22nd September – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 22nd September, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Several major European airports including Heathrow, Berlin, Brussels, Dublin, and Cork have experienced a cyber-attack, resulting in disruptions to electronic check-in and baggage drop systems using Collins Aerospace’s MUSE software. The incident […] The post 22nd September – Threat Intelligence Report appeared first on Check Point Research .
AI Analysis
Technical Summary
The reported threat involves coordinated cyber-attacks against several major European airports—Heathrow (UK), Berlin (Germany), Brussels (Belgium), Dublin and Cork (Ireland)—which utilize Collins Aerospace’s MUSE software for electronic check-in and baggage drop systems. The attacks caused significant operational disruptions including flight delays, cancellations, and diversions by incapacitating critical airport systems responsible for passenger processing and baggage handling. The MUSE software, integral to airport operations, appears to have been targeted to degrade availability rather than to exfiltrate data. Although no specific technical vulnerability details or exploits are disclosed, the incident underscores potential weaknesses in the software’s security posture or its deployment environment. The attacks demonstrate the risk posed by supply chain and critical infrastructure software compromise in the aviation sector. The threat intelligence bulletin also references other global cyber incidents involving data breaches of luxury brands, ransomware attacks on venture capital firms, and malware campaigns targeting hospitality and cloud infrastructure, illustrating a broad spectrum of cyber threats. However, the airport attacks remain the most impactful for European organizations due to their direct effect on critical infrastructure and public services. The lack of known exploits in the wild and the medium severity rating suggest the attacks may have involved targeted intrusion methods or exploitation of operational weaknesses rather than widespread automated exploitation. The involvement of Collins Aerospace’s MUSE software highlights the importance of securing third-party aviation software and ensuring robust incident response capabilities in airport environments.
Potential Impact
For European organizations, particularly those in the aviation sector, this threat poses significant operational risks. Disruption of electronic check-in and baggage drop systems can lead to cascading effects including flight delays, cancellations, passenger dissatisfaction, and financial losses for airlines and airports. The impact extends to reputational damage and potential regulatory scrutiny, especially under EU regulations like GDPR if personal data is involved in future incidents. The attack on critical airport infrastructure also raises concerns about national security and public safety, as airports are vital nodes in transportation networks. The incident may prompt increased scrutiny of aviation software supply chains and accelerate investments in cybersecurity resilience. Other European organizations, such as luxury brands and financial firms, face risks from data breaches and ransomware attacks highlighted in the report, emphasizing the need for comprehensive threat detection and response strategies. The medium severity rating reflects the current impact focused on availability disruption rather than data confidentiality or integrity compromise, but the potential for escalation or follow-on attacks remains. European airports and associated service providers must consider this threat a serious wake-up call to enhance cybersecurity defenses around critical operational technology and third-party software dependencies.
Mitigation Recommendations
1. Immediate collaboration with Collins Aerospace to obtain security patches, updates, or mitigation guidance for the MUSE software. 2. Conduct thorough integrity and security assessments of the MUSE software installations and related infrastructure to identify and remediate vulnerabilities or misconfigurations. 3. Implement strict network segmentation to isolate critical airport operational systems from general IT networks and external access. 4. Enhance real-time monitoring and anomaly detection capabilities focused on aviation systems to quickly identify suspicious activities or disruptions. 5. Develop and regularly test incident response plans tailored to aviation operational technology environments, including contingency procedures for manual passenger processing. 6. Enforce multi-factor authentication and least privilege access controls for all administrative interfaces of critical systems. 7. Conduct cybersecurity awareness training for airport staff to recognize and report potential cyber incidents promptly. 8. Engage with national cybersecurity agencies and aviation authorities to share threat intelligence and coordinate defensive measures. 9. Review and strengthen supply chain security policies to ensure third-party software providers adhere to stringent security standards. 10. Consider deploying endpoint protection solutions capable of detecting advanced threats targeting operational technology components.
Affected Countries
United Kingdom, Germany, Belgium, Ireland
22nd September – Threat Intelligence Report
Description
For the latest discoveries in cyber research for the week of 22nd September, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Several major European airports including Heathrow, Berlin, Brussels, Dublin, and Cork have experienced a cyber-attack, resulting in disruptions to electronic check-in and baggage drop systems using Collins Aerospace’s MUSE software. The incident […] The post 22nd September – Threat Intelligence Report appeared first on Check Point Research .
AI-Powered Analysis
Technical Analysis
The reported threat involves coordinated cyber-attacks against several major European airports—Heathrow (UK), Berlin (Germany), Brussels (Belgium), Dublin and Cork (Ireland)—which utilize Collins Aerospace’s MUSE software for electronic check-in and baggage drop systems. The attacks caused significant operational disruptions including flight delays, cancellations, and diversions by incapacitating critical airport systems responsible for passenger processing and baggage handling. The MUSE software, integral to airport operations, appears to have been targeted to degrade availability rather than to exfiltrate data. Although no specific technical vulnerability details or exploits are disclosed, the incident underscores potential weaknesses in the software’s security posture or its deployment environment. The attacks demonstrate the risk posed by supply chain and critical infrastructure software compromise in the aviation sector. The threat intelligence bulletin also references other global cyber incidents involving data breaches of luxury brands, ransomware attacks on venture capital firms, and malware campaigns targeting hospitality and cloud infrastructure, illustrating a broad spectrum of cyber threats. However, the airport attacks remain the most impactful for European organizations due to their direct effect on critical infrastructure and public services. The lack of known exploits in the wild and the medium severity rating suggest the attacks may have involved targeted intrusion methods or exploitation of operational weaknesses rather than widespread automated exploitation. The involvement of Collins Aerospace’s MUSE software highlights the importance of securing third-party aviation software and ensuring robust incident response capabilities in airport environments.
Potential Impact
For European organizations, particularly those in the aviation sector, this threat poses significant operational risks. Disruption of electronic check-in and baggage drop systems can lead to cascading effects including flight delays, cancellations, passenger dissatisfaction, and financial losses for airlines and airports. The impact extends to reputational damage and potential regulatory scrutiny, especially under EU regulations like GDPR if personal data is involved in future incidents. The attack on critical airport infrastructure also raises concerns about national security and public safety, as airports are vital nodes in transportation networks. The incident may prompt increased scrutiny of aviation software supply chains and accelerate investments in cybersecurity resilience. Other European organizations, such as luxury brands and financial firms, face risks from data breaches and ransomware attacks highlighted in the report, emphasizing the need for comprehensive threat detection and response strategies. The medium severity rating reflects the current impact focused on availability disruption rather than data confidentiality or integrity compromise, but the potential for escalation or follow-on attacks remains. European airports and associated service providers must consider this threat a serious wake-up call to enhance cybersecurity defenses around critical operational technology and third-party software dependencies.
Mitigation Recommendations
1. Immediate collaboration with Collins Aerospace to obtain security patches, updates, or mitigation guidance for the MUSE software. 2. Conduct thorough integrity and security assessments of the MUSE software installations and related infrastructure to identify and remediate vulnerabilities or misconfigurations. 3. Implement strict network segmentation to isolate critical airport operational systems from general IT networks and external access. 4. Enhance real-time monitoring and anomaly detection capabilities focused on aviation systems to quickly identify suspicious activities or disruptions. 5. Develop and regularly test incident response plans tailored to aviation operational technology environments, including contingency procedures for manual passenger processing. 6. Enforce multi-factor authentication and least privilege access controls for all administrative interfaces of critical systems. 7. Conduct cybersecurity awareness training for airport staff to recognize and report potential cyber incidents promptly. 8. Engage with national cybersecurity agencies and aviation authorities to share threat intelligence and coordinate defensive measures. 9. Review and strengthen supply chain security policies to ensure third-party software providers adhere to stringent security standards. 10. Consider deploying endpoint protection solutions capable of detecting advanced threats targeting operational technology components.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://research.checkpoint.com/2025/22nd-september-threat-intelligence-report/","fetched":true,"fetchedAt":"2025-10-07T01:30:34.451Z","wordCount":992}
Threat ID: 68e46d3b6a45552f36e94e49
Added to database: 10/7/2025, 1:30:35 AM
Last enriched: 10/15/2025, 1:38:39 AM
Last updated: 11/20/2025, 6:17:42 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-38201: Authorization Bypass Through User-Controlled Key in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2023-3108: Vulnerability in Red Hat Red Hat Enterprise Linux 6
MediumCVE-2023-34967: Access of Resource Using Incompatible Type ('Type Confusion') in Red Hat Red Hat Enterprise Linux 8
MediumCVE-2023-32255: Missing Release of Resource after Effective Lifetime
MediumCVE-2023-32253: Improper Resource Locking
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.