Essential Infrastructure Safety
Everest Extortion Group Lists Dublin Airport

A Russian knowledge extortion group threatened Sunday to launch passenger knowledge putatively stolen from the Dublin Airport days after its operator stated it investigated a breach stemming from a September cybersecurity incident that affected airports throughout Europe.
See Additionally: The Rise of Agentic Commerce: Constructing Safe, Trusted Funds for the AI-Pushed Economic system
Russia-linked extortion group Everest Group stated on its darkweb leak web site that it has 1.5 million data, together with passenger knowledge, stolen from Dublin Airport. It began a countdown clock set to run out Saturday night for the information’s publication until it receives cost earlier than then.
Everest claimed duty on Oct. 17 for hacking infrastructure underpinning software program developed by U.S.-based Collins Aerospace that permits a number of airways to share check-in desks and boarding gates.
A mid-September incident with the agency’s Muse software program led to days of delays at a number of main European airports, together with London Heathrow, Berlin Brandenburg and Brussels Airport. Dublin Airport was additionally affected (seer: Cyberattack Disrupts Providers at Main European Airports).
A Dublin Airport Authority spokesperson on Friday advised The RTE Information the breach “is below energetic investigation, and we’re working intently with our regulators and affected airline companions. At the moment, there is no such thing as a proof of any direct influence on DAA methods,” a DAA spokesperson stated.
The spokesperson stated the information saved on the compromised community primarily was passenger boarding particulars for departure from Dublin Airport from Aug. 1 to Aug. 31.
The European Union’s Company for Cybersecurity, referred to as ENISA, categorized the Collins Aerospace hacking incident that led to delays as a ransomware assault.
Everest asserts on its darkweb web site that it did not unleash crypto-locking malware. It stated it discovered a Collins Aerospace’s FTP server ftp.arinc.com utilizing “aiscustomer” and “muse-insecure” credentials to entry knowledge on Sept. 10 to Sept. 11. Excessive quantity downloading doubtless triggered a safety alert, the group stated, leading to its entry being reduce off.
The outage of Muse check-in and boarding software program, Everest asserted, occurred as a result of Collins Aerospace itself shut down servers on Sept. 19.
Collins Aerospace advised buyers on Sept. 24 that it grew to become conscious on Sept. 19 of a “cybersecurity incident involving ransomware.” The corporate, a unit of publicly-traded RTX, didn’t return a request for remark.
It is doable two separate cybercrime teams focused Collins Aerospace practically concurrently with out being conscious of the opposite’s exercise. Cyberthreat intel agency Hudson Rock wrote Thursday that it believes one other ransomware group used credentials stolen in a 2022 infostealer an infection to contaminate Muse servers with crypto-locking software program on Sept. 19.
“By no means can we consider Collins Aerospace deliberately shut down their methods because the Everest group suggests,” Alon Gal, co-founder and CTO of Hudson Rock, advised Info Safety Media Group.
The U.Okay. Nationwide Crime Company in September arrested a suspected Collins Aerospace hacker, later launched on conditional bail (see: Suspected Collins Aerospace Hacker Arrested in UK).









