From Airport chaos to cyber intrigue: Everest Gang takes credit for Collins Aerospace breach
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章主要讲的是Everest勒索团伙声称对Collins Aerospace的攻击负责,这次攻击影响了欧洲多个大型机场,包括希思罗、布鲁塞尔和柏林机场。攻击导致航班延误和取消,系统被迫手动操作。Collins Aerospace是美国的一家重要航空和国防技术公司,隶属RTX集团。Everest的泄密网站在声明后不久就下线了,可能被执法部门打击或他们自己撤下。 接下来,我需要将这些信息浓缩到100字以内。要突出事件的关键点:攻击者是谁,影响了哪些地方,造成的后果,以及泄密网站的情况。 可能的结构是:Everest团伙声称攻击Collins Aerospace,影响欧洲多个机场,导致系统故障和航班延误。他们的网站随后下线,可能被执法部门处理。 检查一下字数是否符合要求,并确保没有使用“文章内容总结”之类的开头。 </think> Everest勒索团伙声称对Collins Aerospace的网络攻击负责,导致欧洲多个大型机场运营中断。此次攻击影响了希思罗、布鲁塞尔和柏林机场的登机和值机系统,引发大量航班延误和取消。Everest的泄密网站在声明后迅速下线,引发对其被执法部门打击或自身撤下的猜测。 2025-10-18 15:10:24 Author: securityaffairs.com(查看原文) 阅读量:4 收藏

From Airport chaos to cyber intrigue: Everest Gang takes credit for Collins Aerospace breach

Everest claims Collins Aerospace hack hitting EU airports, but its leak site vanishes soon after, sparking takedown speculation.

Do you remember the Collins Aerospace supply chain attack that disrupted operations at several major European airports, including Heathrow in London, Brussels, and Berlin?

In September, a cyberattack on Collins Aerospace disrupted check-in and boarding systems at major European airports, heavily impacting Heathrow, Brussels, and Berlin. The outage caused numerous flight delays and cancellations, forcing manual operations.

Collins Aerospace is a major American company specializing in aviation and defense technologies, and is a subsidiary of RTX (formerly Raytheon Technologies). The company provides advanced systems for commercial, business, and military aircraft, including avionics, interiors, mission systems, and power controls. Collins also delivers integrated solutions for airports, space exploration, and operational efficiency, supporting both passenger safety and complex mission success. The attack has affected Collins’ Muse software

Now, the Everest ransomware gang has claimed responsibility, boasting about the breach on their leak site, which, intriguingly, went offline almost immediately afterward with a “Fatal error” message. It’s hard not to notice the timing. In the ransomware ecosystem, sudden technical failures like that often suggest something larger happening behind the scenes, perhaps a takedown by law enforcement, perhaps panic, or perhaps an attempt to erase traces after too much attention.

Whatever the reason, this incident is far from trivial.

Collins Aerospace is not just another contractor. Formed in 2018 through the merger of Rockwell Collins and United Technologies’ aerospace division, it has become a cornerstone of modern air and naval defense infrastructure. The company provides advanced avionics, navigation systems, flight control solutions, mission management technologies, and power and control modules that are integral to both civilian and military operations.

Its parent company, RTX (formerly Raytheon Technologies), is one of the most powerful players in the global defense and aerospace sector, integrating capabilities that span missiles, radar, propulsion, sensors, and electronic warfare. Together, RTX and Collins Aerospace form a vital part of the defense supply chain that supports numerous Western military programs.

That’s why this cyber attack feels different. It’s not just about data loss or encrypted servers, it’s about the integrity of systems that underpin critical infrastructure and national security. When an actor like Everest claims a successful intrusion against a company that designs components for aircraft, radar systems, or communication platforms, the stakes become far more serious than financial extortion.

These supply chain attacks show how connected today’s defense and aviation industries are. One weak link can affect every player in the supply chain, from airlines and airports that rely on critical software to military clients that depend on secure systems. If hackers gained access to private or classified data, the damage could go far beyond money, threatening national security and defense readiness.

The Everest group itself is part of a new generation of cybercriminal organizations that operate with a hybrid model. Instead of executing full-scale attacks alone, they often act as brokers, selling stolen access or partnering with affiliates who specialize in different stages of the intrusion chain. Their public leak site going dark so soon after the Collins Aerospace claim adds a layer of mystery. Did the law enforcement hit the cybercrime group? Did the group panic after realizing the sensitivity of its target? Or was it a tactical retreat to avoid escalating international attention?

This incident also reflects how ransomware has evolved from a purely financial crime to a geopolitical weapon. Attacks against critical suppliers no longer just aim to extract payment — they aim to undermine confidence, create disruption, and weaken trust in essential systems. For industries tied to defense or aviation, that erosion of trust can be as damaging as the intrusion itself.

The Collins Aerospace episode highlights the urgency of strengthening cooperation between private industry, law enforcement, and international cyber defense agencies. It also reminds us that traditional cybersecurity strategies focused only on perimeters or firewalls are no longer enough. Modern defense requires visibility across entire supply chains, segmented architectures that limit lateral movement, and continuous intelligence sharing to detect and contain breaches before they spread.

In the end, what we are witnessing with this attack is not just another ransomware case. It is a glimpse into the potential convergence of cybercrime and state-sponsored activity. What begins as a breach in a vendor’s network can quickly cascade into something that challenges national resilience itself.

As investigations continue, one truth stands out: threat actors are learning faster than ever, and every incident like this is a test of how well we can learn in return.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Collins Aerospace breach)

UPDATE: The Everest’s Data Leak Site is up again. Thanks to Ransomnews colleagues who alerted me.

Collins Aerospace Everest



文章来源: https://securityaffairs.com/183567/cyber-crime/from-airport-chaos-to-cyber-intrigue-everest-gang-takes-credit-for-collins-aerospace-breach.html
如有侵权请联系:admin#unsafe.sh