Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Airport Chaos Enters Third Day After Supply Chain Attack
News

Airport Chaos Enters Third Day After Supply Chain Attack

Team-CWDBy Team-CWDSeptember 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A suspected cyber-attack targeting a third-party software supplier has caused major flight cancellations and delays at several European airports over the weekend.

London’s Heathrow Airport and terminals in Brussels, Berlin and Dublin are among those that continue to be impacted by the incident.

US aerospace and defense giant RTX told the BBC that its Muse software was targeted by threat actors. The software helps airlines to digitally check in passengers, validate boarding passes and tag baggage – enabling them to share desks and gates rather than requiring their own.

As such, the outage forced some airlines at certain European airports to check in and board passengers by pen and paper.

Read more on aviation security: Scattered Spider Actively Targeting Airlines, FBI Warns.

“Work continues to resolve and recover from an outage of a Collins Aerospace airline system that impacted check-in. We apologize to those who have faced delays, but by working together with airlines, the vast majority of flights have continued to operate,” read a notice on the Heathrow Airport website on Monday morning.

“We encourage passengers to check the status of their flight before travelling to Heathrow and to arrive no earlier than three hours for long-haul flights and two hours for short-haul.”

Brussels Airport posted a similar message on its website, but referred to the incident as a “cyber-attack” rather than an outage. It urged passengers to only come to the airport if their flight is confirmed, and to check-in online before they arrive.

Aviation Under Attack

Javvad Malik, lead security awareness advocate at KnowBe4, argued that building cyber resilience requires a focus on people, process and communications as much as security controls.

“Air travel depends on shared systems, so a failure in a common check‑in platform quickly cascades into missed connections, accessibility shortfalls, and staff forced into manual workarounds,” he added. 

“It’s why it is important to build in graceful failure by assuming the primary system will go down and rehearsing manual operations, offline boarding, and accessible contingencies, with cross‑trained staff and basic tools ready.”

Charlotte Wilson, the head of enterprise business at Check Point, explained that attacks on aviation targets are increasing in frequency and intensity.

“These attacks often strike through the supply chain, exploiting third-party platforms that are used by multiple airlines and airports at once,” she said.

“To build resilience, aviation companies must take a layered approach: rigorously patching and updating software to close vulnerabilities, continuously monitoring for unusual activity that could indicate an intrusion, and implementing clear, well-tested backup systems that ensure airports and airlines can keep operating even if critical digital tools are knocked offline.”

Improved information-sharing between governments, airlines and technology providers is also vital to accelerate incident response across borders, Wilson argued.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit
Next Article Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms
Team-CWD
  • Website

Related Posts

News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.