Collins Aerospace cyberattack

Last updated

The Collins Aerospace cyberattack is an attack on vMUSE check-in and boarding software created by Collins Aerospace. [1] [2] [3] The attack affects several European airports. [1] [2]

Contents

Airports are connected via a platform called vMUSE, which in turn uses a dedicated VPN called ARINC AviNet. ARINC was previously an independent company, but it operated as part of Collins from 2018 until the date of the incident. According to UpGuard, a cybersecurity company, the outage across airports indicates that AviNet was compromised. [4]

Attack

19 September 2025

Brussels Airport reported that their passengers were being checked-in and boarded manually. [1] Berlin Brandenburg Airport reported increased waiting times due to the attack. [1]

RTX Corporation, the parent of Collins Aerospace, said they were "aware of a cyber-related disruption" to their computers in "select airports" and they were trying to resolve the issue. [1]

20 September 2025

Heathrow Airport reported delays. [1] British Airways was able to operate with a backup system, but other airlines were affected by the attack on the Muse system. [1] The National Cyber Security Centre announced they were working with Collins Aerospace on the problem. [1]

21–22 September 2025

Dublin Airport reported a second day of disruption to the check-in and luggage handling in Terminal 2, [5] which continued for a third day. [6] The European Union Agency for Cybersecurity confirmed the attack to be ransomware. [7] [8]

23 September 2025

Dublin Airport operator daa said that there is no timeline for a fix to the problems caused by the attack and that check-in and baggage handling may take longer than usual. [9]

Dr Richard Browne, director of the National Cyber Security Centre, said "We have all of the technical details from the incident, and we know, or we believe we know, who the actual group is. Precisely where they're based is always going to be interesting and difficult to try and work out" and "The other thing to keep in mind here is that we know the malware strain used. So this is the wholesaler or the reseller of the malware, we don't know who actually conducted the incident." [9] He also said "This will be an affiliate, basically a customer of the ransomware family and they will go out and actually conduct the incident. Who this group is, we don't know yet." [9]

29 September 2025

Brussels Airport begin rolling out a replacement system, also by Collins. [10] This marks the end of a period where 10% of flights were continually cancelled.

References

  1. 1 2 3 4 5 6 7 8 Davies, Maia; Heyndyk, Rachel Muller; Tidy, Joe (2025-09-21). "Day of delays at Heathrow after cyber-attack brings disruption". BBC News . Retrieved 2025-09-22.
  2. 1 2 "Cyber attack on Collins Aerospace disrupts check-in systems at major European airports". Australian Broadcasting Corporation. 2025-09-20. Retrieved 2025-09-22.
  3. Thomson, Iain; Sharwood, Simon (2025-09-22). "Tech troubles create aviation chaos on both sides of the Atlantic". The Register . Retrieved 2025-09-24.
  4. "Grounded: The ARINC vMUSE Attack Disrupting Multiple Airports". UpGuard. 2025-09-24.
  5. "Dublin Airport T2 disruption continues as Aer Lingus 'significantly impacted'". RTÉ News. PA Media. 2025-09-21. Retrieved 2025-09-22.
  6. "Dublin Airport disruption continues into third day after cyber-attack". BBC News. 2025-09-22. Retrieved 2025-09-22.
  7. "EU cyber agency says airport software held to ransom by criminals". BBC News . 2025-09-22. Retrieved 2025-09-22.
  8. Jones, Connor (2025-09-22). "EU's cyber agency blames ransomware as Euro airport check-in chaos continues". The Register . Retrieved 2025-09-24.
  9. 1 2 3 "No timeline to resolve check-in, baggage issues at T2 after cyber attack - daa". RTÉ News. 2025-09-23. Retrieved 2025-09-23.
  10. Eddie Saunders (2025-09-25). "Brussels Airport to gradually deploy new check-in and boarding system". EVA International Media Ltd trading as ARGS.