ARINC SelfServ devices are down in airports worldwide, they do self service check in. They’re connected to navAviNet aka ARINC Ground Network, managed by Collins Aerospace, who are owned by RTX.
An attacker got onto to the shared network.
ARINC SelfServ devices are down in airports worldwide, they do self service check in. They’re connected to navAviNet aka ARINC Ground Network, managed by Collins Aerospace, who are owned by RTX.
An attacker got onto to the shared network.
RTX is Raytheon btw, a large cybersecurity provider. Looking into it.. but so far, looks like e-crime.
@GossiTheDog Seeing any crossover to the ATC issues in Texas yesterday?
The systems impacted are in ARINC Multi-User System Environment (MUSE™) aka Rockwell Collins’ ARINC vMUSE™. This is like the corporate centipede of acquisitions!
Shodan dork if you wanna rubberneck:
org:"ARINC INCORPORATED"
6x AnyConnect VPN boxes offline
BBC good reporting on the ground impact
In theory it should be minimal but in practice airlines have automated many jobs so we’ll see.
@GossiTheDog
How is any of that connected to the standard internet... why!?! 😭
@GossiTheDog RTX is big military so it's alarming they don't have good enough security in the current environment. It's not like the list of people who would like to fuck them over is exactly short
The media are reporting this is impacting 3 airports, but it's actually more - the 3 airports are main transport hubs so building up backlogs (eg Heathrow is at 50% delayed flights now) but there's others, they're just smaller.
The most surprising element so far is ARINC didn't tell Heathrow it was cyber related for almost 15 hours.
@GossiTheDog the airports affects are just the three though? Any idea how that overlaps with where RTX are? As a company they give the impression of being a lot less isolated than that....
@GossiTheDog sorry, to be clear, the 3 airports "directly" affected. I'm assuming RTX/Collins have infrastructure at more than those three airports, so I'm wondering why only Heathrow, Berlin, and Brussels are being listed. Are reports just being copy and pasted, or is the issue ( if not the impact ) limited to those three locations?
@GossiTheDog from what I've read ( which is about two news articles ) Dublin is a separate issue. Although if whatever this is has caused the evacuation there then this has just got a lot more "interesting" ...
If any journalists want a list of top impacted airports to check: https://infosec.exchange/@nieldk/115237394885804514
BBC have Dublin and Cork added.
@GossiTheDog @viraptor what was the attack vector for access?
ARINC collect passenger biometric data on vMUSE, which is the system which has been impacted (the user identity database in particular, hence why airline staff can't log in either).
Here’s where it began this time yesterday, before the whole thing tumbled off a cliff.
@GossiTheDog how's Netweaver doing?
@GossiTheDog Brussels Airport is affected too and planning to cancel half of all flights tomorrow (news article in Dutch: https://vrtnws.be/p.kQjqZ5WEW).
honey i've opened the door to 1998
ARINC hope to have vMUSE back online shortly, they’re restoring their Windows environment from backup. Somebody got Domain Admin and totalled it.
@GossiTheDog even the browser knows
ARNIC are flying engineers out to airports to try to fix terminals.
Brussels airport, EBBR, have issued this NOTAM: “AD LTD DUE TO AN IT SYSTEM DISRUPTION. AIRLINES ARE TO CANCEL 50
PERCENT OF THEIR DEPARTING PASSENGER FLIGHTS IN THIS TIMEFRAME”
The ARNIC incident continues https://www.bbc.co.uk/news/articles/cwy88857llno
Also for anybody interested, ARNIC is where the cyber incident is.
ARNIC were basically the OG airport network provider, from 1929. ARNIC were sold to Carlyle Group (private equity) in 2007, who sold them to Rockwell Collins in 2013, who sold to United Technologies in 2018, who merged to form Collins Aerospace. Their network looks a mess of US corporate shenanigans… webmail doesn’t even require https yet 😅
Worth noting that airplanes are incredibly safe and resilient after extensive regulation and open and transparent investigations of every air incident…
when you land on the ground, however, air travel is caught in the cybersecurity bullshit every other industry is caught up in.
@GossiTheDog We can all safely agree that the US is the enemy of the world right now, and for the foreseeable future.
The incident continues https://www.bbc.co.uk/news/articles/cqjeej85452o
The ARINC incident is likely to continue through the week. They haven’t yet got the threat out of the network.
EU says ransomware. https://www.reuters.com/business/aerospace-defense/eu-agency-says-third-party-ransomware-behind-airport-disruptions-2025-09-22/
After AFINC restored domain controllers from backup, the threat actor got back in and started trashing more stuff. 🫡
The whole thing is a mess, they probably want to pause, take a breathe, and think about flushing out attacker before rebuilding things.
@GossiTheDog Airports are running on Windows 95 systems, so even my cat could hack them. He's quite smart. 😼 🖥
Frankly, I just don't understand how millions of people can just put their trust and lives in the hands of something that has less computing power than a smartwatch. 🤷
@GossiTheDog I guess you’re lucky if you’re sharing a flight with the engineers, because they won’t cancel those ones
@GossiTheDog Feeling the effects of the ransomware attack today at the Berlin airport. Agents shuffling papers with no computer access, handwritten boarding passes. It's super painful.
@GossiTheDog I'm just focusing on the positive: if webmail is unencrypted it's slightly less likely that AD CS is present and running with full support for all the ECSes. Hopefully?
The airport thing is still rumbling on, terminals haven’t been restored by ARINC, it’s just disappeared from headlines as the media got bored.
Berlin are doing pen and paper 📝 old skool still works
Berlin Airport ran at 70% delays yesterday
I’ve confirmed today that Heathrow, Berlin and Dublin all still have no Muse terminals restored. I haven’t checked other airports. It’s even more complicated because Muse both processes and stores biometrics of passengers.
"Before we reconnect our system, we must be 100% sure that there are no malware programmes left," the BER spokesman said.
@GossiTheDog wait... you aren't british?
@GossiTheDog This media isn't bored but there's just not enough for updated reports. Last I heard was that ENISA claimed ransomware, ShinyHunters got strangely quiet on the record when questioned by @PogoWasRight so maybe there's something interesting there. For me there's just not enough substance right now to report anything.
@GossiTheDog London City Airport is fine this morning
The Muse systems at impacted airports will likely be down the rest of the week. Airlines are being advised to continue contingency measures.
Heathrow is at 80% flight delays, Brussels 79%, Dublin 74%, Berlin 84% - all are vMuse. London City isn't on vMuse, they're at 33% as a point of comparison.
The Europe airlines ransomware situation is a variant of Hardbit ransomware, which doesn’t have a portal and is incredibly basic.
They’ve had to restart recovery again as the devices keep getting reinfected. I’ve never seen an incident like it. Somebody like the NCSC needs to go in and help them with IR.
@GossiTheDog are they UK based?
Look at Dublin airport, reporters starting to realise it never actually got fixed 😅
https://www.thejournal.ie/dublin-airport-issues-timeline-fix-6824817-Sep2025/
Delays at airports continue today. ARINC/Collins have unable to tell impacted airports when services will resume. https://www.vienna.at/after-cyberattack-continued-disruptions-at-berlin-airport/9691694
Flight delays today:
Heathrow 78%
Brussels 79%
Dublin 68%
Berlin 86%
All are vMuse. London City isn't on vMuse, they're at 35% as a point of comparison.
Heathrow PR statement: "Collins Aerospace has confirmed an IT issue with the systems that it supplies to a number of airlines across Europe. We are supporting affected airlines with their contingencies and have deployed additional colleagues in terminals to assist passengers."
@GossiTheDog Not sure if my Bluesky commet worked. Was it Harbit or Blackbit? Given the reporting of LokiLocker (Blackbit variant) in the comments here: https://www.borncity.com/blog/2025/09/23/nachlese-sicherheitsvorfall-bei-collins-aerospace-der-flughaefen-lahm-legte/
40 year old man arrested in connection to airport cybersecurity incident https://www.bbc.co.uk/news/articles/c62ldxyj431o
This is complete bollocks.
@GossiTheDog I'm surprised that they bailed him, given that the penalties for cybering Collins Aerospace hard enough to disrupt major airports across a fair bit of western Europe seem like they would be enough to make you a flight risk.
Though, under those specific circumstances, I suppose everyone is less of a flight risk than usual.
@GossiTheDog do you think it’s linked to the NATO contract they were awarded on the 16th?
NPR and PBS have somehow managed to run a completely bollocks article linking the EU airport thing to AI - the article itself written by an AI cybersecurity vendor. https://www.wgcu.org/science-tech/2025-09-23/detection-expert-says-hackers-likely-used-ai-to-penetrate-airport-system
@GossiTheDog I don't think this is the correct reason they're wrong. The fact that the AV detection is/should be easy maybe indicates the use of AI, maybe the content it produced is based on old techniques. We know AI is not THAT advanced to produce brand new AV evasion techniques that easily.
Still, jumping to such a conclusion is bollocks indeed, I agree
@GossiTheDog definitely smells like bs. But how would one know what the real payload was? Has there been a statement?
@GossiTheDog There are indications of a possible second actor, with some chatter around LokiLocker being involved, although attribution remains unclear.
RTX, the owner of Collins aka ARINC, finally filed an 8K with the SEC for a ransomware incident. https://www.sec.gov/Archives/edgar/data/101829/000010182925000036/rtx-20250919.htm?7194ef805fa2d04b0f7e8c9521f97343
If your board is concerned about the EU ransomware thing - there is no need to be concerned. It is not a wider issue.
It wouldn't surprise me if the person arrested turns out to be an employee trying to do incident response or some such (I'm not saying they're guilty, at all).
It's an extremely unusual incident and essentially involves lax cybersecurity and confused response.
ARINC/Collins have been unable to restore the systems in Brussels airport so they are ripping out and replacing everything.
HT @0xThiebaut
Flight delays today:
Heathrow 90%
Brussels 89%
Dublin 84%
Berlin 86%
All are vMuse. London City isn't on vMuse, they're at 33% as a point of comparison.
In terms of recovery:
- Heathrow going nowhere, manual workarounds to issue bag tags and boarding passes, airlines have been told to maintain continency measures until w/c October 6th
- Brussels Airport are manual workarounds to issue bag tags and boarding passes, and are ripping out all their vMuse terminals and Muse IT infrastructure and replacing them
- Dublin making progress to starting restoration
- Berlin manual workarounds to issue bag tags and boarding passes
A bit more on Berlin: https://www.heise.de/en/news/Cyberattack-on-airports-Problems-continue-at-BER-and-one-arrest-10669689.html
And yes, the 40 year old arrested yesterday lives in West Sussex - which is where Collins Aerospace has its avionics staff based.
Aer Lingus have got their check in terminals working again at Dublin Airport
Flight delays today:
Heathrow 95%
Brussels 94%
Dublin 76%
Berlin 80%
All are vMuse. London City isn't on vMuse, they're at 33% as a point of comparison.
If you're traveling via Heathrow, Brussels, Dublin or Berlin airport this weekend - flights are running fine but average 90% delays still.
Check in online (rather than at the airport). If you need to baggage drop add about ~30 mins to your usual schedule.
Expectation is this will last for about another week or two due to the ongoing issues at ARINC/Collins/RTX.
@GossiTheDog Had no issues flying in to Brussels but did have a slight delay. Let’s see how the travel back will be. And of course I will be in Berlin next week.
Brussels Airport has today begun rolling out replacement terminals and servers for it's ARINC/Collins/RTX ransomware compromised infrastructure. https://www.traveldailynews.com/aviation/brussels-airport-accelerates-new-check-in-and-boarding-system-after-cyberattack/
Berlin Airport says it is still in the middle of the "crisis", with 20 Collins staff on site trying to restore systems.
https://www.yahoo.com/news/articles/berlins-airport-still-suffering-delays-114722643.html
Flight delays today:
Heathrow 81%
Brussels 81%
Dublin 73%
Berlin 77%
I'm probably going to stop tracking this one for now, basically the impacted airports are mostly okay to travel through, check in online basically.
Airports did a really good at being resilient, by falling back to paper and/or using online check in.
Collins, less so.
One hopefully final thought for now - interesting security setup to take and store biometrics. I'm be sure to rotate my face and fingerprints.
The Europe airport cyber incident is still rolling on.
Okay, there’s an incredible update to the RTX/Collins/ARINC airport ransomware situation
Everest are claiming the incident, saying they exfiltrated a very large amount of data, including passenger data.
They’re really salty and claim it wasn’t ransomware.. what they aren’t aware of (this isn’t in the story) is an in parallel, somebody also tried to deploy ransomware.
Overall the problem is: shite security.
Another update on the RTX/Collins/ARINC story https://www.linkedin.com/posts/alon-gal-utb_looks-like-everest-group-targeted-collins-activity-7387117440020844545-5l0X
Alon Gal has confirmed that, yes, the FTP credentials Everest used for their (separate) incident were in a historic infostealer.
I’ve confirmed with one of the airlines they weren’t told about this, and it impacts their passenger data so this will probably get spicy.
ARINC’s network border looks like it was transported from three decades ago, they gotta invest in it.
Dublin Airport have confirmed the RTX/Collins/ARINC incident included passenger data for their airport. HT @metacurity
It actually includes lots more airports.
If you read these reports and think ‘bruh there’s no way ARINC were running Windows terminals with no antimalware in airports taking passenger fingerprints and uploading them over the internet with plain text FTP’, I’ve got a GIF for you
@GossiTheDog I can totally imagine someone doing that at a technical level; but how did they get away with that setup in european airports?
Is there some esoteric reading of the text where fingerprints aren't a data privacy issue; or are we doing don't ask/don't tell compliance now?
a) nobody is buying that for $1m
b) at least set to view counter to 1337
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.