ARINC SelfServ vMUSE devices are down in airports in EU, they do self service check in. They’re connected to navAviNet aka ARINC Ground Network, managed by Collins Aerospace, who are owned by RTX.

An attacker got onto to the shared network.

RTX is Raytheon btw, a large cybersecurity provider. Looking into it.. but so far, looks like e-crime.
The systems impacted are in ARINC Multi-User System Environment (MUSE™) aka Rockwell Collins’ ARINC vMUSE™. This is like the corporate centipede of acquisitions!

Shodan dork if you wanna rubberneck:

org:"ARINC INCORPORATED"

6x AnyConnect VPN boxes offline

BBC good reporting on the ground impact

In theory it should be minimal but in practice airlines have automated many jobs so we’ll see.

https://www.bbc.co.uk/news/articles/c3drpgv33pxo

Heathrow cyber-attack: Delays after airport check-in system hit

Travellers report multi-hour waits for some airlines as disruption also hits Brussels and Berlin.

BBC News
The media are reporting this is impacting 3 airports, but it's actually more - the 3 airports are main transport hubs so building up backlogs (eg Heathrow is at 50% delayed flights now) but there's others, they're just smaller.
The most surprising element so far is ARINC didn't tell Heathrow it was cyber related for almost 15 hours.

If any journalists want a list of top impacted airports to check: https://infosec.exchange/@nieldk/115237394885804514

BBC have Dublin and Cork added.

PhreakByte (@[email protected])

@cirriustech @[email protected] here are the “top ten” airports using vMUSE. See any you recognize in Europe as listed in current incident ;) 1. London Heathrow (LHR) 2. Glasgow Airport (GLA) 3. Berlin Schönefeld (SXF) 4. Dublin Airport (DUB) 5. Cork Airport (ORK) 6. Cologne Bonn Airport (CGN) 7. Mazatlán International Airport (Mexico) 8. Zihuatanejo International Airport (Mexico) 9. Monterrey International Airport (Mexico) 10. Velana International Airport (Maldiverne)

Infosec Exchange
ARINC collect passenger biometric data on vMUSE, which is the system which has been impacted (the user identity database in particular, hence why airline staff can't log in either).
Here’s where it began this time yesterday, before the whole thing tumbled off a cliff.
honey i've opened the door to 1998
ARINC hope to have vMUSE back online shortly, they’re restoring their Windows environment from backup. Somebody got Domain Admin and totalled it.

ARINC are flying engineers out to airports to try to fix terminals.

Brussels airport, EBBR, have issued this NOTAM: “AD LTD DUE TO AN IT SYSTEM DISRUPTION. AIRLINES ARE TO CANCEL 50
PERCENT OF THEIR DEPARTING PASSENGER FLIGHTS IN THIS TIMEFRAME”

The ARINC incident continues https://www.bbc.co.uk/news/articles/cwy88857llno

Also for anybody interested, ARINC is where the cyber incident is.

ARINC were basically the OG airport network provider, from 1929. ARNIC were sold to Carlyle Group (private equity) in 2007, who sold them to Rockwell Collins in 2013, who sold to United Technologies in 2018, who merged to form Collins Aerospace. Their network looks a mess of US corporate shenanigans… webmail doesn’t even require https yet 😅

Heathrow cyber-attack: Airports warn of second day of disruption

The issue affecting check-in and baggage systems caused hundreds of delays and cancellations on Saturday.

BBC News

Worth noting that airplanes are incredibly safe and resilient after extensive regulation and open and transparent investigations of every air incident…

when you land on the ground, however, air travel is caught in the same cybersecurity bullshit every other industry is caught up in.

EU cyber agency says airport software held to ransom by criminals

Brussels Airport asks airlines to cancel nearly half of their outgoing flights on Monday.

BBC News
The ARINC incident is likely to continue through the week. They haven’t yet got the threat out of the network.

After ARINC restored domain controllers from backup, the threat actor got back in and started trashing more stuff. 🫡

The whole thing is a mess, they probably want to pause, take a breathe, and think about flushing out attacker before rebuilding things.

EU cyber agency says airport software held to ransom by criminals

Brussels Airport asks airlines to cancel nearly half of their outgoing flights on Monday.

BBC News
The airport thing is still rumbling on, terminals haven’t been restored by ARINC, it’s just disappeared from headlines as the media got bored.

Berlin Airport ran at 70% delays yesterday

https://www.dailyfinland.fi/europe/45344/Long-delays-at-Berlin-airport-as-authority-confirms-ransomware-attack

I’ve confirmed today that Heathrow, Berlin and Dublin all still have no Muse terminals restored. I haven’t checked other airports. It’s even more complicated because Muse both processes and stores biometrics of passengers.

"Before we reconnect our system, we must be 100% sure that there are no malware programmes left," the BER spokesman said.

Long delays at Berlin airport as authority confirms ransomware attack

Disruption at airports in Berlin and other European cities persisted on Monday, with 70% of departures from the German capital

dailyfinland
Berlin are doing pen and paper 📝 old skool still works
The Muse systems at impacted airports will likely be down the rest of the week. Airlines are being advised to continue contingency measures.
Heathrow is at 80% flight delays, Brussels 79%, Dublin 74%, Berlin 84% - all are vMuse. London City isn't on vMuse, they're at 33% as a point of comparison.

The Europe airlines ransomware situation is a variant of Hardbit ransomware, which doesn’t have a portal and is incredibly basic.

They’ve had to restart recovery again as the devices keep getting reinfected. I’ve never seen an incident like it. Somebody like the NCSC needs to go in and help them with IR.

Look at Dublin airport, reporters starting to realise it never actually got fixed 😅

https://www.thejournal.ie/dublin-airport-issues-timeline-fix-6824817-Sep2025/

No timeline for fix to issues slowing operations at Dublin Airport's Terminal 2, says DAA

The need for manual workarounds means that check-in and bag drop at airline desks may take longer than usual.

TheJournal.ie
Delays at airports continue today. ARINC/Collins have been unable to tell impacted airports when services will resume. https://www.vienna.at/after-cyberattack-continued-disruptions-at-berlin-airport/9691694

Flight delays today:

Heathrow 78%
Brussels 79%
Dublin 68%
Berlin 86%

All are vMuse. London City isn't on vMuse, they're at 35% as a point of comparison.

Heathrow PR statement: "Collins Aerospace has confirmed an IT issue with the systems that it supplies to a number of airlines across Europe. We are supporting affected airlines with their contingencies and have deployed additional colleagues in terminals to assist passengers."
40 year old man arrested in connection to airport cybersecurity incident https://www.bbc.co.uk/news/articles/c62ldxyj431o
Man arrested in connection with airport cyber-attacks

The National Crime Agency (NCA) said a 40-year-old man was arrested in West Sussex.

BBC News
This is complete bollocks.

NPR and PBS have somehow managed to run a completely bollocks article linking the EU airport thing to AI - the article itself written by an AI cybersecurity vendor. https://www.wgcu.org/science-tech/2025-09-23/detection-expert-says-hackers-likely-used-ai-to-penetrate-airport-system

It's completely false. The payloads used in this one are detected by free Defender AV with a decade old static AV detections. This is not some cyber mega attack by a ransomware group: it's extremely poor security hygiene.

@GossiTheDog

"Our leased platform was the tool they used to do it! In this article we'll show you how!"

🙄

@401matthall @GossiTheDog #FirstThought: Boeing: "Never forget - our planes were instrumental in the 9/11 Twin Towers attack - and we'll show you how*!

*MCAS tutorial not included"

@GossiTheDog so you are saying the airport systems were so easy to hack that even an ai user could do it

@Forbearance @GossiTheDog

well AI already hacked the financial markets, so ....

@GossiTheDog this is an NPR and PBS local station not the main sites obvi but I emailed them
@chillybot @GossiTheDog Ya, seems to be from that one station, WGCU, not general NPR/PBS. I guess we are seeing the side-effects of stations seeking alternative funding sources...

@GossiTheDog I don't think this is the correct reason they're wrong. The fact that the AV detection is/should be easy maybe indicates the use of AI, maybe the content it produced is based on old techniques. We know AI is not THAT advanced to produce brand new AV evasion techniques that easily.

Still, jumping to such a conclusion is bollocks indeed, I agree

@vict0ni @GossiTheDog I think you are reading the op wrong. The attack vector would have been detected _if the attacked system had basic AV protections using classic algorithms_.

Nothing was evaded with fancy new attacks powered by AI, it was a silly attack that only worked because the victims had poor security.

@vict0ni @GossiTheDog Having worked in the airline industry, it doesn't surprise me in the slightest. The only reason this isn't more frequent is that the systems are so arcane that would-be attackers don't want to deal with it.
@GossiTheDog Shocked, I am—feeling faint—that you could even *suggest* so fundamental a vulnerability was exploited. There’s no honour among thieves nowadays.
@GossiTheDog I love how the article-length advertisement interviewed the by-line company's founder for "insights" about how important ai tools are to stop other ai tools. Pure, steaming bullshit.
@GossiTheDog Because going to an AI expert on cybersecurity issues is responsible journalism 🫩
@twcau @GossiTheDog The journalist did not bother interviewing anybody, apparently she just read and stole parts of this article: https://www.wgcu.org/science-tech/2025-09-23/detection-expert-says-hackers-likely-used-ai-to-penetrate-airport-system which is written by some person at Undetectable AI...
Detection expert says hackers likely used AI to penetrate airport system

As major airports across Europe have been targeted in a cyber-attack that began on Saturday, an expert is warning that artificial intelligence may have played a key role in the breach.The incident, which disrupted check-in and baggage systems at hubs including Dublin, London, Brussels and Berlin, left thousands of passengers stranded with canceled or delayed flights.Christian Perry, CEO of Undetectable AI, AI detection experts, explained how AI is reshaping the way cyber-attacks unfold.

WGCU
@GossiTheDog “Undetectable AI”… lol!
@GossiTheDog this reads so much better if you replace every instance of “AI” with “bullshit”
@GossiTheDog And only our product can cure your FUD.

@GossiTheDog The thing that puzzles me is how any person can actually say such a thing and *not* expect anyone to cry, "Bullshit!" Do they really think we're that dim? Do they so badly lack self-awareness that they cannot fathom just how transparent their bullshit is?

I guess the answers are yes and yes, but... #baffled

@GossiTheDog @cstross I expect the “80% of hackers expect AI to take their jobs in 2 years” headlines will appear soon.

@GossiTheDog

> The only way to stop a bad guy with AI is with a good guy with AI.

Says guy who in a completely unrelated turn of events happens to sell AI.

@GossiTheDog

Isn't it great that we're at the phase of the AI hype cycle that AI companies are trying to (sort of) take credit for major criminal attacks just to "prove" that AI works and is useful? Kinda.

@knud Sort of a last-resort-of-scoundrels as by definition the claim is unlikely to be disproved, however ludicrous it is.

@GossiTheDog

As for the artificial intelligence that I know about, if it can be attacked at will by hackers, then what is the point of our researching, inventing and innovating artificial intelligence?

@GossiTheDog Lets hope we get a post-mortem this is going to be interesting. Or hilarious.
@GossiTheDog and most of that 33% is probably due to delays at affected airports 👀
@GossiTheDog
Is this after the cancellation of 50% of outbound flights?
@GossiTheDog When you're doing pen and paper, let's hope the pilot does not roll a 1 😄
@GossiTheDog Making writing abilities being top notch.
@GossiTheDog wait... you aren't british?
@alex02 @GossiTheDog I'm pretty sure they're not Sarah either.
@derickr @GossiTheDog I can barely read my own handwriting but good to know.
@GossiTheDog being Germany, I am impressed that they didn’t resort to use fax

@GossiTheDog what are those “manual workarounds”?

Do I have to convince the check-in desk personnel somehow to get a boarding pass for a plane?

@GossiTheDog someone sure is going for a felony count high score
@GossiTheDog Ouch. Imagine the enormous pressure to "just get it working!!!1" even though you don't know the vector used yet ...

@troed @GossiTheDog

This is probably one of the reasons why M&S and Co-op took a long time to get up and running again?

Understanding what's happened and how so it can be remediated.

Absolutely understandable that systems need to be up and running quickly but working and secured is far better 🫤

@GossiTheDog mhh maybe now they'll get permission to spend money on competent incident response 😬
@wall_e only if the law changes (possibly insurance terms) makes it more costly to not meet even basic standards of information security in the event of a breach.
Eg JLR, if they are show. To have not implemented basic precautions and they want Gov support then they can see long term costs to pay it all back.
@GossiTheDog How do you know all that stuff? I‘m super curious to follow this story! How? Where?