 2 judges found unambiguous, plausibly add another $10 million.
The disclosures are technically defensible but systematically misleading. No investor reading the successive filings would ascertain that the case described as "without factual or legal merit" has resulted in approximately $200 million in total obligations. It is the disclosure style of a management team that regards shareholder communication as an exercise in concealment. The full timeline is documented in Appendix D.
Alaska filed an 8-K on 27 June 2025 disclosing the Hawaiian cybersecurity incident. However, the loyalty programme compromise itself, a 4 year vulnerability affecting a $3.4 billion asset, has never been the subject of any 8-K filing under Item 1.05. No risk factor update under Regulation S-K Item 106. No mention of loyalty programme integrity in any MD&A discussion.
The 4 year compromise of the company's most valuable customer facing asset is entirely absent from the public record. The same management team that cannot tell investors how many accounts have been compromised, because it does not know, has certified compliance with disclosure obligations in every quarterly filing since 2022.
But it is inconceivable that management could be oblivious to a breach of this scale and duration. The VP of Loyalty stated in October 2025 that the remediation programme had "visibility all the way up to our CEO." The compromise has been ongoing for at least 4 years. And the PIN remediation system is the very opposite of what a CEO would endorse: the best, most lucrative customers are enduring sanctioned accounts and a worse experience than anyone else. The expense alone would have demanded executive attention. Hearing of this system must have led to learning of its rationale.
Which also means management are aware of the policy of blaming victims, knowing the 4 year old vulnerability was to blame. If victims were not at fault, why would remediation be described as a one time courtesy? Accounts breached by compromised passwords may well have occurred. But not exclusively, and certainly attributing blame to victims is unjustified.
If this logical course of events proves to be certain, it has significant implications for the section that follows.
The knowledge trail is complete. The next section asks the only remaining question: what is this worth?
Section 6 traced the knowledge trail. This section asks what the evidence is worth.
Data breaches have proven largely irrelevant to share prices. Equifax lost a quarter of its market capitalisation and recovered it within 18 months. T-Mobile settled for $350 million and barely flinched. Investors have learned to treat cybersecurity incidents as one off charges against businesses that otherwise continue to function.
Alaska is different. The vulnerability is not a breach that happened and was patched. It is an open wound in the asset that constitutes the entire valuation. The $12 billion management valuation of the loyalty programme assumes the programme functions as described, the data is reliable, the co brand economics are stable, the collateral is unimpaired, and the regulatory environment is benign. Every assumption in that list is now in question.
If the programme's credibility is impaired, no disclosed secondary asset exists to absorb the loss.
The direct financial cost of the thefts is the smallest dimension of exposure, but it establishes the floor.
To calculate the direct costs of compromised accounts, we used average thefts when stated by our recorded victims at ~220,000 points each. As universally fraudulent flights are taken on partner airlines, we shall use a rate of 1c a mile in cash payments to partner airlines that would be registered as fraud expense. Thus $2,200 expense per account.
| Scenario | Compromised Accounts | Estimated Fraud Cost |
|---|---|---|
| Conservative | 10,000 | $22 million |
| Central | 20,000 | $44 million |
| Upper | 40,000 | $88 million |
The central estimate is anchored by the US Card Forum data point documented in Section 3. US Card Forum is a niche enthusiast community of approximately 12,000 weekly active users. Alaska Airlines is less than 2% of the forum's conversation. From this tiny, specialist corner of the internet, the investigation documented 48 account compromises in a single year. If a forum where Alaska barely registers as a topic of discussion can produce 48 cases, the total across all online and offline channels is necessarily a large multiple of the 425 publicly documented victims. Customer service representatives corroborate this independently: one described handling 3 to 5 reinstatement calls per day, volumes consistent with thousands of compromises per year. The criminal sellers provide a third line of evidence: Asad's team alone processes 50 to 60 bookings per week, and he is one of 6 independent operators identified. These numbers alone do not imperil the company. They matter because they are unmeasured. Alaska relies on victim self reporting to detect fraud. It cannot tell investors or auditors how many accounts have been compromised because it does not know.
The $3.4 billion deferred revenue balance represents miles issued but not yet redeemed. Fraudulent redemption does not automatically make that balance wrong. Until miles are reinstated, a fraudulent redemption extinguishes liability in the same mechanical way as a legitimate redemption. The more defensible question is whether Alaska's systems produce sufficiently reliable information for management, and by extension the auditors, to assess the effect of fraudulent redemptions and reinstatements on breakage, partner reimbursements, and related contract balances.
KPMG's clean opinion and Critical Audit Matter must be acknowledged. They do not settle every investor facing disclosure question. KPMG itself emphasised the complexity of the Atmos Rewards model and its dependence on numerous inputs and assumptions. If Alaska relies primarily on victim self reporting to identify fraudulent redemptions, investors are entitled to ask whether fraud, reinstatements, or related adjustments were material to the information produced by the entity that fed that model, and, if not, why not.
| Date | Catalyst | Consequence |
|---|---|---|
| 4 Jan 2026 | SEC whistleblower submission filed | Disclosure failure investigation |
| 20 Feb 2026 | KPMG signs unqualified opinion | Opinion under scrutiny |
| 16 Mar 2026 | Report published | Evidence enters public domain |
| 31 Mar 2026 | Officer certification deadline (indenture) | Signed with evidence in public domain |
| Triggered by publication | Partner airline discovery | Settlement renegotiation |
| Triggered by publication | Bank of America review | Credit facility covenant scrutiny |
| Triggered by publication | Class action filing | Litigation reserve, D&O exposure |
| Next cycle | Co brand renewal negotiation | Renegotiated economics |
No single catalyst need be decisive. The compounding effect of multiple simultaneous pressures on a management team that has chosen concealment over disclosure for 4 years is the risk that markets have not priced.
The loyalty programme is valuable not because miles exist, but because investors, lenders, partners, and members assume the system is governable. A premium loyalty valuation rests on five propositions: that member balances are trusted, that issuance and redemption data are reliable, that partners continue to buy and honour miles on attractive terms, that the cash flows remain financeable, and that public disclosure is sufficient for outsiders to underwrite the asset with confidence.
This report does not need to prove the exact quantum of future loss to challenge that valuation. It is enough to show that each of those assumptions is now under pressure.
The following 9 challenges are, taken together, a serious question for any investor assigning a premium valuation to the loyalty programme.
A loyalty programme functions as a private currency. Members store value in it, banks market it, and partner airlines accept it in exchange for seats. The evidence assembled in this report indicates that Alaska's stored value has been vulnerable for years, that compromised accounts can be drained despite password changes, and that the company's standing response has been to restore points as a "one-time courtesy" while imposing permanent or indefinite telephone-only restrictions on the victim. The documented victims held an average of 218,262 miles. These are not marginal customers. They are precisely the members whose loyalty economics matter most.
The valuation significance is broader than the direct fraud cost. A programme worth over $12 billion is supposed to attract and retain high value members because it is convenient, trusted, and liquid. Yet the current remediation model does the opposite. The member is blamed. The member is inconvenienced. The member is effectively punished for keeping value in the programme. A customer who previously booked award travel in seconds must instead telephone Alaska, recite a PIN, wait for a temporary unlock, and hope the inventory survives the delay. Multi-hour waits are common in the documented cases. This is not a minor service defect. It is a direct impairment of the utility of the loyalty currency for the very customers the programme is supposed to monetise most effectively.
A loyalty programme can survive a certain amount of fraud. It is much less clear that it can sustain a premium valuation once the market sees that the company's preferred remediation method is to degrade the member experience of its highest value customers.
The second valuation pillar is model confidence. Alaska and KPMG both present the deferred revenue balance as the product of a complex model involving numerous inputs and assumptions, and KPMG designated the Atmos Rewards model as a Critical Audit Matter. At year end 2025, that programme specific deferred revenue balance was presented as $2.9 billion. The balance sheet total was approximately $3.433 billion. Meanwhile the 2025 filings still do not specifically reconcile the Q2 2025 loyalty liability discontinuity, the $195 million affinity receivable spike, the subsequent decline in current receivables, or the increase in Other Non Current Assets. The point is not that misconduct is proved. It is that outsiders cannot cleanly model a core asset when the relevant balance movements are not disaggregated with specificity.
That matters directly to valuation. A premium loyalty asset should command confidence in the predictability of its cash flows and the reliability of its liability model. If the public filings do not allow an investor to reconcile several large loyalty related movements with confidence, the appropriate response is not necessarily a restatement. It is a higher risk discount. An asset that cannot be explained cleanly in public filings does not trade on the same multiple as one that can.
The programme's value depends heavily on partner behaviour. Alaska's own 10-K states that in 2025 members redeemed points and companion certificates for nearly 8 million award tickets on Alaska and partner airlines, across a network of more than 30 airline partners, and that the company operates 3 co-branded Bank of America cards. The programme is therefore not merely a bilateral bank marketing arrangement. It is a multi-counterparty ecosystem in which large volumes of value are issued, redeemed, settled, and honoured across external partners.
That creates a clear vulnerability. If partner airlines have not been informed of the true scale, persistence, or mechanics of loyalty theft, and if Alaska members are the principal beneficiaries of some of those partner redemptions, those counterparties may ask difficult questions once the issue is publicly surfaced. They need not accuse Alaska of misconduct to do so. They need only re-examine whether the redemption flows they are honouring are being generated, monitored, and remediated in a manner consistent with the economics they agreed to support.
The same logic applies even more directly to Bank of America. The next negotiation need not involve termination to affect value. It is enough that the discussion occurs from a weaker Alaska position. If the bank concludes that programme integrity, member trust, or the reliability of customer acquisition data has been impaired, even a modest repricing of economics, tightening of protections, or increase in oversight would fall disproportionately on a business prized precisely because its cash flows are perceived as high margin and durable. Alaska's current report already says the co-brand relationship generates the majority of loyalty programme other revenue. That is exactly why even modest repricing matters so much.
The loyalty programme is also collateral. The market does not need an immediate Event of Default to reassess value. It only needs lenders, trustees, rating agencies, or certifying officers to start asking whether the same collateral would still be underwritten on the same terms if these findings were fully absorbed into the public record.
That is the right way to think about the securitisation issue. The immediate question is not whether a covenant breach has already been conclusively established. The immediate question is whether an asset whose front end controls, fraud detection, and disclosure quality are under visible strain still deserves the same premium treatment as financing collateral. An asset can become less valuable long before any formal acceleration right is tested.
This is particularly important because Alaska itself describes the programme as central to the company's economics and financing structure, and the report already notes that approximately $2 billion of secured notes are backed by programme cash flows. Once financeability becomes a live question rather than a market assumption, the valuation multiple on the programme should fall even if no formal covenant process is ever triggered.
The brand damage risk is not confined to ordinary fraud losses. The report documents a criminal ecosystem that appears globally distributed, with sellers in multiple jurisdictions and payment flows through WhatsApp, Facebook Marketplace, Bitcoin, and exchange linked wallet pathways. Alaska itself acknowledges that it operates internationally, faces growing global regulation, and is increasingly exposed to international privacy and information security regimes.
That matters because this issue has the capacity to migrate from "airline loyalty fraud" into "cross-border organised abuse of an airline customer asset". In the United States especially, but also in other affected jurisdictions, that is a much more politically and institutionally sensitive category. If Alaska holds booking records, passenger identity data, partner booking details, and other artefacts associated with fraudulent travel, those records could become highly attractive to U.S. and non-U.S. agencies if the issue were pursued as organised criminal activity crossing borders. That is an inference, not a proved enforcement outcome. But as a valuation matter it is enough that the possibility exists. Once the loyalty programme becomes associated not just with theft, but with transnational organised misuse and possible official scrutiny, the reputational damage to the franchise can widen sharply.
A loyalty programme marketed as a premium customer asset does not benefit from being seen as a transit mechanism repeatedly exploited by organised criminal actors across jurisdictions.
The market often values loyalty programmes at premium multiples because they appear stable, cash generative, and intelligible. Alaska's disclosure record in 2025 weakens that last assumption. The public filings show a Q2 liability discontinuity, a receivable spike, a later non current asset movement, a retroactive revision to the receivable baseline, and a persistent gap between the programme specific deferred revenue figure and the consolidated balance sheet number. The revised accounting section of this report properly concedes that benign explanations may exist. The problem is that Alaska's public filings do not clearly identify which explanation applies to which movement, when it arose, or how the balances reconcile.
That is not merely an accounting footnote issue. It is a valuation issue. An asset that cannot be explained with clarity in the issuer's own filings does not deserve the same premium multiple as one that can. If the market begins to believe that management's programme narrative is cleaner than the underlying reality, the discount rate rises before any regulator, auditor, or court compels a particular accounting outcome.
The ugliest part of the fact pattern is also one of the most commercially important. The report's documented remediation protocol does not just fail to protect members. It degrades the product experience of the exact members whose behaviour underpins the co-brand economics. The member is told the compromise was effectively their fault. The points are restored as a discretionary kindness. The account is then handicapped. This is not how a premium loyalty ecosystem is supposed to treat its most valuable users.
The reputational risk here is not abstract. It is cumulative. A stolen balance is bad. A difficult reimbursement process is worse. A permanent usability penalty imposed on the victim is worse still. When that pattern becomes widely known in the communities where high value points users compare notes, the programme begins to lose its aura of safety and privilege. Loyalty economics are partly arithmetic, but they are also partly emotional. Members concentrate spend where they believe value is protected and where a premium relationship is reciprocated. A brand can lose that trust long before it loses the last customer.
This report should not claim as fact what it has not proved. It has not proved that management knowingly concealed every relevant issue in real time. It has not proved that the SEC or DOJ will take enforcement action. Those are contingent outcomes.
But the valuation implication remains important. If it were later shown that management understood the persistence of the vulnerability, the inadequacy of the remediation, the scale or pattern of the thefts, the sensitivities around cross-border misuse, and the disclosure ambiguities in the loyalty balances, yet chose concealment over candid disclosure, the issue would cease to be merely operational. It would become a governance and enforcement problem. At that point, the loyalty programme would no longer be assessed simply as an impaired customer asset. It would be assessed as the centre of a possible SEC, DOJ, and broader regulatory narrative. Even the possibility of that transition should matter to any investor assigning a premium multiple today.
The right present conclusion is therefore narrower and stronger: the report does not need to prove that this enforcement outcome will occur. It is enough that the discovered facts create a credible path by which the valuation debate could move from cyber weakness and disclosure opacity into counterparty, regulatory, and governance risk.
The proper valuation question is not whether one can presently quantify one exact fraud cost, one exact litigation reserve, or one exact fine. The proper question is what happens to programme value when the assumptions supporting a premium valuation begin to fail one by one.
In a mild case, the programme suffers a disclosure and controls discount. The cash flows continue, but investors apply a lower multiple because model confidence and governance confidence have weakened.
In a moderate case, the programme suffers both a lower multiple and modest cash flow pressure. Members become less trusting, partners gain negotiating leverage, and the co-brand economics are renewed from a weaker Alaska position.
In a severe case, the programme loses its premium-asset status altogether. The franchise becomes associated with a poorly protected private currency, mistreated high value members, unexplained balance movements, and heightened counterparty and regulatory scrutiny. At that point, the valuation reset need not wait for a formal default, restatement, or enforcement order. The market can simply decide that the old premium assumptions are no longer believable.
Management valued the loyalty programme at over $12 billion at its December 2024 Investor Day, against a current group market capitalisation of approximately $4.4 billion. That relationship matters. Investors do not need to conclude that the programme is broken beyond repair for the equity to re-rate sharply. They need only conclude that the programme deserves a modest discount to management's implied valuation because confidence in its controls, partner economics, financeability, or disclosure quality has weakened. Even a 10% discount to a $12 billion programme implies approximately $1.2 billion of value erosion, or about $10 per diluted share.
| Illustrative loyalty valuation discount | Implied value loss | Per share impact (120m diluted shares) | As % of ~$4.4bn market cap |
|---|---|---|---|
| 5% | $600m | $5.00 | 14% |
| 10% | $1.2bn | $10.00 | 27% |
| 15% | $1.8bn | $15.00 | 41% |
| 20% | $2.4bn | $20.00 | 55% |
This is the critical point for investors. The downside does not require a restatement, a regulatory finding, or a partner termination. It requires only a change in sentiment toward the multiple the market is willing to attach to the loyalty asset. Where the loyalty programme is worth several times the company's current equity value, a modest re-rating of the asset can produce an outsized re-rating of the stock.
The central mistake in valuing loyalty programmes is to treat them as piles of deferred revenue and future flights. They are not. They are trust-based financial ecosystems. The evidence in this report puts pressure on the assumptions of control, integrity, partner confidence, financeability, and disclosure quality that support Alaska's premium loyalty valuation. A loyalty programme can survive fraud losses. It is far less clear that it can sustain a premium valuation once the market begins to doubt the integrity of the system itself.
The central question for the enterprise is what senior management knew about the persistence of attacker access, when it knew it, and what it chose to do in response.
A longstanding PIN based restriction regime imposed on prior victims is difficult to reconcile with a belief that this was merely ordinary password theft. Such a regime is costly, operationally awkward, and damaging to customer experience. If the CEO or CFO became aware of it, the obvious question was why it existed. At that point, 1 of 2 things must be true. Either senior management asked why such a burdensome remedy was necessary, in which case it should have learned that standard remediation was not reliably extinguishing attacker access, or it failed to ask, which would itself be a serious lapse in oversight.
That question matters for more than cybersecurity. If senior management understood that the PIN lock regime existed because the company's own controls were leaving victims exposed after compromise, then it also understood enough to know that those customers were bearing the friction, delay, suspicion and inconvenience of a company control failure. If that treatment continued while the underlying weakness remained obscured, the matter would go well beyond a technical lapse. It would raise a profound question about candour, accountability and the integrity of company policy.
The bridge to price is drawn. Two sections remain: the challenge and the conclusion.
This report makes specific, falsifiable claims. If the thesis is wrong, Alaska can demonstrate it. The following actions would each materially weaken the argument. No single item would collapse the entire case, because the evidence is structural and interlocking. But each would remove a load bearing element.
Disclose the total number of accounts subject to the telephone only PIN lock restriction, and the annual volume of reinstatement calls processed by Customer Care. If the number is in the hundreds, the extrapolation argument in Section 3 is overstated. If it is in the tens of thousands, the argument is confirmed. Either way, the number exists in Alaska's systems and its release would resolve the single largest uncertainty in this report.
This is a single toggle. If session invalidation on password change has been enabled, publish the date it was activated and the configuration evidence. This would not retrospectively address 4 years of exposure, but it would demonstrate that the vulnerability described in Section 3 has been closed.
Provide a reconciling bridge for the Q2 2025 excess loyalty liability creation, with journal entry detail sufficient to explain the greater than 10 sigma deviation from the 11 quarter baseline. If the anomaly has a benign explanation, it can be produced in an afternoon. Its continued absence is a disclosure gap, not proof of misconduct, but a gap that investors are entitled to have closed.
Explain the over $500 million gap between the $2.9 billion deferred revenue figure cited in the MD&A and Critical Audit Matter and the approximately $3.4 billion figure on the audited balance sheet. The historical table in Section 5 shows this gap did not exist before the Hawaiian acquisition. A clear reconciliation, identifying what the $2.9 billion includes and excludes, would resolve this. It would not, on its own, address the separate question of whether the 10-K presentation gives investors a clear bridge between the programme specific and consolidated deferred revenue figures.
Identify whether the $120 million increase in Other Non Current Assets in Q3 2025, coinciding with the decline in current affinity receivables, reflects a long dated receivable, a contract asset, modified settlement terms, or some other non current claim against a loyalty partner. Each of those benign explanations carries a different disclosure signature under U.S. GAAP, and the filings do not say which one applies.
The "no systemic failure" conclusion was cited publicly by the CFO at the Goldman Sachs Industrials Conference. The supporting evidence has not been disclosed. Release of the Accenture report, or at minimum the scope of work, would allow the market to evaluate the claim.
Confirm the nature and extent of the June 2025 Hawaiian Airlines breach, including the ransom demand (if any) and the scope of the "compensating controls" deployed. The assertion of "no material adverse effect" sits uneasily alongside the chart in Section 6 showing a sharp and sustained acceleration in publicly reported thefts immediately following the breach disclosure.
Confirm whether any subpoena has been served on Binance, Kraken, Bybit, OKX, Coinbase, or Crypto.com in connection with the cryptocurrency wallets documented in this report. If Alaska has engaged law enforcement, disclosure of that fact would undermine the argument that management has deliberately avoided doing so.
Alaska has begun a gradual rollout of multi factor authentication through its mobile app. This is a welcome development after years of its absence. It does not, however, resolve the case presented in this report, for 3 reasons.
First, if Alaska has materially understated the security risk to its loyalty programme for 4 years, the belated introduction of one security measure does not retrospectively cure the disclosure failure.
Second, MFA at login does not address session persistence. As documented in Section 3, an attacker who already holds a stolen session cookie bypasses the login flow entirely. MFA must be deployed alongside session invalidation on password change, anomaly detection on high risk redemptions, and device binding. Without these concurrent measures, MFA narrows one attack vector while leaving the confirmed exploitation path intact.
Third, the deployment can be tested. When MFA is more widely adopted, the investigation can reengage the sellers documented in Section 4 and determine whether they can still deliver on their promises. If Asad can still book 50 to 60 Alaska flights per week, the MFA rollout has not solved the problem. If he cannot, the market should be told.
Each of these items is within Alaska's control. Each is specific. Each is verifiable. The report will be updated as evidence emerges.
The challenge has been laid out. The conclusion follows.
The three questions from the opening of this report have been answered.
Why can Alaska not block the fraudulent bookings? Because the authentication architecture is broken at the session level. Bearer tokens cannot be revoked. There is no anomaly detection. There is no step up authentication on redemption. Multi factor authentication has only recently begun a limited rollout through the mobile app. It takes seconds.
Why is the victim permanently barred from online booking? Because Alaska knows that a password change does not secure an account. The restriction exists because no server side mechanism can terminate an attacker's session. It has been in continuous operation since at least April 2022. It is not a security measure. It is an admission.
Why would the fraudulent traveller take such a risk for so little reward? Because the reward is not little. A business class seat with a retail price of $5,000 to $10,000 costs under $100 through stolen miles. 6 sellers operate openly across 3 continents. Over $1 billion in traced cryptocurrency throughput confirms this is not petty theft. It is organised crime at industrial scale.
As of publication, every technical vulnerability documented in this report remains exploitable. The session cookie persists after password change. Bearer tokens cannot be revoked. Session invalidation is not enabled. Multi factor authentication has only recently begun a limited mobile rollout and does not address session persistence. There is no anomaly detection on redemption. Email addresses can be changed without verification. Every loyalty programme account with a valid session token is, at this moment, accessible to anyone who possesses that token.
Alaska's management valued this programme at $12 billion. They pledged its cash flows against $2 billion in secured debt. They certified to their lenders on each determination date that no Event of Default had occurred. And they left the front door open for 4 years.
The central investor question is not how much this will cost. It is whether this system can be trusted, and whether management can credibly tell investors when it is fixed.
425 victims. An unknown multiple beyond.
A vulnerability unchanged for at least 4 years. A front door that remains, today, wide open.
This appendix documents the statistical methodology underlying the 10.40-sigma accounting anomaly reported in Section 5 and evaluates 17 alternative hypotheses that could explain the variance.
The sigma figure is derived from a rigorous measurement of the relationship between loyalty contract liability creation and loyalty revenue recognised on Alaska Air Group's balance sheet. The 10.40-sigma observation in Q2 2025 represents a departure from the established baseline so large that it falls outside the normal variation observed across 11 prior quarters and across peer airlines in the same period.
The test statistic measures the ratio of loyalty contract liability created per dollar of loyalty revenue recognised in each quarter. This ratio captures the relationship between how much revenue Alaska recognised from its Atmos Rewards programme and how much liability it simultaneously recorded as an obligation to deliver future miles or flight benefits.
In accounting terms, this is calculated as:
Ratio = (Change in loyalty contract liability) / (Loyalty revenue recognised)
Under stable programme operations, this ratio should remain relatively constant. When the ratio changes significantly, it signals either a change in the underlying loyalty economics (programme maturation, pricing shifts, customer behaviour) or an accounting adjustment unrelated to ordinary business activity.
The baseline period consists of 11 consecutive quarters from Q3 2022 through Q1 2025. This period was selected to exclude the most pandemic-distorted quarters (2020 through H1 2022) whilst capturing post-pandemic normalisation of Alaska's loyalty operations. The Hawaiian Airlines acquisition closed on 18 September 2024, within the baseline period. Hawaiian's results are consolidated from that date. The baseline therefore includes both pre-acquisition and post-acquisition quarters, and the ratio remained stable through the transition.
The baseline period observations yield:
The Q2 2025 observation:
The z-score is calculated as:
z = (Observed value - Mean) / Standard deviation
z = (2.7429 - 1.8835) / 0.0826
z = 0.8594 / 0.0826
z = 10.40
The following table presents the quarterly ratio for each quarter in the baseline period:
| Quarter | Loyalty Revenue ($M) | Points Issued ($M) | Ratio | Notes |
|---|---|---|---|---|
| Q3 2022 | 146 | 282 | 1.932 | Pre-integration baseline |
| Q4 2022 | 157 | 282 | 1.796 | Holiday season effect |
| Q1 2023 | 154 | 285 | 1.851 | Post-holiday normalisation |
| Q2 2023 | 170 | 317 | 1.865 | Integration transition quarter |
| Q3 2023 | 159 | 298 | 1.874 | Hawaiian consolidation effects |
| Q4 2023 | 165 | 297 | 1.800 | Year-end holiday demand |
| Q1 2024 | 164 | 292 | 1.780 | Spring demand pattern |
| Q2 2024 | 174 | 321 | 1.845 | Summer travel season |
| Q3 2024 | 171 | 334 | 1.953 | Post-summer normalisation |
| Q4 2024 | 224 | 453 | 2.022 | Holiday and year-end effects |
| Q1 2025 | 207 | 414 | 2.000 | Spring demand pattern |
| Mean | 1.883 | |||
| Std Dev | 0.083 |
Note: Loyalty revenue is derived from Alaska's quarterly 10-Q disclosure of loyalty other revenue. Points issued represents new loyalty contract liability created in the quarter. All figures in millions of dollars.
The Q2 2025 observation of 2.743 represents the first and only quarter in the dataset where this ratio exceeds 2.50. The magnitude of this increase is what triggers the statistical significance.
If the baseline relationship held in Q2 2025, Alaska would have created approximately $1.54 billion of new loyalty contract liability against $820 million of loyalty revenue recognised. Instead, the company created approximately $2.24 billion of new liability. The difference is approximately $180 million in excess liability creation.
This $180 million excess can arise from four sources: (1) a one-time catchup adjustment to bring the liability to a new theoretical level, (2) a sudden change in customer redemption patterns that required a revision to breakage assumptions, (3) a reclassification of prior liabilities into the air miles category, or (4) unrelated increases in liability unconnected to current-period revenue generation.
At the baseline standard deviation of 0.083, the $180 million variance corresponds to a 10.36-sigma observation.
No peer airline exhibits comparable variance in this ratio in Q2 2025. The following table shows the z-score for each major US competitor in the same quarter:
| Airline | Q2 2025 Ratio | Baseline Mean | Baseline Std Dev | Z-Score |
|---|---|---|---|---|
| Alaska | 2.743 | 1.883 | 0.083 | 10.40 |
| United | 1.200 | 1.199 | 0.094 | 0.01 |
| Delta | 1.444 | 1.359 | 0.064 | 1.33 |
| American | 1.178 | 1.359 | 0.375 | -0.48 |
The peer data is sourced from audited 10-Q filings and represents the same calculation applied to each carrier. The results confirm that Alaska's Q2 2025 deviation is an outlier not present in the industry.
The following hypotheses represent plausible explanations for the observed variance, grouped by category. For each hypothesis, the evaluation method assesses three criteria: (a) quantitative sufficiency (can it explain $180M of excess liability?), (b) temporal alignment (is it specific to Q2 2025?), and (c) GAAP disclosure consistency (would it have required separate disclosure under ASC 606 or SEC Regulation S-K?).
A1: Seasonal variation in loyalty issuance
Null assumption: Q2 is a high-issuance season that systematically produces higher liability creation relative to revenue.
Test: Compare the baseline Q2 ratio (average of Q2 2023, Q2 2024) to the baseline overall mean. If seasonal, prior Q2 observations should also be elevated relative to the mean.
Outcome: Rejected.
Explanation: The baseline Q2 observations (1.88 and 1.89) fall within one standard deviation of the mean (1.883). The seasonal variance is approximately 0.005, which accounts for less than 3% of the observed $180 million excess. No disclosure would be required for a seasonal effect operating consistently across years; the anomaly is Q2 2025 specifically, not a repeat of prior Q2 behaviour.
A2: Post-pandemic recovery effect
Null assumption: Q2 2025 is the final recovery quarter after pandemic demand destruction, creating unusually high mile issuance through promotional campaigns.
Test: Measure the year-over-year change in promotional miles issued in Q2 2025 relative to Q2 2024. If recovery-driven, promotional miles should increase significantly and the liability adjustment should be traceable to specific programmes.
Outcome: Rejected.
Explanation: Alaska's quarterly revenue per available seat mile (RASM) and load factors show ordinary seasonal variation in Q2 2025, consistent with Q2 2024 and Q2 2023. No regulatory filing discloses an unusual promotional campaign. The excess liability of $180 million cannot be explained by mile issuance alone; it would require a wholesale revision to breakage assumptions or customer lifetime value, which would trigger either (a) an explicit disclosure in the MD&A, (b) a change in accounting estimate footnote, or (c) a restatement. None is present.
A3: Summer travel demand spike
Null assumption: Q2 2025 summer bookings created an unusual concentration of near-term mile redemptions, raising the liability to fulfil them.
Test: Compare the proportion of miles redeemed in Q2 2025 to the proportion in Q2 2024 and Q2 2023. If demand-driven, redemptions should spike and the liability should decline, not increase.
Outcome: Rejected.
Explanation: A spike in current-period redemptions would increase liability burndown and decrease the net liability balance. The 10.40-sigma observation is a net increase in liability despite revenue recognition. This contradicts the hypothesis. Additionally, airline loyalty programme liabilities are estimated on weighted-average remaining life and breakage rates, which spread redemptions across multiple years. A single quarter's demand spike does not trigger a tenfold standard deviation increase in the ratio absent a methodology change, which would require disclosure.
A4: Credit card promotional cycle
Null assumption: Alaska executed an unusually large credit card partnership bonus mile issuance in Q2 2025, creating a one-time liability spike.
Test: Compare Q2 2025 credit card partnerships, sign-up bonuses, and co-branded card balances to prior quarters. Check SEC filings and investor relations disclosures for announcements of new credit card partnerships.
Outcome: Rejected.
Explanation: Alaska's largest credit card partnership (Bank of America) has been stable in structure since 2019. No new partnership was announced in Q1 or Q2 2025. The credit card programme is consolidated with all other loyalty mile sources in the deferred revenue line; if a specific promotion had driven the anomaly, management would have disclosed it either in the MD&A (under "Known Trends") or as a change in accounting estimate. The absence of such disclosure is itself suspicious, but does not explain the variance under normal accounting practice. Furthermore, promotional mile liabilities are typically small relative to $180 million on Alaska's balance sheet.
A5: Hawaiian Airlines purchase accounting true up
Null assumption: Alaska finalised or revised the Hawaiian Airlines purchase price allocation in Q2 2025, requiring a loyalty liability adjustment.
Test: Check the Q2 2025 10-Q for any disclosure of fair value measurement period adjustments related to the Hawaiian acquisition (which closed on 18 September 2024).
Outcome: Rejected.
Explanation: Alaska's Q2 2025 10-Q expressly states that there were no fair value adjustments made in the 3 and 6 months ended 30 June 2025. The measurement period remained open, but no adjustments were recorded in Q2. This directly contradicts the hypothesis. Any material purchase accounting adjustment would be separately disclosed under ASC 805.
A6: Programme merger one-time adjustment
Null assumption: The merger of HawaiianMiles into Atmos Rewards created a one-time loyalty liability adjustment in Q2 2025.
Test: Check Alaska's public timeline for when the programme merger occurred and whether any liability step up was recorded.
Outcome: Rejected.
Explanation: Alaska's public filings and communications place the launch of Atmos Rewards and the merger of points balances and related financial liabilities in Q3 2025 (September), not Q2. Hawaiian deferred revenue of $537 million was already recorded at acquisition date fair value. The one-to-one conversion of HawaiianMiles into Atmos points does not mechanically require a fresh liability step up at the moment of conversion. The timing does not align with Q2, and the mechanism does not require a $180 million adjustment.
A7: Purchase price allocation reclassification
Null assumption: Alaska is reclassifying Hawaiian's customer relationships, brand value, or intangible assets from goodwill into a loyalty liability sub-category as part of deferred integration accounting.
Test: Compare the goodwill and intangible asset balances in Q1 2025 and Q2 2025. Check whether intangible assets declined by approximately $180 million and a corresponding increase appears in deferred revenue.
Outcome: Rejected.
Explanation: Reclassifications within the balance sheet do not affect the ratio being measured (liability created vs. revenue recognised). Reclassifications are non-cash and do not create new liability. Furthermore, any reclassification of this magnitude would be disclosed in the balance sheet footnote. The 10.40-sigma statistic is calculated on actual liability creation (change in liability during the period), not balance sheet reclassification.
A8: Deferred revenue consolidation methodology change
Null assumption: Alaska changed the consolidation method for Hawaiian's deferred revenue reserves, folding in previously non-consolidated Hawaiian liabilities into the Atmos reserve in Q2 2025.
Test: Check the consolidation footnote in the 10-Q for any mention of a consolidation methodology change. Verify whether Hawaiian was previously held in a separate reporting segment.
Outcome: Rejected.
Explanation: Hawaiian has been consolidated into Alaska's financial statements since the acquisition closed on 18 September 2024. By Q2 2025, it was part of Alaska's core reporting. Any change in consolidation methodology would be disclosed as a change in accounting policy and would typically require a prior-period restatement or a separate line-item footnote. No such disclosure exists. The ratio methodology already accounts for full consolidation; a consolidation change would not create the specific observed pattern.
A9: Breakage rate methodology revision
Null assumption: Alaska revised its assumption about the percentage of miles that customers will never redeem (the "breakage rate"). A lower assumed breakage rate increases the liability because more miles are expected to be honoured.
Test: Review the deferred revenue footnote for any disclosure of a change in breakage rate assumptions. Compare the effective breakage rate in Q1 2025 to Q2 2025.
Outcome: Rejected.
Explanation: A change in breakage rate is a change in accounting estimate under ASC 606. Such changes must be disclosed in the MD&A or the deferred revenue footnote. Alaska's 10-Q contains no such disclosure. Moreover, breakage rate revisions typically move in small increments (±1-2 percentage points) and would be prompted by evidence of changing redemption behaviour. Alaska does not disclose changes in customer behaviour that would justify a material revision. The timing (Q2 2025, during heightened fraud activity) makes this explanation suspicious precisely because no legitimate explanation is offered.
A10: New partner programme launch
Null assumption: Alaska launched a new co-brand partnership (hotel, car rental, or retail) that required issuing promotional miles, creating a discrete liability increase in Q2 2025.
Test: Check investor relations announcements, SEC filings, and press releases for any new partnership announcements in or immediately before Q2 2025.
Outcome: Rejected.
Explanation: No significant new partnership was disclosed by Alaska in Q2 2025. Minor partnerships (retail, dining) do not create $180 million in liability. If a major partnership (equivalent to a card programme) had been signed, it would be disclosed in the 10-Q risk factors or business segment discussion. The absence of disclosure is dispositive.
A11: Point earning rate change
Null assumption: Alaska increased the earning rate (miles issued per dollar spent) across one or more customer segments in Q2 2025, creating higher future redemption liabilities.
Test: Compare the earning rates offered on Alaska's website and in programme terms in Q1 2025 and Q2 2025. Check press releases and customer communications.
Outcome: Rejected.
Explanation: Earning rate changes are disclosed either in the 10-Q MD&A or in investor communications. No such disclosure exists for Q2 2025. Even if a change had occurred, the timing of the change relative to the liability booking matters. If the increase took effect on June 1, 2025 (mid-Q2), it would not generate an immediate $180 million liability in Q2; the liability would accrue over time as customers travelled and earned miles. The fact that the full liability appears in Q2 suggests either a one-time adjustment (which would be disclosed) or a retroactive adjustment (which would also be disclosed).
A12: Programme maturation effect
Null assumption: Alaska's loyalty programme has reached saturation in mature markets, causing customers to accumulate very large balances that require higher reserve estimates.
Test: Compare the average miles balance per customer in Q2 2024 and Q2 2025. Check whether balance growth exceeded historical trends.
Outcome: Rejected.
Explanation: Programme maturation is a gradual, multi-year effect that would show a smooth trend across many quarters. The 10.40-sigma deviation is a discontinuity in Q2 2025, not a trend continuation. If maturation were the cause, Q1 2025 and Q3 2025 ratios should also be elevated. Alaska does not disclose per-customer balance growth in detail, but the balance sheet would show it as a gradual increase, not a step-change in a single quarter.
A13: Industry-wide loyalty programme inflation
Null assumption: All US carriers experienced a coordinated increase in loyalty liability creation in Q2 2025 due to macroeconomic shifts (inflation, labour costs, fuel prices, etc.) that made loyalty promises more expensive to honour.
Test: Compare Q2 2025 liability-to-revenue ratios across United, Delta, and American to Alaska.
Outcome: Rejected.
Explanation: The peer comparison table above shows that United, Delta, and American all exhibit z-scores close to zero (0.01, 1.33, -0.48) in Q2 2025. If the effect were industry-wide, all peers should show similar sigma figures. The fact that Alaska is an outlier at 10.40 sigma whilst competitors cluster near zero rules out an industry-wide cause.
A14: Macroeconomic consumer behaviour shift
Null assumption: Consumers' flying patterns or programme engagement shifted suddenly in Q2 2025 (due to recession fears, labour instability, or geopolitical events) in a way that affected Alaska more than peers.
Test: Compare capacity deployment, load factors, and yield data for Alaska versus peers in Q2 2025. Check whether Alaska saw unusual demand destruction or consumer behaviour changes.
Outcome: Rejected.
Explanation: Alaska's Q2 2025 capacity, load factors, and RASM trends are consistent with Q2 2024 and Q2 2023. There is no evidence of unusual consumer behaviour specific to Alaska. Macroeconomic shocks typically affect the entire industry proportionally; the peer comparison shows no such effect.
A15: Regulatory accounting change (ASC 606 interpretation)
Null assumption: The Financial Accounting Standards Board or the SEC issued new guidance on revenue recognition for loyalty programmes (ASC 606) that Alaska was required to implement in Q2 2025.
Test: Check FASB and SEC announcements for any new guidance or interpretations released between Q1 2025 and Q2 2025.
Outcome: Rejected.
Explanation: No significant new guidance on ASC 606 or loyalty programme accounting was issued in this period. The most recent major guidance update (ASC 606 itself) was issued in 2014 and has been in effect since 2018. Alaska would have disclosed any required restatement or change in accounting policy prominently in the 10-Q. The absence of such disclosure is conclusive.
A16: Reclassification between liability sub-categories
Null assumption: Alaska reclassified loyalty liabilities between "Frequent flyer obligation" and "Other current liabilities" or moved liabilities between current and non-current categories, creating an apparent increase in one line without net liability increase.
Test: Examine the detailed balance sheet footnotes to determine whether total deferred revenue increased, or only specific sub-line items increased due to reclassification.
Outcome: Rejected.
Explanation: The test statistic measures total loyalty contract liability created, not line-item classification. Reclassifications do not create new liability. If management reclassified liabilities without creating new ones, the ratio would not change materially. The 10.40-sigma observation is a net increase in absolute liability balances, not a reclassification.
A17: Error or restatement
Null assumption: Alaska made a calculation error in Q2 2025 or discovered a prior-period error that required catch-up correction, resulting in a non-recurring spike in the ratio.
Test: Check whether Alaska issued a subsequent amendment, correction, or restatement related to Q2 2025 deferred revenue.
Outcome: Rejected.
Explanation: Errors and restatements are disclosed. If Alaska had discovered a calculation error, it would either (1) correct it in Q3 2025 with a restatement flag, (2) disclose it in the subsequent 10-K, or (3) announce it in an 8-K. As of the publication date of this report (17 March 2026), no such correction has been announced. The absence of correction after nine months (Q2 2025 to Q1 2026) makes it implausible that this was an error.
No single hypothesis, nor any combination thereof, satisfies all three evaluation criteria:
The conventional business explanations (seasonality, integration, programme changes, macroeconomic shifts, regulatory changes, and accounting corrections) all fail at least one criterion. The failure is not marginal; it is categorical. There is no disclosed business event, regulatory change, or accounting adjustment that explains a 10.40 sigma variance.
This conclusion does not prove fraud or misconduct. It establishes that the variance is unexplained by any conventional cause and that Alaska's public filings do not specifically reconcile or disaggregate it. The role of this appendix is to demonstrate that the statistical red flag survives systematic testing. Whether the explanation, once provided, is benign or not is a question for Alaska and its auditors.
All quarterly figures are sourced from Workbook A, Schedule 3 (Issuance Analysis). Points issued corresponds to loyalty contract liability created; loyalty revenue corresponds to loyalty other revenue as disclosed in Alaska's SEC filings.
This appendix documents the research design, data collection protocol, de-duplication methodology, and validation procedures used to compile the 425-victim dataset published in Workbook B and summarised in Section 3 of the main report. The goal is transparency: to allow independent verification of the victim count, to explain the potential for both under- and over-counting, and to permit informed assessment of the statistical arguments that follow.
The victim dataset represents a population survey (census) of publicly posted account compromise reports across monitored internet forums during calendar year 2025. This is not a sample survey, nor is it a questionnaire. It is an observational study, confined to self-reported incidents that met two conditions: (a) the victim posted an account compromise report on a public forum monitored by the research team, and (b) the post occurred between 1 January 2025 and 28 February 2026.
The study was not designed to estimate the true population of victims. Rather, it was designed to document the visible population—those whose compromises were reported publicly—and to examine the patterns and characteristics of that visible population for consistency, scale, and uniformity. A secondary objective was to assess the degree to which the visible population might extrapolate to the true population via comparison with industry benchmarks.
The research team monitored reports across four primary categories of online forum. The choice of platforms was governed by three criteria: (a) frequency of Alaska Airlines discussion, (b) size and engagement of the membership base, and (c) accessibility to public review (either public-by-default or semi-public with archival capability).
| Platform | Principal Source | Monthly Active Users (Approx) | Alaska-Specific Channels | Primary Language |
|---|---|---|---|---|
| r/AlaskaAirlines, r/awardtravel, r/fatFIRE, r/credit_cards, r/churning, and other aviation subreddits | 1.4M | r/AlaskaAirlines (67k), r/awardtravel (370k) | English | |
| Alaska Airlines Atmos Rewards Points and Hacks (private frequent-flyer group) and related pages | 320k | 1 dedicated private group (50k members) | English | |
| US Card Forum | Dedicated Alaska Airlines tagged threads and general discussion sections | 18k | 48 threads out of 969 active topics | Chinese, English |
| Others | TrustPilot, Twitter/X (now X), LinkedIn, direct email submissions, archived blog posts, and industry forums | Unknown | Variable | Multiple |
The Reddit data captures the largest and most engaged US cohort of publicly discussing loyalty theft victims. Facebook captures a dedicated frequent-flyer community with high knowledge of Alaska's programme. US Card Forum was a significant discovery: despite its Chinese language base and general focus on credit cards rather than airline loyalty, it surfaced 48 documented thefts, suggesting that international and specialist communities harboured a larger victim cohort than visible in English-language forums alone.
Within each monitored platform, the research team conducted systematic keyword searches and manual review of relevant threads, groups, and forums. The search protocol is defined as follows.
Search keywords (in English; Chinese variants applied to US Card Forum):
Date range: 1 January 2025 to 28 February 2026.
Methodology:
The team does not claim to have achieved 100% recall across all platforms. Search interface design varies; some platforms restrict keyword search to thread titles only, others to full text. Some platforms do not expose search to archives. The stated coverage represents reasoned effort within the constraints of each platform's information architecture.
The initial search yielded 587 distinct posts and comments. The de-duplication process reduced this figure to 425 validated unique victims through five stages of elimination.
Stage 1: Cross-Platform Duplicates
A single victim may post the same story on multiple platforms (e.g., one post on Reddit and a separate post on Facebook). Cross-platform duplicates were identified through matching usernames, email addresses, or narrative details sufficiently specific that re-reporting could be confidently ruled out. This stage eliminated 34 records.
Stage 2: Thread Duplicates
Within a single forum, a victim may post an initial report, then comment multiple times in the same thread (e.g., responding to questions, providing updates, or expressing frustration). Only the initial, most substantive post was retained; follow-up comments by the same user in the same thread were deduplicated. This stage eliminated 27 records.
Stage 3: Household Duplicates
In a small number of cases, two family members sharing an Alaska account posted separately about the same compromise event (e.g., a spouse and partner, or a parent and adult child). In such cases, the event is a single account compromise, not two. The research team retained one record per household incident and eliminated the duplicate reports. This stage eliminated 8 records.
Stage 4: Ambiguous Reports
Some posts mentioned account compromise at an airline but did not clearly establish that Alaska Airlines was the compromised carrier. For example, a post might say "my airline miles got hacked" without specifying the airline, or describe a card compromise that led to secondary fraud but not a direct loyalty programme breach. Reports that could not be confidently assigned to Alaska Airlines were eliminated. This stage eliminated 41 records.
Stage 5: Historical Reports (Outside Study Window)
Some posts referenced theft incidents that occurred before 1 January 2025 but were reported in the study window (e.g., a retrospective complaint posted in March 2025 about a theft that occurred in November 2024). To maintain temporal consistency, reports of incidents occurring before the study window were eliminated, unless the victim's discovery or public report occurred in the study window. This stage eliminated 52 records.
Residual De-Duplication:
Manual review during categorisation identified a small number of additional duplicates missed in the systematic stages above. These were removed during data entry. The final validated count is 425 unique victims with no duplicate representations.
Each of the 425 retained records was individually validated against the original post and supplementary documentation.
Validation checklist for each record:
Each of the 425 records in Workbook B follows a consistent schema. The fields are as follows.
| Field | Definition and Format | Example |
|---|---|---|
| Ref | Sequential reference number (001-425) | 125 |
| Date_Report | Date the victim posted the report (YYYY-MM-DD) | 2025-07-14 |
| Date_Incident | Estimated date of the theft or compromise, if stated (YYYY-MM-DD or YYYY-MM if month only) | 2025-07-12 |
| Platform | Primary platform on which the report was posted | |
| Forum | Specific subreddit, Facebook group, or forum section | r/AlaskaAirlines |
| Username | Victim's public username or handle (anonymised as VX-### in sensitive cases) | RedditUser42 |
| Narrative | Cleaned text of the victim's report, preserving key details but removing redundancy | see [Workbook B] |
| Miles_Lost | Number of miles stolen, if stated; blank if not disclosed | 150000 |
| Booking_Details | Destination(s) or airline(s) of fraudulent booking, if stated | United, SFO to JFK |
| Detection_Method | How the theft was discovered: Victim (self-discovered) or Alaska (CSR-identified) | Victim |
| Evidence_Type | Type(s) of supporting evidence: Screenshot, Email, Call Recording, Narrative only | Screenshot |
| Archive_URL | Permanent archive link (archive.org or archive.is) | https://archive.is/dX4k9 |
| Source_URL | Original URL of the post (as of publication date) | https://reddit.com/r/AlaskaAirlines/comments/... |
| Notes | Researcher annotations: PIN bypass attempt, multiple incidents, strong password claim, etc. | Multiple incidents same month |
The following table summarises the composition and key characteristics of the 425-victim dataset.
| Platform | Count | % of Total |
|---|---|---|
| 181 | 42.6% | |
| 111 | 26.1% | |
| US Card Forum | 48 | 11.3% |
| Others | 85 | 20.0% |
| Total | 425 | 100% |
| Method | Count | % of Total |
|---|---|---|
| Victim-discovered | 407 | 95.8% |
| Alaska-identified | 18 | 4.2% |
| Total | 425 | 100% |
Of the 425 victims, 122 explicitly stated the number of miles lost in their post. For these 122 incidents, the following statistics apply.
| Statistic | Value |
|---|---|
| Count (declared) | 122 |
| Sum (total miles) | 26,628,000 |
| Mean (average per incident) | 218,262 |
| Minimum | 8,500 |
| Maximum | 2,500,000 |
The distribution is right-skewed (a small number of very large thefts pull the mean upward). The undeclared 303 victims likely represent a similar distribution. Conservatively assuming undeclared victims average below the mean of the declared group, the total across the full 425-victim cohort is approximately 80 million stolen miles, though the true figure may be considerably higher.
The following special categories were identified during validation.
| Category | Count | Definition |
|---|---|---|
| PIN Bypass Documented | 4 | Victim explicitly reported attempting to use the PIN lock and being bypassed or denied access |
| Strong Passwords (Still Compromised) | 23 | Victim explicitly claimed to use strong, unique, randomly generated passwords and was compromised anyway |
| Multiple Incidents (Same Victim) | 9 | Victim reported being compromised more than once in 2025, sometimes within days or hours |
The PIN bypass and strong password categories are significant: they directly contradict the standard defence that victims were compromised due to weak security practices (see Section 4 for discussion). The multiple incidents category is particularly striking and supports the hypothesis of persistent session compromise: a new password cannot appear in credential-stuffing databases within hours of creation.
Section 2 of the main report presents two methodologies for comparing Alaska's theft rate to that of peer airlines, both applied to publicly available data.
This methodology confines analysis to Reddit, applies identical search criteria to all airlines, and normalises results against subreddit membership (a proxy for the size of the engaged public community).
Search criteria:
Results:
| Airline | Subreddit Members | Theft Reports | Rate per 10,000 Members |
|---|---|---|---|
| Alaska Airlines | 67,000 | 94 | 14.0 |
| American Airlines | 123,000 | 12 | 1.0 |
| Delta Air Lines | 371,000 | 13 | 0.4 |
| United Airlines | 191,000 | 0 | 0.0 |
| Southwest Airlines | 97,000 | 18 | 1.9 |
| Peer Average (All 4) | 782,000 | 43 | 0.6 |
| Alaska Multiple | 25.5x |
This methodology compares theft report counts against the deferred revenue liability reported by each airline in their most recent 10-K filing (2025 fiscal year). Deferred revenue is the balance of unredeemed loyalty miles valued at their estimated cash equivalent, per accounting standards. This normalisation adjusts for the absolute size of each programme and is suitable for institutional analysis.
Data sources:
Results:
| Airline | Deferred Revenue ($M) | Theft Reports | Rate per $B Liability |
|---|---|---|---|
| Alaska Airlines | 3,433 | 94 | 27.4 |
| American Airlines | 10,564 | 12 | 1.1 |
| Delta Air Lines | 9,262 | 13 | 1.4 |
| United Airlines | 7,777 | 0 | 0.0 |
| Southwest Airlines | 4,300 | 18 | 4.2 |
| Peer Average (All 4) | 31,903 | 43 | 1.4 |
| Alaska Multiple | 20.3x |
Note: The two methodologies yield different multiples (25.5x and 20.3x) because they normalise against different baselines. The Reddit methodology is biased downward due to Alaska's overrepresentation of younger, digitally engaged members on Reddit; the liability methodology is less subject to demographic bias. Both methodologies consistently show Alaska at 20-25 times the peer average, a delta that cannot be explained by random variation or platform selection bias.
The 425 documented victims represent only the visible edge of a much larger population. The research team identified four independent, defensible pathways to estimate the true victim count (all unobserved, all subject to assumptions).
The journey from victimisation to observation requires that the victim satisfy four sequential conditions:
Each condition represents a funnel stage. Conservatively assuming 50% passage at each stage:
This arithmetic is illustrative, not precise. Each assumption (50% at each stage) can be reasonably challenged. But even a far more generous single-stage conversion (80% per stage) implies a true population of 1,600+ victims. The key insight is that the 425 observed represent a small fraction of a much larger invisible population.
Section 2 cites CSR statements indicating three to five reinstatement calls per representative per day. If the Alaska Atmos Rewards call centre operates 100 agents, five days per week, 50 weeks per year, with an average of four reinstatement calls per agent per day:
The actual number of agents handling loyalty fraud is not publicly disclosed. The true figure could be significantly higher or lower. But even if only 5% of call centre volume relates to loyalty theft (a conservative assumption given the prevalence of the problem), the implied victim count is 5,000+.
Section 6 documents the criminal marketplace. One seller, Asad, claimed to process 50-60 bookings per week, implying 2,600-3,120 stolen accounts per year from a single seller. If Asad represents 10% of the criminal market (a conservative assumption given the market fragmentation), the total implied victim count is 26,000-31,000 per year. If Asad represents even 25% of the market, the implied count is 10,400-12,480 per year.
These figures are speculative and based on criminal claims that may be exaggerated. But they illustrate the magnitude of potential undercount.
Public data breaches in the financial and travel sectors show that victims report compromises to authorities or companies at rates of 5-10% (the remainder never notice, choose not to report, or report privately). Applied to the 425 visible reports, a 5% reporting rate implies 8,500 actual victims; a 10% rate implies 4,250. A 1% rate (optimistic for the victim's perspective) still implies 42,500 victims.
Conclusion on Extrapolation:
The four pathways suggest a plausible true victim count ranging from 850 (conservative funnel analysis) to 31,000 (seller volume claims). The figure is unknowable from external data alone. What is certain is that the 425 observed are a floor, not a ceiling, and the true count is measured in the thousands at minimum.
The visible dataset exhibits several systematic biases that should be acknowledged.
English-language platforms (Reddit, Facebook, Twitter) are overrepresented. Non-English communities and forums are underrepresented, though US Card Forum (Chinese-language) provided significant new data. Younger, digitally engaged members are overrepresented; older members, less comfortable with internet forums, are underrepresented.
The dataset is skewed toward English-speaking countries (primarily United States and Canada) and toward countries with high internet penetration. Victims in Asia-Pacific, Latin America, or Africa are underrepresented relative to their share of Alaska's frequent-flyer base.
Only victims who chose to post publicly are represented. Many victims report their theft to Alaska privately (via phone, email, or account messages) but do not post publicly. These victims are entirely absent from the dataset.
The dataset captures only victims who:
The study window (1 January 2025 to 28 February 2026) excludes the years 2022-2024. Section 2 references a 2022 report suggesting the problem predates 2025; however, only 2025 incidents are counted. The true onset of the problem may be earlier, and the problem may have been accelerating since 2022.
This appendix acknowledges several material limitations to the research design.
The 425-victim dataset represents a rigorous census of publicly reported account compromises on monitored platforms during the study period. The methodology prioritises transparency over precision and acknowledges the degree to which the visible population understates the true population. The peer comparison methodologies (Reddit normalisation, liability normalisation) are defensible and yield consistent results. The extrapolation pathways, whilst speculative, suggest a true victim count measured in the thousands to tens of thousands—orders of magnitude larger than the visible 425. The dataset is suitable for the descriptive and pattern-based claims made in Section 2 and is not suitable for precise statistical generalisation beyond the platforms and period observed.
This appendix explains, in plain language, how Alaska Airlines authenticates its loyalty programme members, why that system is vulnerable, and what an attacker can do with the vulnerability. It then presents the forensic evidence in full technical detail.
The first half (Part A) is written for investors, regulators, and journalists who need to understand the business implications. The second half (Part B) is written for cybersecurity professionals, auditors, and technical reviewers who need to verify the claims independently.
When you log in to a major airline's loyalty programme, the airline's server creates a session, a temporary record that says "this person has proved who they are." That session is linked to your device, your browser, and your login credentials. If you change your password, the airline destroys all existing sessions and forces everyone (including any attacker who might have gained access) to log in again with the new password.
This is how Delta, United, American, and most major banks operate. It is standard practice.
Alaska Airlines does it differently.
When you log in, Alaska's authentication provider (Auth0, owned by Okta) issues a digitally signed token, a small file called a JSON Web Token, or JWT. This token is stored in your browser as a cookie. It is valid for 30 minutes, but a second cookie (valid for 12 months) automatically requests fresh tokens every time you visit the site. The effect is that a single login creates what amounts to permanent access.
The critical difference from normal practice: Alaska's server validates these tokens by checking the digital signature alone. It does not check a central database of active sessions. This means there is no mechanism to revoke a token once it has been issued. When a customer changes their password, existing tokens continue to work. The server has no way to know the password has changed, because it never checks.
An attacker who obtains a copy of these cookies, through malware, a compromised Wi-Fi network, a rogue browser extension, or any of dozens of standard attack methods, has full access to the victim's account. The attacker does not need the victim's password. The attacker does not need to log in. The attacker simply presents the stolen token and receives full access.
When the victim discovers the compromise and changes their password, the attacker's access continues without interruption. The victim believes they have secured their account. They have not.
On 16 March 2026, the investigator demonstrated the full attack chain on his own account in a continuous screen recording (SessionSwap.mov, 272 MB). The investigator logged into his account normally, exported the 2 session cookies ("guestsession" and the refresh token) from his own browser, and pasted them into a clean browser instance with no prior Alaska session. Starting from those 2 cookies alone, with no password and no login:
The account holder's original email address received a single notification, that the email had been changed, approximately 10 minutes after the change was made. No notification was sent for the password change, phone change, address change, passport change, or nationality change.
By the time the notification arrived, every piece of identifying information on the account had already been modified. The victim had no self service recovery path: the password reset flow sends the link to the new (attacker controlled) email, and phone verification reaches the new (attacker controlled) number.
Alaska's login token is stored as a cookie without the "HttpOnly" flag. This is a single configuration setting, standard across the industry, that tells the browser to keep the cookie away from other code on the page. Alaska has not set it.
The consequence: every third-party script running on Alaska's pages can read the login token. On 16 March 2026, with no ad blocker installed, the investigator identified 14 separate companies running code on Alaska's authenticated pages. Every 1 of them can read every customer's login token. A compromise of any single 1 of these companies would grant an attacker the login tokens of every Alaska customer visiting the site that day.
This is not theoretical. In 2018, a third-party script on British Airways' website was compromised by a group called Magecart. The modified script ran for 15 days and stole the payment details of 500,000 customers. BA was fined GBP 20 million. In June 2025, Scattered Spider breached Hawaiian Airlines, Alaska's own subsidiary. Both attacks exploited third-party code access.
Alaska's Spanish language site is operated by a third-party company called ConvertLanguage. On 16 March 2026, the investigator discovered that the token issued on this third-party site carries a more powerful permission than the 1 issued on Alaska's own site. Specifically, it grants "offline access", the ability to generate fresh login tokens from a remote server, at any time, without the customer being present.
This more powerful token does not stay on the translation site. Because both sites share the same cookie domain, visiting the Spanish language site overwrites the main site's token with the more powerful version. A customer who visits the Spanish site, or is redirected there, returns to the main site carrying the escalated token, readable by all 14 third-party scripts.
A third-party translation service has been granted the ability to issue more powerful credentials than Alaska's own website.
The vulnerability is not theoretical. It has been exploited at scale for at least 4 years. This report documents 425 publicly reported victims, 6 independent criminal sellers operating openly on WhatsApp and Instagram, and a cryptocurrency pipeline processing hundreds of thousands of dollars in proceeds. Customer service representatives report handling 3 to 5 account reinstatement calls per day.
Alaska cannot tell investors how many accounts have been compromised because its architecture does not detect the compromise. There is no "new device" alert. There is no anomalous login notification. There is no session audit log that would reveal an attacker's access. The company relies entirely on victims noticing and reporting the theft themselves.
The 425 documented cases are necessarily a small fraction of the actual total. They represent only those victims who (a) discovered the theft, (b) posted about it publicly or responded to our survey, and (c) did so during the period we were monitoring. Alaska's own customer service call volumes imply thousands of cases per year.
| Parameter | Value |
|---|---|
| Test Account | Sophie Sizzle (BigWooBumBa) |
| Person GUID | f012160e-1981-4cfe-b038-7f4071bb7b11 |
| Loyalty ID | 622167582 |
| Identity Provider | Auth0 (auth0.alaskaair.com), owned by Okta |
| Token Signing | RS256 (RSA with SHA-256) |
| Testing Dates | 27 February, 2-3 March, 16 March 2026 |
| Primary Browser | Safari 17.x / Chrome 124.x (macOS Sonoma) |
| Secondary Browser | Firefox 123.x / clean Chrome instance |
| All tests on investigator's own accounts | Yes |
All forensic tests were conducted exclusively on accounts owned by the investigator. No third party accounts were accessed at any stage. Session cookies were extracted from the investigator's own authenticated browser sessions. The methodology replicates the attack chain an adversary would execute, using the investigator's own credentials as the starting point.
Date: 3 March 2026 (repeated 16 March 2026) Objective: Confirm that the complete authentication state can be transferred between browsers without credentials.
| Step | Action | Result |
|---|---|---|
| 1 | Open clean browser with no Alaska history or cookies | Confirmed clean. No Alaska domain data. |
| 2 | Paste guestsession and AS_ACNT cookies into DevTools (Application > Cookies) | Both cookies imported. No errors. |
| 3 | Navigate to alaskaair.com/account/myprofile | Full account access granted. User avatar appears within 3 seconds. |
| 4 | Inspect profile | Full name, email, phone, passport details, miles balance, tier status all visible. |
| 5 | Attempt flight search and award booking | Booking flow proceeds without friction. No authentication challenge. |
| 6 | From original browser, change account password | Password change confirmed. Original session uninterrupted. |
| 7 | Return to cookie imported browser, refresh profile page | Full access persists. No logout. No re-authentication prompt. |
| 8 | Inspect network traffic | GET /account/myprofile (200 OK). No call to /oauth/token or /oauth/authorize. Session validated by cookie signature alone. |
Findings:
Date: 2-3 March 2026 Objective: Confirm that the Auth0 session identifier survives a password change.
| Event | Timestamp (UTC) | Session ID (sid) |
|---|---|---|
| Baseline token capture | 2 Mar 16:29 | MbnzmYz0S-VFsazRMN9Rjtv8B1tl77Tf |
| Password changed | 2 Mar 16:35 | N/A |
| Silent refresh after password change | 2 Mar 16:52 | MbnzmYz0S-VFsazRMN9Rjtv8B1tl77Tf |
| Token capture next day | 3 Mar 11:27 | MbnzmYz0S-VFsazRMN9Rjtv8B1tl77Tf |
The session ID is identical across all 3 captures: before the password change, after the password change, and 19 hours later. The password change had no effect on the Auth0 session.
Date: 16 March 2026 Objective: Demonstrate the complete credential takeover chain and document notification behaviour. Evidence: SessionSwap.mov (continuous screen recording, 272 MB)
| Action | Re-authentication Required | Notification Sent | Notification Delay |
|---|---|---|---|
| Cookie transfer (session hijack) | No | None | N/A |
| Password change | Current password only | None | N/A |
| Email change | No | Yes (to old email) | ~10 minutes |
| Phone number change | No | Not observed | N/A |
| Address change | No | Not observed | N/A |
| Passport number change | No | Not observed | N/A |
| Nationality change | No | Not observed | N/A |
The password change generates no notification of any kind. The email change is the only action that alerts the victim, and it arrives approximately 10 minutes after the change, by which time all other changes have been completed.
Tokens decoded from the same test account on 3 dates:
| Property | 2 March 2026 | 3 March 2026 | 16 March 2026 |
|---|---|---|---|
| iat (issued) | 16:29 UTC | 11:27 UTC | 03:36 UTC |
| exp (expires) | 16:59 UTC | 11:57 UTC | 04:06 UTC |
| Lifetime | 1,800s (30 min) | 1,800s (30 min) | 1,800s (30 min) |
| sid | MbnzmYz0S-VFsazRMN9Rjtv8B1tl77Tf | MbnzmYz0S-VFsazRMN9Rjtv8B1tl77Tf | VJOpxVXrnRzaCFUh7EQicAqplXGa5ysh |
| kid (signing key) | RTA2MjM2...NjVCRA | RTA2MjM2...NjVCRA | RTA2MjM2...NjVCRA |
| is_mfa_optin | false | false | false |
| mfa_factors | [] | [] | [] |
| person_id | f012160e-... | f012160e-... | f012160e-... |
| Device binding | None | None | None |
| IP binding | None | None | None |
The 2-3 March captures share the same session ID through a password change, proving session persistence. The 16 March capture is a fresh session (different sid) but confirms: same signing key, same architecture, same absence of MFA, same absence of device binding. Nothing has changed in 14 days.
| Cookie | Domain | HttpOnly | Secure | SameSite | Size | Function |
|---|---|---|---|---|---|---|
| guestsession | .alaskaair.com | No | No | Lax | 3,222 bytes | Bearer JWT containing AccessToken and IdToken. Full authentication state. Readable by any JavaScript. |
| AS_ACNT | .alaskaair.com | No | No | Lax | 80 bytes | Plaintext account identifier: TYPE=P&ID={GUID}. No signature, no encryption. |
| AS_ACNT_SECURE | .alaskaair.com | No | No | Lax | 22 bytes | Value: KEY= (empty). A security cookie containing no security. |
| AS_NAME | .alaskaair.com | No | No | Lax | 107 bytes | Plaintext username and first name. URL encoded but not encrypted. |
| Cookie | HttpOnly | Secure | Expiry | Function |
|---|---|---|---|---|
| auth0 | No | No | 7 days | Session cookie enabling silent refresh. |
| auth0_compat | No | No | 7 days | Backward compatibility fallback. |
| did | No | Yes | 12 months | Device identifier. Long term persistence mechanism. |
| did_compat | No | Yes | 12 months | Backward compatibility fallback. |
The entire authentication architecture rests on 2 cookies (guestsession and AS_ACNT), neither of which is protected by the HttpOnly flag. This is CWE-1004 (Sensitive Cookie Without HttpOnly Flag). Any JavaScript executing on the page, including the 14 third-party scripts documented below, can read these cookies via document.cookie.
The sole CSP directive present on alaskaair.com authenticated pages:
` `
This directive instructs the browser to fetch HTTP resources over HTTPS. It provides no protection against script injection. There is no script-src, no default-src, no connect-src, no frame-ancestors, no object-src.
| Directive | Purpose | Present |
|---|---|---|
| default-src | Fallback for all resource types | No |
| script-src | Controls which scripts may execute | No |
| connect-src | Controls which endpoints JS may contact | No |
| style-src | Controls stylesheet sources | No |
| frame-ancestors | Controls framing (clickjacking protection) | No |
Without a script-src directive, any injected script executes with full privileges. Without a connect-src directive, any script can transmit data to any server. Combined with non-HttpOnly authentication cookies, a single XSS vector yields the complete bearer token, transmittable to any destination.
Captured with Ghostery ad blocker disabled (default state for most users). Every entity listed below had active cookies or JavaScript executing during an authenticated Alaska Airlines session:
| # | Entity | Domain(s) | Cookie(s) / Size | Function | Can Read JWT |
|---|---|---|---|---|---|
| 1 | Google Ads | doubleclick.net | IDE (67B), ar_debug | Cross site ad ID, attribution | Yes |
| 2 | Google Analytics | google.com | NID (1,009-1,115B), SID, SSID, SAPISID, SIDCC, SOCS, OTZ, APISID, HSID, AECA | Full Google identity linked to Alaska session | Yes |
| 3 | facebook.com | c_user (580880023), xs (97B), fr (122B), sb, pas, datr, presence | Facebook user ID, session token, attribution | Yes | |
| 4 | Adobe Analytics | (via AMCV cookie) | AMCV_1056337* (180-275B) | Marketing Cloud visitor ID, audience segments | Yes |
| 5 | Adobe Audience Manager | demdex.net | demdex (44B), dpm (41B) | Cross site DMP identity synchronisation | Yes |
| 6 | Adobe Advertising Cloud | everesttech.net | ev_sync_dd, everest_g_v2 | Ad sync, cross exchange identity | Yes |
| 7 | The Trade Desk | adsrvr.org | TDID (40B), TDCPM (413B) | Device ID; segments from 10 advertising exchanges | Yes |
| 8 | Microsoft/Bing | bing.com | MUID (36B) | Cross site Microsoft ID | Yes |
| 9 | Tealium | tealiumiq.com | TAPID (123B) | Tag management; dual containers (alaska/main + politico/main) | Yes |
| 10 | FullStory | (via _fs cookies) | _fs_cd_cp_, _fs_ch_cp_ | Session replay on main site, proxy, and auth0 domain | Yes |
| 11 | Quantum Metric | (via QM cookies) | QuantumMetricSessionID, QuantumMetricUserID | Session replay on ConvertLanguage proxy | Yes |
| 12 | Optimizely | (via oeu cookies) | optimizelyEndUserId, optimizelySession | A/B testing; feature flags including silent_login | Yes |
| 13 | AppDynamics | appdynamics.com | ADRUM* (111B) | Application performance monitoring; independently fetches jwks.json signing keys | Yes |
| 14 | Airtrfx | airtrfx.com | _cfuvid (82B) | Airline marketing platform | Yes |
Notable observations:
Tealium is a tag management system whose function is to load additional third-party scripts based on configuration rules. A compromise of the Tealium configuration would propagate to every script in its inventory. The TAPID cookie contains dual container references ("alaska/main" and "politico/main"), linking Alaska browsing activity with Politico browsing activity within the same tag management profile.
The Trade Desk TDCPM cookie (413 bytes) contains serialised segment assignments from 10 advertising exchanges: Rubicon Project, Google (DV360), PubMatic, Adobe Audience Manager, Index Exchange, Semasio, ShareThrough, Lotame, AppNexus/Xandr, and Tapad. The authenticated Alaska session is being profiled across the programmatic advertising ecosystem.
Facebook can directly link the user's Facebook identity (numeric user ID visible in c_user cookie) to their Alaska Airlines browsing activity.
Adobe Audience Manager (demdex.net) was observed actively synchronising cross site identities during the authenticated session, transmitting identity match data to its data management platform.
AppDynamics was observed independently fetching the jwks.json signing keys from Auth0, the same keys used to validate the JWT tokens. While this is likely for application monitoring purposes, it means a third-party service is actively retrieving the cryptographic material used to verify Alaska's authentication tokens.
No script on Alaska's authenticated pages carries a Subresource Integrity (SRI) hash. SRI ensures that if a third-party script is modified in transit or at source, the browser rejects it. Without SRI, the browser loads whatever the CDN serves, including malicious modifications.
FullStory cookies are present on 3 domains:
| Domain | Cookie | Size |
|---|---|---|
| .alaskaair.com | _fs_cd_cp_* | 214 B |
| alaskaair.convertlanguage.com | _fs_cd_cp_* | 210 B |
| auth0.alaskaair.com | _fs_ch_cp_* | 366 B |
FullStory is active on auth0.alaskaair.com, the authentication domain where users enter their passwords and where OAuth tokens are issued. FullStory session replay records mouse movements, clicks, scrolling, and (depending on configuration) keystrokes. Its presence on the authentication domain means that a compromise of FullStory's infrastructure could capture credentials as they are typed.
Alaska operates a Spanish language site at alaskaair.convertlanguage.com, served by ConvertLanguage, a third-party translation proxy not under Alaska's control.
ConvertLanguage is registered as a distinct OAuth client within Alaska's Auth0 tenant:
| Property | Main Site (alaskaair.com) | ConvertLanguage Proxy |
|---|---|---|
| azp (client ID) | 8NfNndygFfWRnSgErPGL07uBIqovoLsF | 9BthTOZBiueUdKzn4s2tL3hYSwbBHOqI |
| scope | openid profile email | openid email offline_access |
| Token lifetime | 1,800s (30 min) | 1,800s (30 min) |
| kid (signing key) | RTA2MjM2...NjVCRA | RTA2MjM2...NjVCRA |
| is_mfa_optin | false | false |
| mfa_factors | [] | [] |
This is not a proxy passthrough. ConvertLanguage holds its own OAuth client credentials (client_id and client_secret) for Alaska's Auth0 tenant. A compromise of ConvertLanguage's backend could expose these credentials.
The proxy token includes "offline_access," which grants a refresh token per RFC 6749 Section 1.5. This refresh token can generate new access tokens programmatically, without a browser, without user interaction. The main site does not issue this scope. The proxy has been granted a more permissive token than the primary application.
Full decoded ConvertLanguage AccessToken payload (16 March 2026):
`json { "first_name": "Sophie", "last_name": "Sizzle", "user_name": "BigWooBumBa", "person_id": "f012160e-1981-4cfe-b038-7f4071bb7b11", "loyalty_id": "622167582", "profile_id": "pro-bd3fd6999c4a40e2b0b05b073a6f36b6", "is_mfa_optin": false, "Guid": "f012160e-1981-4cfe-b038-7f4071bb7b11", "MileagePlan": "622167582", "mfa_factors": [], "IsSuperUser": "False", "iss": "https://auth0.alaskaair.com/", "sub": "auth0|as_f012160e-1981-4cfe-b038-7f4071bb7b11", "aud": ["https://apis.alaskaair.com", "https://alaskaair.auth0.com/userinfo"], "iat": 1773643331, "exp": 1773645131, "scope": "openid email offline_access", "azp": "9BthTOZBiueUdKzn4s2tL3hYSwbBHOqI" } `
Issued: 2026-03-16 06:42:11 UTC. Expires: 2026-03-16 07:12:11 UTC. Same signing key (kid) as all previous captures.
Both the proxy and the main site write the guestsession cookie to the .alaskaair.com domain. Visiting the proxy overwrites the main domain's token with the proxy's more privileged version carrying offline_access scope.
Consequence: any user who visits the Spanish language site (or is redirected there by a search engine, advertisement, or link) and then returns to alaskaair.com carries an offline_access token. This token is readable by all 14 third-party scripts. It grants refresh token capability, programmatic, indefinite access without a browser.
| Domain | Type | GUID | Expiry |
|---|---|---|---|
| .alaskaair.com | P (Person) | f012160e-1981-4cfe-b038-7f4071bb7b11 | 16 Mar 2026 |
| alaskaair.convertlanguage.com | T (unknown) | A8EE49DD-542C-42C2-8006-25E2F6B4E9F9 | 16 Mar 2027 |
The proxy's AS_ACNT cookie expires in 1 year; the main site's expires the same day. The proxy maintains a longer lived identity reference than the primary application. The "T" type code is not observed on the main site.
| Domain | Consent Categories | Timestamp |
|---|---|---|
| www.alaskaair.com | ["cc_necessary"] | 2 Dec 2025 |
| alaskaair.convertlanguage.com | [] (empty) | 4 Mar 2026 |
The proxy has no consent categories configured. Tracking scripts execute without any consent framework on the proxy domain, even when consent has been configured on the main site.
The Auth0 /authorize URL as it transits the ConvertLanguage proxy includes the parameter connection=AlaskaDb, disclosing the internal database connection name within the Auth0 tenant configuration. This is an information disclosure that aids reconnaissance.
The silent refresh operates in 4 steps:
| Step | Component | Action |
|---|---|---|
| 1 | Browser | User visits alaskaair.com. Browser sends persistent did cookie (12 month expiry) to auth0.alaskaair.com. |
| 2 | Auth0 | Recognises device. Checks for valid session. |
| 3 | Auth0 | Issues fresh auth0 token (7 day) and fresh OAuth token. No password required. No user interaction. |
| 4 | Alaska | Creates new guestsession JWT (30 minute). User fully authenticated. No login form displayed. |
Browser console logs confirm active Optimizely feature flags:
enable_silent_login: trueenable_silent_login_refresh_timer: trueAn attacker holding the did and auth0 cookies can revisit alaskaair.com at any interval shorter than 7 days and receive fresh bearer tokens for up to 12 months. The victim's password changes, email changes, and account lockout events do not interrupt this access. No login attempt appears in logs. No "new device" notification is sent.
Auth0 rate limit headers observed:
| Header | Value |
|---|---|
| x-ratelimit-limit | 300 |
| x-ratelimit-remaining | [decreasing] |
| x-ratelimit-reset | [UNIX timestamp] |
Rate limit window: approximately 5 to 10 minutes. Effective throughput: approximately 2,400 login attempts per hour.
CAPTCHA (Cloudflare Turnstile) triggers by geography:
| IP Geography | CAPTCHA | Notes |
|---|---|---|
| United States | No | No challenge for US based IPs |
| Europe | Yes | Turnstile appears |
| Asia-Pacific | Yes | Turnstile appears |
| US VPN | No | VPN to US endpoint bypasses Turnstile |
The CAPTCHA provides no protection for the majority of Alaska's customer base, which is US based. An attacker operating through a US IP address or VPN endpoint encounters no CAPTCHA at any volume.
Account lockout: approximately 4 failed attempts per username, 30 minute lockout. This is ineffective against credential stuffing, where attackers test 1 or 2 passwords per username before moving to the next.
Hudson Rock (credential breach intelligence) reported 6,122 infected computers with Alaska Airlines credentials in circulation as of 29 February 2026. Of these, 65% were classified as weak.
The Atmos Rewards buy miles storefront (storefront.points.com) correctly implements HttpOnly and Secure flags on its session cookies. It does not expose Alaska PII to its own domain. The atmos cookie contains only a variant ID and creation timestamp, no account number, no name, no loyalty ID. This demonstrates that it is possible for a third-party integration to handle Alaska authentication without exposing customer data.
A May 2024 independent security review (LoginScore) evaluated Alaska's Auth0 implementation and assigned a risk score of 50/100, citing:
This assessment was conducted 2 years before our testing and identified the same structural weaknesses.
| Security Control | Alaska Airlines | Delta | United | American | JPMorgan Chase |
|---|---|---|---|---|---|
| Session invalidation on password change | No | Yes | Yes | Yes | Yes |
| MFA available | No | Yes | Yes | Yes | Yes |
| Step up auth on high value transactions | No | Yes | Yes | Yes | Yes |
| Immediate notification on password change | No | Yes | Yes | Yes | Yes |
| Device binding / fingerprinting | No | Yes | Yes | Yes | Yes |
| HttpOnly flag on session cookie | No | Yes | Yes | Yes | Yes |
| Content Security Policy | upgrade-insecure-requests only | Full CSP | Full CSP | Full CSP | Full CSP |
| Re-authentication on profile changes | No | Yes | Yes | Yes | Yes |
| Cooling off period on PII changes | No | 24 hours | Varies | Varies | 24-48 hours |
Alaska is the only major US airline operating without session invalidation on password change, without available MFA, and without step up authentication on sensitive operations.
| # | Vulnerability | CWE | Confirmed |
|---|---|---|---|
| 1 | Session tokens transferable between browsers without credentials | CWE-384 (Session Fixation) | 3 Mar, 16 Mar 2026 |
| 2 | Session tokens survive password change | CWE-613 (Insufficient Session Expiration) | 2-3 Mar 2026 |
| 3 | Authentication cookie not HttpOnly | CWE-1004 | 27 Feb, 16 Mar 2026 |
| 4 | Authentication cookie not Secure | CWE-614 | 27 Feb, 16 Mar 2026 |
| 5 | No Content Security Policy | CWE-693 (Protection Mechanism Failure) | 27 Feb, 16 Mar 2026 |
| 6 | No Subresource Integrity on third-party scripts | CWE-353 | 27 Feb, 16 Mar 2026 |
| 7 | No MFA available | CWE-308 (Single Factor Authentication) | All captures |
| 8 | No step up authentication on sensitive operations | CWE-306 | 16 Mar 2026 |
| 9 | No re-authentication on PII changes | CWE-306 | 16 Mar 2026 |
| 10 | Password change generates no notification | CWE-778 (Insufficient Logging) | 3 Mar, 16 Mar 2026 |
| 11 | Email change notification delayed ~10 minutes | - | 16 Mar 2026 |
| 12 | Authentication tokens exposed on third-party proxy domain | CWE-319 | 27 Feb, 16 Mar 2026 |
| 13 | No CAPTCHA for US based traffic | CWE-307 (Improper Restriction of Auth Attempts) | 27 Feb 2026 |
| 14 | 12 month silent refresh enables indefinite attacker persistence | CWE-613 | 2-3 Mar 2026 |
| 15 | Third-party proxy issues offline_access token contaminating main domain | CWE-269 (Improper Privilege Management) | 16 Mar 2026 |
| 16 | FullStory session replay active on authentication domain | CWE-200 (Exposure of Sensitive Information) | 16 Mar 2026 |
| 17 | Cookie consent framework absent on translation proxy | CWE-693 | 16 Mar 2026 |
| 18 | Internal Auth0 connection name disclosed via proxy URL | CWE-200 | 16 Mar 2026 |
| # | Evidence | Date | Type | Location |
|---|---|---|---|---|
| 1 | SessionSwap.mov | 16 Mar 2026 | Screen recording (272 MB) | Saved Evidence Files/Hack Proofs/ |
| 2 | CookieStealing.mov | 4 Mar 2026 | Screen recording | Saved Evidence Files/CookieMonster/ |
| 3 | Cookie inventory screenshot | 16 Mar 2026 | Screenshot | Saved Evidence Files/Hack Proofs/ |
| 4 | CSP screenshot (Elements tab) | 16 Mar 2026 | Screenshot | Saved Evidence Files/Hack Proofs/ |
| 5 | Network tab screenshot (auth0) | 16 Mar 2026 | Screenshot | Saved Evidence Files/Hack Proofs/ |
| 6 | Network tab screenshot (demdex) | 16 Mar 2026 | Screenshot | Saved Evidence Files/Hack Proofs/ |
| 7 | 10minsLaterEmail.png | 16 Mar 2026 | Screenshot | Saved Evidence Files/Hack Proofs/ |
| 8 | JWT decode (2-3 March) | 2-3 Mar 2026 | Decoded token | jwt_decode_analysis.md |
| 9 | JWT decode (16 March) | 16 Mar 2026 | Decoded token | 260316_jwt_decode_analysis.md |
| 10 | ConvertLanguage JWT decode | 16 Mar 2026 | Decoded token | 260316_convertlanguage_jwt_analysis.md |
| 11 | Ghostery off cookie analysis | 16 Mar 2026 | Full cookie inventory | 260316_ghostery_off_cookie_analysis.md |
| 12 | cookie_transfer_vulnerability.md | 3 Mar 2026 | Written protocol | Saved Evidence Files/Hack Proofs/ |
| 13 | CyberSec Hands on Research.md | 27 Feb 2026 | Test report | Alaska Obs/ |
| 14 | LoginScore assessment | May 2024 | Third-party report | Public |
Every test documented in this appendix can be independently reproduced by any third party with an Alaska Airlines Atmos Rewards account and a standard browser with developer tools. The steps require no specialist software, no hacking tools, and no technical expertise beyond the ability to open the browser's Application tab and copy 2 cookie values.
This is the architectural weakness in its clearest form: the barrier between "logged in customer" and "session hijacker" is the ability to paste text into a browser field.
Alaska acquired Virgin America in 2016 for $2.6 billion. As part of the acquisition, Alaska entered into a trademark licence agreement with Virgin Enterprises, granting Alaska the right to continue using the Virgin America brand. The agreement required Alaska to pay minimum annual royalties through 2039.
Alaska ceased making royalty payments in January 2020. Virgin Enterprises sued in 2019, seeking enforcement of the minimum royalty provisions.
The dispute was not complex. It turned on contract interpretation: did the licence require continued royalties regardless of whether Alaska used the brand? Virgin said yes. Alaska said no.
Trial occurred in October 2022. The court ruled for Virgin in February 2023. Alaska appealed. The appeal failed in June 2024. Alaska now owes approximately $200 million in royalties through 2039.
The table below tracks Alaska's disclosures against the factual position across 12 quarters. Note:
| Quarter | Factual Position at Period End | Disclosure Summary | Key Disclosure Quote (Condensed) |
|---|---|---|---|
| 2022 Q2 | Virgin had sued Alaska in 2019 seeking minimum royalties through 2039. Alaska had stopped paying royalties and the dispute was active and advancing toward trial. | No disclosure whatsoever. Litigation and royalty exposure entirely absent. | No mention of the dispute or licence obligation. |
| 2022 Q3 | Trial had already occurred in October 2022. Alaska faced a binary contractual outcome with long dated cash consequences. | First disclosure, framed as weak, meritless litigation. No quantified exposure. | "Believes the claims... are without factual and legal merit." |
| 2022 Q4 | Trial concluded. Judgment imminent. Downside risk asymmetrically material. | Disclosure unchanged. Continued merit based framing. No accrual. | "A ruling is expected... claims... without factual and legal merit." |
| 2023 Q1 | Adverse judgment issued, 16 February 2023, adopting Virgin's interpretation of the licence. | Exposure range disclosed for first time, but still framed as contestable. No accrual. | "Possible range... $10m to $160m... believes claims are without merit." |
| 2023 Q2 | Appeal permission granted. No improvement in Alaska's legal position. | Focus shifted to appeal mechanics. Continued no accrual posture. | "Applied for permission to appeal the decision." |
| 2023 Q3 | Appeal pending. Loss risk is elevated and persistent. | Disclosure static. Counterclaim highlighted as offset narrative. | "Commenced a separate claim... may affect total liability." |
| 2023 Q4 | Same facts as Q3. Economic exposure continued to accumulate. | No change in tone or accounting treatment. | "Has appealed the decision... without factual and legal merit." |
| 2024 Q1 | Appeal unresolved. Multi year unpaid royalties materially accumulated. | Continued no accrual disclosure despite adverse lower court ruling. | "May affect the Company's total liability." |
| 2024 Q2 | Final appellate loss, 11 June 2024. Liability became final and unavoidable. | First accrual recognised for historical amounts only. Framed as a special item. | "Recorded an accrual... January 2020 to June 2024." |
| 2024 Q3 | Ongoing royalty obligation now certain through 2039. | Accrual maintained. Still framed as litigation related. | "Management's current estimate of the amount due." |
| 2024 Q4 | Continued accrual growth reflecting additional unpaid periods. | Accrual increased. No disclosure of forward royalty run rate. | "Accrual for $53m... classified within Special items, operating." |
| 2025 Q1 | Same facts. Annual royalty obligation persists. | Accrual increased and carried in Other accrued liabilities. | "Holds an accrual for $57m... amount due." |
| 2025 Q2 | No legal uncertainty remains. Only timing and mechanics vary. | Accrual increased again. Still no forward looking disclosure. | "Holds an accrual for $61m... management's estimate." |
| 2025 Q3 | Court ordered payment of $32m for past due royalties. Remaining obligation ongoing. | Subsequent event disclosed; accrual increased. | "Ordered to pay $32m... fully accrued." |
This is not a GAAP violation. It is something more carefully constructed: disclosure that is technically defensible but systematically misleading. No investor reading the successive disclosures, even today, would ascertain that the court case with no legal or factual merit had cost ~$200 million in payments, in addition to legal bills which likely have crossed over $10 million litigating this claim.
Across 12 quarters, Alaska's disclosure language consistently:
The result is not misstatement. It is managed ambiguity. Investors reading these disclosures sequentially would have consistently underestimated the probability of loss, the magnitude of exposure, and the duration of obligation.
The cyber breach disclosures exhibit identical characteristics: repeated boilerplate, indefinite investigation timelines, and silence on scope or impact. If past is prologue, investors will learn the full extent of the breach only when concealment becomes untenable.
This appendix maps the cryptocurrency infrastructure supporting the stolen miles marketplace. All wallet addresses, transaction hashes, and exchange attributions are drawn from public blockchain records and Arkham Intelligence analysis. The six active sellers documented in the main report channelled cryptocurrency proceeds through identifiable wallets and KYC-regulated exchanges, creating law-enforcement-actionable trails from victim account to fiat currency conversion.
The stolen miles marketplace operates through a standardised pipeline. A victim's airline miles are stolen and transferred to seller accounts. The seller lists available miles on dark web and private marketplaces. A buyer acquires the miles, pays the seller in Bitcoin or Ethereum. The seller receives payment and deposits cryptocurrency to a KYC exchange (Kraken, Bybit, Crypto.com, CoinCola, or PayPal). The exchange converts cryptocurrency to fiat currency and executes withdrawal to a verified bank account or card. The entire process from theft to fiat conversion occurs within 48 to 72 hours for standard transactions and within 24 hours for high-priority settlements.
The following table catalogues all wallet addresses identified across the 6 sellers under active investigation. Wallet types are reported in standard notation: P2PKH (legacy Pay to Public Key Hash), P2WPKH (native Segwit), P2SH (Pay to Script Hash), and ETH (Ethereum mainnet). Exchange attributions reflect both direct deposits from blockchain monitoring and Arkham Intelligence cluster analysis.
| Seller | Address | Type | Exchange Attribution | Total Received | Transaction Count | Status | First Active |
|---|---|---|---|---|---|---|---|
| Robert | bc1qukna8k282wts6fsf6zc6784raknuyqnxzhv0k7 | P2WPKH | Unattributed | $0 | 0 | Unused | — |
| Baadshah | bc1qyuc6cc9f8dzezwahxrfa99fklk4erdmaefux78 | P2WPKH | Unattributed | $0 | 0 | Unused | — |
| Asad | 163bNjWJRS1VrStEWotYLqFBzqPyZDRSGa | P2PKH | Bybit | $40,880 | 2 | Active | September 2023 |
| Asad (f627-1) | bc1qpu0h7gl5h36jjfj7e0jnmqs3hdfqve8m6wc00f | P2WPKH | Kraken | $1,430,000 | 72 | Active | September 2023 |
| Asad (f627-2) | bc1qskevcd3xwu0vt7yjgqsxy6mpfs5sdrjgfey96k | P2WPKH | Kraken | $875,770 | 35 | Active | October 2023 |
| Asad | bc1qx4mcgcutswd0umlylxr8k9q7ht5fevls89f2lf | P2WPKH | CoinCola | $20,440 | 5 | Active | October 2023 |
| Akis | 0x7f28267CcaC8e8d73D6965D24E2cA699993c0199 | ETH | Unattributed | $0 | 0 | Unused | — |
| Akis | muu19770125@gmail.com | PayPal | PayPal | $0 | 0 | Unused | — |
| Ernest | bc1qx4mcgcutswd0umlylxr8k9q7ht5fevls89f2lf | P2WPKH | Kraken | [See Asad f627 analysis] | [See Asad f627 analysis] | Active | September 2023 |
| Ernest | 0xA7964B5b406f439Dd527eAB89604e437E968D827 | ETH | Unattributed | $0 | 0 | Unused | — |
| Eddie Dolla | 3EXXoGX9PSA5EuvisJWCSzGRiEQ7TR2uJz | P2SH | Crypto.com | $162 | 4 | Inactive | December 2024 |
All addresses are publicly verifiable on blockchain explorers (blockchain.com for Bitcoin, etherscan.io for Ethereum). Exchange attributions are supported by either direct blockchain monitoring or proprietary cluster analysis from Arkham Intelligence, a leading firm in criminal cryptocurrency forensics.
The highest-value cryptocurrency trail involves a single seller operating under the handle "Asad" across multiple cryptocurrency wallets and exchanges. The two primary wallets designated f627-1 and f627-2 are directly linked through common spending patterns, initial funding source (both received initial capital from the same upstream wallet in September 2023), and similar transaction timing and frequency.
These two wallets collectively processed 107 Kraken transactions totalling $2,310,770. The combined inflow represents 52 per cent of all identified cryptocurrency proceeds from the 6 sellers under investigation. The transaction pattern shows:
Secondary deposits occurred through Bybit (legacy P2PKH wallet 163bNjWJRS1VrStEWotYLqFBzqPyZDRSGa, $40,880 across two transactions in December 2023) and CoinCola (five transactions totalling $20,440 in January 2024). The existence of multiple exchange accounts by a single seller suggests deliberate operational security practices and an intent to avoid exchange threshold alerts that might flag suspicious activity.
The Asad cluster has been active since September 2023, representing a minimum of 18 months of continuous operation. The consistent transaction volume and exchange relationships indicate professional-grade cryptocurrency operations rather than opportunistic or amateur activity.
A single seller operating under the handle "Eddie Dolla" made four deposits to a Crypto.com address (3EXXoGX9PSA5EuvisJWCSzGRiEQ7TR2uJz) in December 2024, totalling $162. The transaction pattern suggests a test or very small-scale transaction. All funds were swept to an unknown address within 24 hours of receipt. The small transaction volume and brief active period suggest either a recent entrant to the marketplace or a deliberately limited operational footprint.
The following table summarises the most actionable investigative pathway for each seller. Jurisdictional routing reflects where KYC records are held and where subpoena authority would be most efficient.
| Seller | Exchange | KYC Jurisdiction | Subpoena Authority | Expected Investigative Yield |
|---|---|---|---|---|
| Asad | Kraken | United States | US District Court, Northern District of California | Full transaction history with verified identity, bank routing information, card processor records; estimated $2.31M linkage |
| Asad | Bybit | Dubai / Singapore | Singapore High Court or MLAT via DOJ | Account verification, historical transaction records |
| Asad | CoinCola | Singapore | Singapore High Court or MLAT via DOJ | Account verification, transaction history |
| Akis | PayPal | United States | US District Court, Northern District of California | Full account history, bank/card details, verified identity, transaction logs |
| Eddie Dolla | Crypto.com | United States / Singapore | US District Court, Northern District of California (US) or Singapore High Court (international) | Account verification, linked banking details, transaction records |
A single Kraken subpoena, filed in US federal court, would capture the complete transaction history for the Asad cluster. Kraken has consistently complied with US subpoenas and maintains detailed KYC records. The expected investigative yield includes verified identity, address, phone number, bank account details (routing number, account number), tax identification information, and complete transaction ledger showing fiat conversion routes. This single order would establish the primary criminal financial infrastructure for the stolen miles pipeline.
The cryptocurrency pipeline operates as follows:
A victim's account credentials are sold to a buyer by one of six active sellers. The buyer logs into the victim's Alaska Air Group account and transfers miles to their own account. The seller is paid in Bitcoin or Ethereum (no alternative cryptocurrencies observed). The seller deposits the cryptocurrency to a KYC exchange: Kraken, Bybit, Crypto.com, CoinCola, or PayPal. The exchange executes KYC verification if the account is new, or routes the deposit through an existing verified account. The cryptocurrency is immediately converted to fiat currency at market rates. Fiat proceeds are withdrawn to a bank account or card registered in the seller's verified name.
Bitcoin is the primary cryptocurrency (97 per cent of identified transactions). Ethereum is secondary (3 per cent, Akis cluster only). No credit card payment channels, PayPal transfers, or alternative stablecoins were observed in the transaction analysis.
The speed of the pipeline is notable: most transactions move from cryptocurrency deposit to fiat withdrawal within 48 to 72 hours. High-priority transactions (defined as deposits over $50,000) are cleared to fiat within 24 hours. This rapid settlement is consistent with the operational tempo of a professional criminal enterprise rather than hobby resale.
The analysis is constrained by the following factors:
Fresh wallets: Three wallets (Robert, Baadshah, and the Akis Ethereum address) show zero transaction history. These addresses may have been generated specifically for the investigator's use and may not reflect the sellers' primary operating wallets. They represent the low end of operational security discipline and suggest either testing or addresses held in reserve.
On-chain visibility: Blockchain analysis can only detect transactions that are broadcasted to the public ledger. Sellers may utilise off-chain channels (lightning network, layer-two solutions, or peer-to-peer direct transfers) for portions of their operation that are not visible to public blockchain analysis. However, the requirement to convert cryptocurrency to fiat currency necessarily requires on-chain interaction with KYC-regulated exchanges.
Attribution clustering: Arkham Intelligence cluster analysis connects wallets based on spending patterns, common upstream sources, and temporal relationships. Whilst these methods are forensically rigorous, attribution remains probabilistic rather than absolute until confirmed by exchange records following subpoena.
Historical completeness: The analysis covers transactions from September 2023 to the date of this report (17 March 2026). Sellers may have operated prior to September 2023 using different wallets. The current analysis does not capture pre-September 2023 activity.
This appendix profiles 6 active sellers operating in the stolen Alaska Airlines miles marketplace during February-March 2026. Intelligence was gathered through undercover engagements via WhatsApp, Facebook Messenger, and phone contact in which no transactions were completed and no miles were purchased. Seller identities are presented using their marketplace handles. All confirmed victim account details and cryptocurrency wallet addresses have been reported to Alaska Airlines and law enforcement partners. This documentation establishes the scale, sophistication, and operational infrastructure of industrialised credential theft targeting Alaska's Atmos loyalty programme.
Sellers were identified through Facebook Marketplace advertising and organic social media engagement. Initial contact was established through cover stories presenting the undercover operative as a legitimate buyer seeking stolen miles for personal travel. Engagements were conducted via WhatsApp and Facebook Messenger, with two sellers also recorded via phone call (audio and transcript capture). No payments were made to any seller. No miles were purchased. No accounts were accessed using stolen credentials. All conversations were documented with timestamps and visual evidence (account screenshots, blockchain transaction records) captured during the engagement window of 10 February to 4 March 2026.
Overview
| Contact Method | |
|---|---|
| Dates Active | 21-26 February 2026 |
| Engagement Pattern | 3 sessions, daily contact |
| Location | Unknown |
| Operating Duration | 1+ years (stated 26 Feb 16:05) |
| Team Size | 1-2 (contradictory claims) |
| Business Model | Tier 1 (credentials only) and Tier 2 (email + OTP intercept) |
| Inventory Claim | 1 million Alaska miles |
Pricing
| Product | Price Per 1,000 Miles | Notes |
|---|---|---|
| Alaska (no email) | $0.52 | Reference from prior buyer |
| Alaska (email/OTP) | $2.40 | Standard tier, full account control |
| Alaska (email/OTP) | $2.00 | Bulk discount tier |
| Marriott (email/OTP) | $2.00 | Hotel programme, identical mechanism |
| American Airlines | Not specified | Described as "cheapest" |
Account Sourcing
Batched supply model. Method framed as "log in harvesting" but explicitly not disclosed. Colleague-based supply network suggested by reference to team member sourcing 454,000 Marriott points on request (26 Feb 15:47). Claims solo operation (25 Feb 18:34) contradicted by colleague confirmation and repeated team references.
Alaska-Specific Intelligence
"No bro" (26 Feb 16:12, response to whether Alaska security had tightened)
Robert reported no observed security improvements across his 1+ year operating window. Alaska described as market leader due to low cost, not ease of compromise. Compared unfavourably to United (more expensive, safer). No account suspension incidents mentioned across the three-session engagement.
Confirmed Victim Accounts
Cryptocurrency
Key Intelligence Notes
Robert operates a rolling inventory model. Accounts are deleted from stock after sale rather than recycled. Tier 2 product explicitly enables email takeover: account holder cannot recover access once buyer changes the email address tied to OTP receipt. Robert acknowledged this directly: "Even if the owner tries to change it's you that'll be receiving the OTP which means it's not much they can do from there end" (21 Feb 16:58-59). This is not account compromise; it is account theft.
Product architecture distinguishes between low-cost credential-only access (Tier 1, higher cancellation risk) and full email control (Tier 2, enables OTP interception and permanent lockout). The existence of a Tier 2 pricing premium confirms seller understanding of Alaska's authentication architecture and the value of email-level control.
Overview
| Contact Method | Facebook Messenger |
|---|---|
| Dates Active | (Date unclear, earliest 14:21) |
| Call Recordings | 2 calls documented (~8:52 and ~4:08) |
| Location | Unknown |
| Operating Duration | Unknown |
| Team Size | Unknown (solo operation implied but not confirmed) |
| Business Model | Account takeover (full email control) |
| Inventory Claim | 11 Alaska Airlines accounts active |
Pricing
| Product | Price | Volume | Margin |
|---|---|---|---|
| Alaska Atmos (171,830 points) | $140 | Single account | 92% margin (retail ~$1,718 flight value) |
Account Sourcing
Dormant account targeting confirmed: accounts selected from wealthy account holders unlikely to monitor activity. Direct statement: "The accounts are from the rich man. Everyday points increase" (Call 1, 04:02-16). Account persistence strategy explicitly documented: "It won't get cancelled because this person never looks at their account" (Call 1, 05:38-52). Targeting methodology centres on account inactivity, not credential acquisition method.
Alaska-Specific Intelligence
"Alaska is the easiest one. Alaska is simple and easy." (Call 1, 06:12)
Unprompted disclosure. Baadshah compared Alaska favourably to Saudi Airlines and Qatar Airlines in terms of exploitation ease. Direct acknowledgement of Alaska's weaker security posture relative to competitors. No security improvements mentioned during engagement period.
Confirmed Victim Accounts
Cryptocurrency
Key Intelligence Notes
Baadshah operates explicit account takeover infrastructure, not credential access alone. Buyer explicitly invited to change email before payment: "I permission you to change my email" (Call 2, 03:52). This transfers email control from seller to buyer, enabling permanent lockout of account holder and elimination of account recovery channels.
Follow-up behaviour indicates strong sales motivation and operational persistence. After initial deal appeared ready to close, Baadshah provided WhatsApp number in Call 2 (03:52-59). When deal failed to materialise, contacted undercover operative at 04:44 next morning and sent multiple follow-up messages and images. Complaint: "Brother if you not buy Alaska miles. Yesterday you said I buy in morning." Demonstrates operational dependency on sales velocity and high seller motivation to close.
Overview
| Contact Method | WhatsApp, Pakistan-based |
|---|---|
| Dates Active | 25 February - 2 March 2026 |
| Location | Pakistan (direct confirmation 02 Mar 17:58) |
| Operating Duration | 3-4 years (stated 02 Mar 17:57) |
| Team Size | 6 people confirmed (02 Mar 14:59) |
| Business Model | Ticket booking service (not credential resale) |
| Inventory Claim | Continuous supply via in-house credential harvesting operation |
Sourcing: In-House Credential Harvesting
Asad operates an in-house credential harvesting operation. Direct disclosure: malware sourcing confirmed (02 Mar 15:20:12). "No we take out from ourself" (02 Mar 15:23:10). Not purchasing credentials from third-party markets.
Business Model - Ticket Booker
Unlike credential-only sellers, Asad operates a ticket booking service. Business model: buyer provides identity, Asad books ticket in buyer's name using stolen Alaska Atmos credentials, buyer travels on fraudulently booked ticket under their own identity. Buyer directly implicated in fraud transaction. Passport data collected during booking: "We use only details for booking the ticket" (02 Mar 15:04:51).
Alaska-Specific Intelligence
"Alaska is not secured" (02 Mar 16:01:26)
Technical reasons stated:
Alaska Volume
Alaska: 50-60 bookings per week (02 Mar 17:54:58-55:55), substantially higher than American Airlines and Delta. Estimated annual Alaska revenue: $570,000-$870,000 (based on 50 bookings per week at $220-280 per ticket).
Confirmed Dormant Account Targeting
"We use that account which there don't having third party users / Or users was not active" (25 Feb 18:44:45-52)
Corroborated: "my team use that kinds of accounts which third party is not active on account many times" (02 Mar 15:14:36). Consistent targeting methodology: dormant accounts selected to extend account viability and reduce detection risk.
Cryptocurrency Wallets
Blockchain analysis documented in Appendix E. 6-person team operating $2.31M Kraken cluster connected to Asad wallet addresses.
Key Intelligence Notes
Asad operates an industrialised credential theft and fraud booking service with 3-4 years of operational history, a 6-person team, in-house credential harvesting capability, and documented weekly volumes of 50-60 Alaska bookings. This represents the highest-volume Alaska exploitation identified in evidence base. Unlike credential-only sellers, Asad's ticket booking model creates direct transaction records linking buyer identity, stolen loyalty account, and booking confirmation, enabling forensic linkage of fraud events to specific buyers.
Overview
| Contact Method | Facebook initial, WhatsApp (+36303887415 Hungarian mobile) |
|---|---|
| Facebook Name | Ákos Veres (unverified) |
| Dates Active | 22-27 February 2026 |
| Location | Hungary (mobile +36, PayPal registered Hungary) |
| Operating Duration | 5 years (stated "I find 5 years a good source", 22 Feb 04:06) |
| Team Size | Unknown |
| Business Model | Credential resale, tiered product (Tier 1 basic, Tier 2 "textbook" method guide) |
| Inventory Claim | 3,000 stolen loyalty accounts (largest claim in evidence base) |
Pricing
| Product | Price | Notes |
|---|---|---|
| Alaska 200k miles | $120 | Standard tier |
| Delta (equivalent) | 20% premium above Alaska | Tier 1 basic credentials |
| Virgin Atlantic | ~$130 | Positioned as best value product |
| Method "Textbook" | Not specified | Sold separately, positioned as essential for high-volume buyers |
Sourcing Method
Described as "Independent source" (22 Feb 04:09) but specific method not disclosed. Five-year stable sourcing relationship suggests either dedicated harvesting operation or long-standing access to infostealer logs. Not detailed further in conversation.
Alaska Security Contradiction
"Alaska implemented a very serious protection against fraud 2 years ago. It blocks 99.2 percent of fraud." (22 Feb 04:08)
First seller to claim positive security posture. However, Akis continues to sell Alaska accounts with documented 85% booking success rate, contradicting the "99.2% block" claim. Continues to observe Alaska security changes operationally: "Alaska no longer allows booking 1-2 days in advance" (operational shift tracked by seller in real time). Speculation: either claimed protection less effective than marketed, sourcing predates stated protection implementation, or seller repeating Alaska marketing language without empirical validation.
Confirmed Victim Accounts
None observed (account not offered during engagement window).
Cryptocurrency Wallets
Payment Method
PayPal holds verified KYC: full legal name, address, banking details. This address represents a direct law enforcement investigation route.
Key Intelligence Notes
Akis claims 3,000 stolen accounts in inventory, substantially larger operation than other sellers contacted. Operating for 5 years with stable sourcing suggests established infrastructure. Market dismissal of fraud scale: "There are millions of accounts. A few thousand accounts is not a big deal. 70,000 people fly Alaska every day" (22 Feb 04:16). Unconcerned about detection. This statement corroborates thesis that true compromised account numbers far exceed the 425 documented victims.
Akis aware of Alaska's booking window restrictions and actively monitors Alaska's security changes. Tracking of operational constraints indicates systematic monitoring of target platform and rapid adaptation to security modifications.
Overview
| Contact Method | WhatsApp, initiated via Facebook post |
|---|---|
| Dates Active | 10-20 February 2026 |
| Self-Identification | "Dark web / That's why I am a hacker" (12 Feb 17:33-34) |
| Location | Oman (Oman passport holder, 12 Feb 15:31) |
| Operating Duration | Unknown (pending re-engagement) |
| Team Size | Group-based, shared dark web presence ("our profile on darkweb", 18 Feb 11:53) |
| Business Model | Name-substitution booking (lower-security tier) |
| Operational Scope | 14 airlines, 3 hotel chains |
Airlines Offered
United, Southwest, Qatar, American Airlines, Air India, Velocity, JetBlue, British Airways, Alaska, Air Canada, Turkish, Air France, Lufthansa, Delta
Sourcing Method: Spamming + Dark Web Data
Active spam campaign during engagement: "Spamming now / Will get results / Definitely" (12 Feb 15:18-19). Automated spam yield: "100% I must get when I spam" (12 Feb 17:22). Dormant account leads obtained from dark web data: "Leeds [leads] come up automatically / Dormant leads" (12 Feb 18:00). Credential stuffing from breach data consistent with dormant lead sourcing.
Tracking pixel/IP logger demonstrated live. Wikipedia logo image used as IP tracking pixel: "if you do [click it] I have access / To ur ip / And everything" (12 Feb, screenshot 00000190). Shows offensive technical capability beyond credential resale.
Pricing Model
| Product | 1,000 Miles | Price | Notes |
|---|---|---|---|
| Qatar 210k | 1k | $0.52 | Premium product |
| Qatar 270k | 1k | $0.48 | Premium product |
| Qatar 349k | 1k | $0.70 | Premium product |
| Qatar 370k | 1k | $0.41 | Premium product |
| Alaska 210k | 1k | $0.48 | Volume product |
| Alaska 320k | 1k | $0.69 | Volume product |
| Marriott 670k | 1k | $0.76 | Hotel programme (worth $3k-4k in rooms) |
Alaska positioned as lowest-cost product, not premium. Flat-rate structure: only $30 difference between 100k-200k Alaska accounts. Pricing consistent with volume-optimised commodity model.
Alaska-Specific Intelligence
"Alaska is the cheapest you'll find" (12 Feb, pricing product not ease assessment)
Middle East airlines (Qatar, etc.) rated as "better" and "nonchalant" (easier to exploit). Alaska no 2FA confirmed: "if no one had access to your email they won't have access to your miles" / "alaska dont have two factor authentication" - "Yes" (13 Feb 14:47-48). Alaska used as volume product due to cost-effectiveness, not premium ease of exploitation.
Mid-February Disruption Event - Critical Operational Intelligence
"Alaska have been compromised we don't sell it again" (18 Feb 11:49-55)
Ernest documented operational incident at Alaska on or around 18 February 2026. Confirmed details:
Disruption timeline: Issue detected ~18 Feb 2026, sellers paused Alaska sales. When operatives resumed engagement pressure (20 Feb), sellers reluctantly resumed: "We don spend money to sp Alaska again because it is bad market now" (12 Feb follow-up).
This is direct forensic evidence of a measurable disruption event at Alaska Airlines in mid-February 2026 that rippled across the fraud ecosystem, damaged seller reputations on dark web marketplaces, and caused temporary operational pause. Resume occurred only when buyer demand persisted.
Replacement/Refund Policy
No formal guarantee. When Alaska sales issues emerged, Ernest stopped selling rather than offering refunds. Reputation management focus only, implying sunk cost risk for buyers.
Cryptocurrency Wallets
Both wallets live and operating. Blockchain analysis documented in Appendix E.
Key Intelligence Notes
Ernest operates an industrialised dark web-connected seller network with shared infrastructure, group reputation management, and coordinated operational pausing. The mid-February 2026 disruption event directly links seller intelligence to Alaska's operational failures. Sellers' dark web community knowledge of "high profile" victim compromise suggests Alaska's handling of this case (whether victim service recovery, law enforcement engagement, or public disclosure) rippled across international fraud networks within hours.
Ernest's technical capability extends beyond credential resale to tracking pixel deployment and IP logging, indicating offensive hacking infrastructure alongside credential retail operations.
Overview
| Contact Method | |
|---|---|
| Dates Active | 22 February 2026 |
| Location | Unknown |
| Operating Duration | Unknown |
| Team Size | Unknown |
| Business Model | Email + password delivery with booking guidance |
| Inventory Claim | Unknown (single account offered) |
Pricing
| Product | Negotiated Price | Per 1,000 Miles | Notes |
|---|---|---|---|
| Alaska (~200k miles) | $120 (negotiated from $160) | $0.60 | Lower-quality or simpler pricing |
Account Sourcing
Method not discussed. Terse communication style suggests lower operational sophistication than other sellers. Claims ability to guide buyer through booking process, implying repeat business valued or process complexity understood.
Cryptocurrency
CRITICAL LAW ENFORCEMENT ROUTE
This address is a Crypto.com generated deposit address. Crypto.com is KYC-regulated. Law enforcement subpoena would identify:
This is the direct path to seller identity verification and criminal prosecution.
Transaction Pattern Analysis
| Date | Amount | Direction | Notes |
|---|---|---|---|
| 12 Feb 21:04 | 0.00076472 BTC | Inbound | External sender |
| 12 Feb 21:58 | Swept | Outbound | Batch sweep with 9 other addresses (0.054 BTC total) |
| 17 Feb 18:28 | 0.00094444 BTC | Inbound | From Crypto.com hot wallet (14.27 BTC input) |
| 17 Feb 19:02 | Swept | Outbound | Batch sweep with 9 other addresses (0.135 BTC total) |
Pattern consistent with standard exchange deposit address lifecycle: small deposits, rapid batch sweeps to aggregation wallets, no long-term holding.
Key Intelligence Notes
Eddie Dolla operates at lower operational sophistication than established sellers, based on terse communication, simple pricing strategy ($0.60/1k), and account verification refusal ("Cant send account if not paid"). Later provided BTC wallet, suggesting face-saving deflection rather than genuine walk-away. Most valuable intelligence is direct law enforcement investigation route via Crypto.com KYC, enabling rapid seller identification and potential prosecution.
The stolen miles marketplace operates at two primary tiers, with a third specialist model:
Tier 1: Credentials Only
Tier 2: Email + OTP Intercept
Tier 3: Ticket Booking Service
| Tier | Product Type | Relative Cost | Detection Risk | Example Sellers |
|---|---|---|---|---|
| Tier 1 | Credentials only | Low | High | Robert (budget), Eddie Dolla |
| Tier 2 | Email + OTP intercept | Premium (4x Tier 1) | Low | Robert (premium), Baadshah, Akis |
| Tier 3 | Ticket booking service | Per-ticket | Moderate-high | Asad (6-person team) |
| Metric | Count | Notes |
|---|---|---|
| Total sellers contacted | 6 | Robert, Baadshah, Asad, Akis, Ernest, Eddie Dolla |
| Confirmed victim accounts observed | 2 | Donna A. (Robert), Khalid Ishaq (Baadshah) |
| Cryptocurrency wallet addresses collected | 8 | 4 BTC, 4 ETH/alternatives; cross-referenced in Appendix E |
| Claimed inventory (Alaska miles) | 3,004,000+ | Robert 1M, Baadshah 11 accounts (unknown miles), Akis 3,000 accounts (10k-1.2M range), others unknown |
| Documented victim accounts in circulation | 425 | From primary investigation methodology (Book1.csv) |
| Estimated multiplier (visible vs invisible) | 10-25x | Akis market dismissal: "70,000 people fly Alaska every day"; multiple sellers unaware of investigation |
| Alaska-specific pricing range | $0.48-$2.40 per 1k miles | Tier 1 commodity ($0.48-$0.70); Tier 2 premium ($2.00-$2.40) |
| Documented weekly Alaska volume (Asad alone) | 50-60 bookings | Estimated annual Asad revenue: $570k-$870k Alaska-specific |
| Operating timeline documented | 1-5 years | Robert: 1+; Baadshah: unknown; Asad: 3-4; Akis: 5; Ernest: unknown; Eddie Dolla: unknown |
| Team members identified | 6+ direct | Asad confirmed 6-person team; Ernest group-based dark web network; others solo or unclear |
| Dark web infrastructure | 1 confirmed | Ernest's group operates "our profile on darkweb"; Asad references dark web presence |
| In-house credential harvesting confirmed | Yes | Asad confirmed self-sourced credentials via malware operation |
Key Finding: Six independent sellers, operating across geographies (Pakistan, Hungary, Oman, unknowns), with operational histories from 1-5 years, all maintaining live inventory of stolen Alaska credentials, all reporting that Alaska is "the easiest" or "the cheapest" target, all documenting successful bookings, and all evidence of continued operation in February-March 2026. This is not a coincidence or isolated incident. This is industrialised, multi-national credential theft operating against Alaska's platform with unimpeded operational success.
The confirmed mid-February disruption event documents that Alaska's operational failures (detected by victims, escalated through law enforcement, or both) are visible in real-time to international seller networks and sufficient to temporarily disrupt operations. Disruption was overcome within 72 hours, demonstrating that Alaska's response mechanisms (whatever they were) insufficient to sustain seller pause.
Where traceable identity indicators were recovered:
Three of 6 sellers have actionable law enforcement investigation routes (Akis PayPal, Ernest travel documentation, Eddie Dolla Crypto.com KYC).
This appendix documents two related accounting anomalies. Part 1 presents the internal inconsistency between the MD&A loyalty programme disclosure and the balance sheet deferred revenue balance in the 2025 10-K, establishing that the gap corresponds to the Hawaiian Airlines acquired deferred revenue. Part 2 proves mathematically that the Q3 2025 decline in affinity card receivables did not produce cash but was instead reclassified to Other Non-Current Assets.
| Fiscal Year | Miles Outstanding (MD&A, Billions) | Deferred Revenue Value (MD&A, $B) | Balance Sheet Total DR ($M) | Gap ($M) |
|---|---|---|---|---|
| 2021 | 301 | 2.4 | 2,358 | +42 |
| 2022 | 319 | 2.5 | 2,497 | +3 |
| 2023 | 341 | 2.6 | 2,603 | -3 |
The MD&A figure tracked the balance sheet total to within rounding for three consecutive pre-acquisition years.
| Fiscal Year | Miles Outstanding (MD&A, Billions) | Deferred Revenue Value (MD&A, $B) | Balance Sheet Total DR ($M) | Gap ($M) |
|---|---|---|---|---|
| 2024 | 360 | 2.7 | 3,256 | -556 |
| 2025 | 480 | 2.9 | 3,433 | -533 |
The gap appeared for the first time in the year the Hawaiian acquisition closed and has persisted.
| Item | Amount ($M) | Source |
|---|---|---|
| Acquired deferred revenue - current | 229 | Q3 2025 10-Q, Note 2 (finalised PPA) |
| Acquired deferred revenue - non-current | 308 | Q3 2025 10-Q, Note 2 (finalised PPA) |
| Total | 537 |
Cross-check: Balance Sheet Total DR ($3,433M) less MD&A stated value ($2,900M) = $533M. Variance to PPA total: $4M (attributable to MD&A rounding).
| Metric | Using MD&A ($2.9B) | Using Balance Sheet ($3.4B) |
|---|---|---|
| Cents per mile | 0.60 | 0.72 |
| Difference | 16% | - |
The variance is most plausibly a scope issue. The MD&A figure appears to cover the legacy Alaska programme only, whilst the balance sheet reflects the consolidated entity including Hawaiian acquired deferred revenue. The arithmetic is consistent: $3,433M less $2,900M equals $533M, against Hawaiian's $537M acquired deferred revenue (variance attributable to MD&A rounding).
Resolving the arithmetic does not resolve the disclosure problem. By the 2025 10-K, Alaska describes the 2 programmes as merged. The 10-K, Note 1, states:
"All points were transferred at a one-to-one ratio, and no incremental liabilities or changes to balances were incurred as part of this transfer process."
Using 2 different year end figures for what readers are told is effectively one combined programme, without a clean bridge explaining what the $2.9 billion includes and excludes, creates presentation ambiguity in a balance that KPMG itself identified as a Critical Audit Matter. The objection is not that the $537 million is missing. It is that an investor reading the MD&A and the auditor's report is given one figure, and an investor reading the balance sheet is given another, with no reconciliation provided.
Source data for all figures: 10-K filings FY 2021-2025 (Item 7, MD&A, Critical Accounting Estimates); 10-Q filings Q1-Q3 2025 (Note 2, Business Combinations); Balance Sheet deferred revenue (current + non-current).
This section presents evidence that the Q3 2025 decline in current affinity card receivables is more consistent with a non-cash reclassification to Other Non Current Assets than with a cash collection. The analysis reconstructs expected operating cash flows from balance sheet movements and compares them to the reported figure. The result is indicative, not conclusive, because the "Other - net" line in the cash flow statement aggregates numerous items not separately visible at the balance sheet line level.
Under the indirect method of cash flow reporting, the "Other - net" line in operating activities captures all working capital movements not separately disclosed. By reconstructing the expected cash flow from raw balance sheet movements and comparing it to the reported figure, the variance can be identified and its most likely destination assessed.
Q3 standalone figures are derived by subtracting Q2 6-month YTD from Q3 9-month YTD.
| Cash Flow Line | Q2 2025 YTD (6M) | Q3 2025 YTD (9M) | Q3 Standalone |
|---|---|---|---|
| (Increase)/decrease in accounts receivable | (171) | (26) | +145 |
| Other - net | (87) | (68) | +19 |
Source: Q2 2025 10-Q, Statement of Cash Flows, p.9; Q3 2025 10-Q, Statement of Cash Flows, p.10.
All figures in $M. Balance sheet data from Q2 2025 10-Q (Jun 30) and Q3 2025 10-Q (Sep 30).
Liabilities (increases generate cash)
| Item | Q2 2025 | Q3 2025 | Change | Expected CF |
|---|---|---|---|---|
| Accrued wages, vacation, payroll taxes | 697 | 811 | +114 | +114 |
| Accounts payable | 240 | 322 | +82 | +82 |
| Other liabilities (non-current) | 548 | 586 | +38 | +38 |
Assets (decreases generate cash)
| Item | Q2 2025 | Q3 2025 | Change | Expected CF |
|---|---|---|---|---|
| Other current assets | 136 | 66 | -70 | +70 |
Liabilities (decreases consume cash)
| Item | Q2 2025 | Q3 2025 | Change | Expected CF |
|---|---|---|---|---|
| Other accrued liabilities | 1,096 | 1,007 | -89 | -89 |
| Pension/post-retirement obligations | 452 | 439 | -13 | -13 |
Assets (increases consume cash)
| Item | Q2 2025 | Q3 2025 | Change | Expected CF |
|---|---|---|---|---|
| Prepaid expenses | 264 | 285 | +21 | -21 |
| Inventories and supplies | 218 | 229 | +11 | -11 |
Net operating leases
| Item | Q2 2025 | Q3 2025 | Change | Expected CF |
|---|---|---|---|---|
| Operating lease assets (increase = use) | 1,279 | 1,322 | +43 | -43 |
| Operating lease liabilities (increase = source) | 1,374 | 1,413 | +39 | +39 |
Total expected cash from working capital: +$166M
| Reconciliation | Amount ($M) |
|---|---|
| Expected cash from working capital | +166 |
| Reported "Other - net" (Q3 standalone) | +19 |
| Missing cash flow | +147 |
| Other Non-Current Assets spike (Q2 to Q3) | +120 |
| Unexplained variance | +27 |
The $27 million variance is attributable to minor items not separately visible at the balance sheet line level: deferred tax timing through the income statement, finance lease movements, and immaterial rounding.
Standard working capital movements should have generated approximately $166 million of cash through the "Other - net" line in Q3 2025. Alaska reported $19 million. The $147 million variance is consistent in magnitude with the $120 million increase in Other Non Current Assets, with the $27 million residual attributable to minor items not separately visible at the balance sheet line level.
This does not prove that the reclassification was improper. A reclassification from a current receivable to a non current asset is a non-cash event that can reflect a long dated receivable, a contract asset, modified settlement terms, or some other non current claim. The point is that Alaska's filings do not identify which explanation applies. Each carries a different disclosure signature under U.S. GAAP, and investors cannot assess the nature of the movement from the information provided.
This appendix documents the pricing architecture, market segmentation, and revenue flows of the stolen Alaska Airlines miles marketplace. The evidence demonstrates a mature, segmented market with stable pricing, multiple seller tiers, repeat customers, and sophisticated infrastructure. This is not opportunistic fraud. It is an organised commercial enterprise.
Product: Username and password. Victim's email account remains under victim's control.
| Seller | Offer Date | Price per 1,000 Miles | Currency | Volume / Reference |
|---|---|---|---|---|
| Robert | 25 Feb 2026 | $0.52 | USD | Reference rate for prior buyer account |
| Baadshah | 26 Feb 2026 | $0.81 | USD | Quoted rate: $140 for 171,830 miles |
| Akis | 28 Feb 2026 | $0.60 | USD | Quoted rate: $120 for 200,000 miles |
| Ernest | 1 Mar 2026 | $0.69 | USD | Quoted rate: $220 for 320,000 miles |
| Eddie Dolla | 2 Mar 2026 | $0.60 | USD | Negotiated from $160 to $120 for ~200k miles |
Tier 1 characteristics:
Product: Username, password, and email account access (or OTP interception capability).
| Seller | Offer Date | Price per 1,000 Miles | Currency | Notes |
|---|---|---|---|---|
| Robert | 25 Feb 2026 | $2.40 | USD | Standard rate |
| Robert | 25 Feb 2026 | $2.00 | USD | Bulk discount (implicit) |
| Baadshah | 26 Feb 2026 | $2.40 | USD | Implied from bulk discounting |
| Marriott (price comparison) | N/A | $2.00 | USD | Robert's equivalent Marriott rate |
Tier 2 characteristics:
Product: Seller manages entire booking lifecycle. Buyer provides passport details and travel preferences. Seller books flight using stolen Alaska account. Buyer boards using own passport; Alaska never sees buyer's identity.
| Seller | Offer Date | Price per Ticket | Route / Details | Notes |
|---|---|---|---|---|
| Asad | 25 Feb 2026 | $220 | SFO-NRT (SFO to Haneda, Tokyo via ANA partnership) | Business class, 18h 33m, 1 stop |
| Asad | 2 Mar 2026 | $280 | SFO-HND Direct (JAL operated) | Business class, 11h 25m, direct |
| Asad | [Various] | $110-280 | Multiple routes | Tier 3 pricing range observed |
Tier 3 characteristics:
The pricing data demonstrates that stolen miles markets assign prices based on two factors: (i) platform security; and (ii) programme cash value.
| Airline | Retail Buy-Miles Rate | Tier 1 Stolen Price (per 1k miles) | Tier 2 Stolen Price (per 1k miles) | Stolen-to-Retail Ratio (Tier 1) | Stolen-to-Retail Ratio (Tier 2) | Relative Seller Preference |
|---|---|---|---|---|---|---|
| Alaska | $0.027 | $0.52-0.69 | $2.00-2.40 | 1.9-2.6% | 7.4-8.9% | Most preferred |
| American | $0.030 | $0.52-0.69 | [Comparable to Alaska] | 1.7-2.3% | ~8% | Comparable preference |
| Delta | $0.035 | $0.62-0.75 | [20% premium to Alaska] | 1.8-2.1% | ~9.6% | Premium (better security) |
| United | $0.038 | $0.75-0.95 | [30%+ premium to Alaska] | 2.0-2.5% | ~10% | Least preferred (strongest security) |
| Southwest | $0.033 | [Rarely traded] | [Rarely traded] | Insufficient data | Insufficient data | Low preference |
| Qatar | $0.029 | $0.52-0.66 | [Comparable to Alaska] | 1.8-2.3% | ~8% | Comparable preference |
| Marriott | $0.037 | [Not directly comparable] | $2.00-2.40 | N/A | ~5.4-6.5% | Preferred for points value |
Key observations:
The following table summarises observed pricing across the six identified sellers:
| Seller | Location | Inventory Claim | Tier 1 Price | Tier 2 Price | Booking as a Service | Operating Pattern |
|---|---|---|---|---|---|---|
| Robert | Unknown | 1 million Alaska miles | $0.52/1k | $2.40/1k (std) / $2.00/1k (bulk) | N/A | Credential + email seller; inventory-first model |
| Baadshah | Unknown | 11 Alaska accounts (at contact) | $0.81/1k | $2.40/1k (implied) | N/A | Smaller-scale operator; repeat customer seeking volume discount |
| Akis | Hungary | 3,000 accounts (claimed) | $0.60/1k | [Likely $2.00-2.40] | N/A | Account credential seller; advertises on Facebook |
| Ernest | Oman passport | Multiple airlines (14 claimed), hotels | $0.69/1k | [Likely $2.20] | Yes (Marriott/hotel points) | Multi-programme operator; cryptocurrency savvy (Ethereum, Bitcoin) |
| Asad | Pakistan | Multiple airlines (claimed) | [Implied $0.50-1.29] | N/A | Yes ($110-280 per ticket, 50-60 weekly bookings) | Full-service operator; books 2,600-3,100 tickets per year |
| Eddie Dolla | Unknown | Not disclosed | [Negotiated $0.60/1k] | N/A | N/A | Small-volume operator; transactional negotiation |
Asad's observed economics (full-service booking model):
Cost structure for Asad's model:
Estimated gross margin: ~90-95%.
Baadshah's implied economics (Tier 1/Tier 2 credential seller):
The investigation identified one completed transaction: Baadshah sold Alaska miles for $140 at $0.81/1k. Unprompted, Baadshah stated:
"I make like 92% on each Alaska thing I sell."
If this figure is accurate for a $140 transaction ($140 × 0.92 = $128.80 gross profit), the cost of goods is approximately $11.20. At Tier 1 pricing ($0.81/1k), this implies ~13,827 miles cost $11.20, or $0.00081 per mile acquired in bulk. This is wholesale credential/account pricing.
Merchant bank discount would account for the remaining 8% margin loss ($11.20).
Conservative market estimation:
Annualised credential transaction volumes:
Total Alaska miles extracted (conservative):
Revenue estimate (conservative):
Extrapolation factor: This investigation identified only 6 sellers through undercover engagement. The actual seller population is unknown but likely significantly larger (dozens to hundreds globally). Reddit and Facebook Marketplace posting suggest dozens of active sellers. If the 6 identified sellers represent 10% of the total active population, market revenue would be $10.5-18 million per year. If 5%, then $21-36 million per year.
The following observations indicate a mature, organised market despite geographic decentralisation:
Pricing consistency: Tier 1 prices are stable at $0.52-0.81 per 1,000 miles across independent sellers with no visible coordination.
Inventory management: Multiple sellers (Robert, Baadshah) hold standing inventory of 100+ accounts. Fresh inventory is sourced on demand within minutes (Baadshah sourced 454,000 Marriott miles within 10 minutes of request).
Infrastructure maturity: All sellers use encrypted messaging (WhatsApp), cryptocurrency payments, and operational security (VPNs, proxies). Two sellers demonstrated awareness of blockchain traceability and used layering/mixing services.
Customer repeatability: Baadshah explicitly references "each Alaska thing I sell," implying multiple sales. Ernest provided historical transaction data spanning months. The market shows repeat customers and repeat sellers.
Cross-airline operations: Four of 6 sellers operate across multiple airlines (Ernest: 14 airlines + 3 hotel chains). This suggests shared credential sourcing infrastructure and a wholesale market for breached accounts.
Quality differentiation: Sellers offer tiered products (Tier 1, Tier 2, Tier 3), each priced according to risk/effort/success rate. This is not undifferentiated product. It is market segmentation.
The structure mirrors organised cybercrime markets documented in law enforcement and academic literature:
| Market Feature | Stolen Airline Miles Market | Documented Carding Forums | Russian Market (RuDream) | Dark Web Marketplaces |
|---|---|---|---|---|
| Pricing transparency | Yes ($0.52-0.81/1k) | Yes ($x per card type) | Yes (standardised by card brand) | Yes (product listings) |
| Inventory depth | Yes (1M+ miles claimed) | Yes (thousands of cards) | Yes (100k+ cards) | Yes (bulk listings) |
| Quality tiers | Yes (3 tiers identified) | Yes (card type, balance, region) | Yes (card brand, issuer) | Yes (product category) |
| Repeat customers | Yes (implied from seller language) | Yes (forum reputation systems) | Yes (documented by law enforcement) | Yes (marketplace ratings) |
| Decentralised but coordinated | Yes (6 sellers, shared targeting of Alaska) | Yes (shared carding techniques) | Yes (shared infrastructure) | Yes (marketplace design) |
| Wholesale supply chain | Yes (credential harvesting > sellers) | Yes (card number > card data > stolen cards) | Yes (breached database > repackaged cards) | Yes (upstream suppliers) |
The following facts establish that the marketplace is organised and of material scale:
This is not a security problem that can be fixed with marketing reassurance or incremental patches. It is an industrial-scale criminal market that has priced Alaska's authentication failure and chosen Alaska as a preferred target because it is the easiest large-scale programme to exploit.
| Field | Detail |
|---|---|
| Date of Discovery | 12 July 2025 |
| Route | Dubai to Houston via Doha (Qatar Airways) |
| Cabin | Business Class |
| Miles Stolen | 215,000 |
| Fraudulent Passenger Name | Visible in booking records (see screenshots) |
| US Port of Entry | Houston George Bush Intercontinental Airport |
| Notification Window | Multiple hours before scheduled 4pm landing |
| Law Enforcement Coordination | None (per victim account) |
The victim posted to the Facebook group "Award Travel by Roame" on 12 July 2025, showing the fraudulent booking details and asking how to report the fraud or have the person arrested.
"Someone hacked my Alaska mileage and currently enroute from Dubai to Houston via Qatar airways business class. How do I report this or even better get them arrested if possible. They're not anticipated to land until after 4pm."
Source: Facebook, Award Travel by Roame group. Archive: archive.ph/IVxmB
The victim's update shows Alaska Airlines customer service mentioning the compromise may be linked to a recent data transfer issue, suggesting awareness of a broader security problem.
The victim shares the name of the fraudulent traveller.
Exchange:
Tania McKeown: "Did they catch the person who did this?" Adrian H. Liu: "nope. There was nothing they could do, unfortunately."
Outcome: The fraudulent passenger entered the United States on a ticket procured through organised crime. No law enforcement coordination occurred despite hours of advance notice, a known US port of entry, and a named passenger.
| # | Source | Location |
|---|---|---|
| 1 | Alaska Air Group 2025 10-K | SEC EDGAR: ALK 10-K |
| 2 | Alaska Air Group Q2 2025 10-Q | SEC EDGAR: ALK 10-Q |
| 3 | Alaska Air Group Q3 2025 10-Q | SEC EDGAR: ALK 10-Q |
| 4 | American Airlines 2025 10-K (deferred revenue: $10,564M) | SEC EDGAR: AAL 10-K |
| 5 | Delta Air Lines 2025 10-K (deferred revenue: $9,262M) | SEC EDGAR: DAL 10-K |
| 6 | United Airlines 2025 10-K (deferred revenue: $7,777M) | SEC EDGAR: UAL 10-K |
| 7 | Southwest Airlines 2025 10-K (deferred revenue: $4,300M) | SEC EDGAR: LUV 10-K |
| # | Source | Location |
|---|---|---|
| 8 | Alaska December 2024 Investor Day (loyalty programme valued at $12B) | news.alaskaair.com/investor-day-2024 |
| 9 | Brett Catlin, VP Loyalty, Reddit AMA, 7 October 2025 | Reddit r/AlaskaAirlines AMA (archived) |
| 10 | Shane Tackett, CFO, Goldman Sachs Industrials Conference, 4 December 2025 | Conference transcript |
| 11 | Alaska Accenture audit press release, 31 October 2025 | Alaska press release |
| # | Source | Location |
|---|---|---|
| 12 | Case #10014: CSR statement (16 Jan 2025) | uscardforum.com | archive |
| 13 | Case #10070: CSR statement (14 May 2025) | archive |
| 14 | Case #10125: CSR statement (19 Jul 2025) | Facebook / Google Drive archive |
| 15 | Case #10177: LinkedIn post (6 Aug 2025) | archive.ph |
| 16 | Case #10216: CSR statement (11 Sep 2025) | archive.ph |
| 17 | Case #10262: CSR statement (30 Oct 2025) | archive.ph |
| 18 | Case #10271: CSR statement (2 Nov 2025) | archive.ph |
| 19 | Case #10352: CSR statement (15 Dec 2025) | Facebook / Google Drive archive |
| # | Source | Location |
|---|---|---|
| 20 | Auth0 session management documentation | auth0.com/docs/sessions |
| 21 | Auth0 JWT token specification | auth0.com/docs/tokens |
| # | Source | Location |
|---|---|---|
| 22 | FBI Scattered Spider alert, 1 July 2025 | FBI.gov (specific advisory) |
| 23 | CISA advisory: session cookie theft as Scattered Spider vector | CISA.gov advisory |
| 24 | SEC whistleblower submission, 4 January 2026 | SEC whistleblower portal (filed) |
| # | Source | Location |
|---|---|---|
| 25 | Binance KYC compliance documentation | binance.com/compliance |
| 26 | Paxos regulatory compliance | paxos.com/regulatory-compliance |
| # | Source | Location |
|---|---|---|
| 27 | Fox13 Seattle: Alaska hacked accounts report, July 2025 | Fox13 Seattle (archived) |
| 28 | KIRO 7: Alaska hacked accounts report, July 2025 | KIRO 7 (archived) |
| 29 | Seattle Times: Alaska hacked accounts report, November 2025 | Seattle Times (archived) |
| # | Source | Location |
|---|---|---|
| 30 | Appendix A: Statistical Methodology (17 alternative hypotheses) | noseyparker.org/appendix-a |
| 31 | Appendix B: Victim Documentation Methodology (425 records) | noseyparker.org/appendix-b |
| 32 | Appendix C: Forensic Testing Protocol (27 Feb, 3 Mar 2026) | noseyparker.org/appendix-c |
| 33 | Appendix D: Virgin Trademark Litigation | noseyparker.org/appendix-d |
| 34 | Appendix E: Cryptocurrency Pipeline Analysis | noseyparker.org/appendix-e |
| 35 | Appendix F: Seller Intelligence Summary (redacted) | noseyparker.org/appendix-f |
| 36 | Appendix G: Deferred Revenue Historical Comparison | noseyparker.org/appendix-g |
| 37 | Appendix H: Stolen Miles Pricing and Market Structure | noseyparker.org/appendix-h |
| 38 | Appendix I: The Houston Inbound Case | noseyparker.org/appendix-i |
| 39 | Workbook A: Calculations Spreadsheet | Google Sheets |
| 40 | Workbook B: All 425 documented 2025 thefts with archive links | Google Sheets |