Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

22nd September – Threat Intelligence Report

0
Medium
Vulnerability
Published: Mon Sep 22 2025 (09/22/2025, 08:31:42 UTC)
Source: Check Point Research

Description

For the latest discoveries in cyber research for the week of 22nd September, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Several major European airports including Heathrow, Berlin, Brussels, Dublin, and Cork have experienced a cyber-attack, resulting in disruptions to electronic check-in and baggage drop systems using Collins Aerospace’s MUSE software. The incident […] The post 22nd September – Threat Intelligence Report appeared first on Check Point Research .

AI-Powered Analysis

AILast updated: 10/07/2025, 01:31:45 UTC

Technical Analysis

The reported threat involves coordinated cyber-attacks targeting several major European airports—Heathrow (UK), Berlin (Germany), Brussels (Belgium), Dublin and Cork (Ireland)—specifically exploiting vulnerabilities or weaknesses in Collins Aerospace’s MUSE software, which is used for electronic check-in and baggage drop systems. The attacks caused significant operational disruptions including flight delays, cancellations, and diversions. MUSE software is integral to airport passenger processing workflows, and its compromise can paralyze airport operations. Although no specific technical exploit details or CVEs are provided, the incident demonstrates attackers’ ability to disrupt critical aviation infrastructure. The attacks likely leveraged software vulnerabilities or configuration weaknesses to interrupt service availability. The incident underscores the risk of supply chain and third-party software dependencies in aviation security. The threat actor(s) remain unidentified, and no known exploits are reported in the wild, but the impact on multiple airports indicates a coordinated campaign. The report also references other unrelated breaches and vulnerabilities but the airport MUSE software attack is the primary European infrastructure concern. The disruption of airport systems affects confidentiality, integrity, and especially availability of critical services. Given the critical nature of airport operations, the threat represents a high-impact risk to European transportation security and passenger safety.

Potential Impact

The impact on European organizations, particularly airports, is substantial. Disruption of electronic check-in and baggage drop systems leads to operational chaos, passenger inconvenience, and financial losses due to delays and cancellations. It undermines trust in airport security and operational resilience. The affected airports are major international hubs, so the disruption has cascading effects on global air traffic and supply chains. Beyond operational impact, the attacks expose vulnerabilities in aviation software supply chains, potentially inviting further exploitation or espionage. The incident could also trigger regulatory scrutiny and increased compliance costs for aviation stakeholders. Passenger data privacy risks may arise if attackers accessed personal information, though this is not explicitly stated. The broader European aviation sector may face increased threat actor focus due to demonstrated vulnerabilities. The incident highlights the need for enhanced cybersecurity posture in critical infrastructure sectors, with potential reputational damage to affected airports and software vendors. Overall, the threat compromises availability and integrity of essential airport systems, posing a high risk to European transportation infrastructure.

Mitigation Recommendations

1. Immediate patching and software updates: Collins Aerospace and airport IT teams must prioritize identifying and remediating vulnerabilities in MUSE software, including applying any available patches or configuration hardening. 2. Network segmentation: Isolate critical airport operational systems from general corporate networks and external internet access to limit lateral movement and exposure. 3. Enhanced monitoring and anomaly detection: Deploy advanced threat detection tools focused on aviation-specific protocols and MUSE system behaviors to identify suspicious activity early. 4. Incident response preparedness: Airports should update and rehearse incident response plans tailored to cyber disruptions of passenger processing systems. 5. Supply chain security assessments: Conduct thorough security reviews of third-party software providers like Collins Aerospace to ensure secure development and deployment practices. 6. Multi-factor authentication and access controls: Strengthen authentication mechanisms for administrative access to MUSE and related systems to prevent unauthorized access. 7. Backup and recovery: Maintain offline, tested backups of critical system configurations and data to enable rapid restoration in case of compromise. 8. Collaboration and information sharing: European airports and aviation authorities should share threat intelligence and coordinate defenses against emerging threats targeting aviation infrastructure. 9. Employee training: Conduct cybersecurity awareness programs for airport staff focusing on social engineering and phishing risks that could facilitate attacks. 10. Engage cybersecurity experts specializing in aviation to perform penetration testing and vulnerability assessments on MUSE and connected systems.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://research.checkpoint.com/2025/22nd-september-threat-intelligence-report/","fetched":true,"fetchedAt":"2025-10-07T01:30:34.451Z","wordCount":992}

Threat ID: 68e46d3b6a45552f36e94e49

Added to database: 10/7/2025, 1:30:35 AM

Last enriched: 10/7/2025, 1:31:45 AM

Last updated: 10/7/2025, 10:12:50 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats