October 6, 2025

Deep Dive - RTX Ransomware Attacks on European Airports

RTX Ransomware: European Airport Cyberattack Deep Dive (2025)

#Ransomware #RTX #EuropeanAirports #AviationSecurity #Cybersecurity #SupplyChainSecurity #CriticalInfrastructure #NIS2
October 6, 2025

Executive Summary

Between August–September 2025, multiple European airports experienced disruptions tied to a third‑party passenger‑processing outage later confirmed as a ransomware event at a vendor. The campaign—frequently linked in reporting to RTX—combined data theft with selective encryption against airport‑adjacent IT (airlines, handlers, shared services), causing check‑in and bag‑drop failures, queues, and delays. Core ATC/airport OT was not confirmed as encrypted; however, IT dependencies (DCS, middleware, tenant systems) created cascading operational impact across hubs including Heathrow (LHR), Brussels (BRU), and Berlin (BER).

Why this matters for Europe: The incidents illustrate how European hub ecosystems—with many tenants and shared platforms—can be disrupted via a single supplier under NIS2/UK NIS obligations, raising stakes for supply‑chain security, data breach obligations, and airport continuity plans.

Scope & Sources

  • Timeframe: Late August to September 2025.
  • Geography: Europe (EU member states, EEA and UK).
  • Scope: Only airport‑related impact in Europe (airports, airlines, handlers, airport IT providers). Non‑aviation incidents are out of scope.
  • Sources: Protos AI internal monitoring; uploaded “Deep_Dive_Report_RTX_Ransomware_Attacks_on_European_Airports_September_2025.pdf”; European press and sector advisories (ENISA, national CERTs, UK NCA announcements).

Use this canvas to track facts vs. analysis. Mark unconfirmed items clearly.

Key Judgments (Analyst Assessment)

  1. Primary objective: Financial extortion leveraging data exfiltration and targeted encryption in airport‑adjacent IT domains (not ATC/airport OT).
  2. Access vectors: Likely mix of credential compromise (phish/infostealers), public‑facing service exploitation, and supplier footholds; lateral movement through RMM/PSExec families.
  3. Blast radius control: Evidence suggests targeted policies to maximize passenger‑visible disruption while avoiding safety‑critical OT.
  4. Leak discipline: Rapid leak‑site postings and staged proof‑of‑exfil increased coercive pressure on European airport authorities and vendors.
  5. European context: Incidents implicate common‑use platforms (e.g., DCS/MUSE‑like services) and NIS2‑relevant supplier risk; reinforces need for contractual security baselines and joint drills.

(Confidence: moderate.)

Incident Overview (Timeline)

  • 19–20 Sep 2025 (Fri–Sat): A third‑party outage on the Collins Aerospace MUSE passenger‑processing platform triggers disruptions across multiple European hubs, including Heathrow (LHR), Brussels (BRU), and Berlin (BER). Airports fall back to manual check‑in and bag‑drop; delays and a limited number of cancellations occur.
  • 21–22 Sep 2025 (Sun–Mon): Progressive restoration continues. Queues and knock‑on delays persist at affected hubs, including Heathrow.
  • 22 Sep 2025 (Mon): Sector authorities confirm the incident involves ransomware at a third‑party provider supporting airport operations. Recovery efforts continue.
  • 24 Sep 2025 (Wed): UK law enforcement announces an arrest related to the wider investigation into the European airport disruptions.
  • 25 Sep 2025 (Thu): Industry wrap‑ups emphasize supply‑chain risk around MUSE/common‑use systems. Notifications and clean‑up continue across airports and vendors.

Threat Actor Snapshot — RTX

  • Motivation: Financial extortion (RaaS‑style economics with flexible affiliates).
  • Playbook: Data exfiltration → selective encryption → leak pressure.
  • Negotiation posture: Short timelines; escalation via public shaming and outreach to third parties.
  • Overlap: Common access chains using Cobalt/Sliver/NetSupport, AnyDesk/RustDesk/ScreenConnect footholds, and commodity infostealers.

Attribution to a single parent crew remains tentative. Keep language conservative in public-facing materials.

Case Note: Heathrow (LHR)

  • Disruption window: 20–22 Sep 2025.
  • Impact: Long queues at departures; manual check‑in and baggage processing; flight delays and isolated cancellations.
  • Root cause: Third‑party MUSE passenger‑processing outage associated with a ransomware event at the vendor. No evidence of effects on ATC or core airport OT.
  • Current status (26 Sep 2025): Services restored; post‑incident review and vendor hardening under way.

Technical TTPs (ATT&CK‑Mapped)

Curated to include only techniques evidenced or strongly consistent with the European airport incidents (Aug–Sep 2025).

ATT&CK Tactic Technique ID Airport-Specific Example Practical Detection Ideas
Initial Access Spearphishing Attachment / Link T1566.001 / T1566.002 Vendor/tenant phishing for SSO credentials; MFA-bypass lures SEG + sandbox; high-risk sender heuristics; OAuth consent monitoring
Initial Access Exploit Public-Facing Application T1190 VPN/Citrix/helpdesk flaws on airport IT/supplier edge WAF & virtual patching; attack-surface mgmt; auth endpoint anomaly alerts
Initial Access Valid Accounts T1078 Infostealer logs reused on airport/vendor IdP Risky sign-in (impossible travel, new ASN/hosting); step-up MFA
Execution PowerShell / Command-Line Interface T1059.001 / T1059.003 Scripts to dump creds, stage payloads on airport AD Constrained language mode; PowerShell transcript logging; parent-child process correlation
Execution User Execution (Malicious File) T1204.002 Staff tricked into opening macro-enabled vendor invoice AMSI scanning; block macros from internet; user warning telemetry
Persistence Scheduled Task / Registry Run Keys T1053.005 / T1547.001 Maintaining foothold in airport IT laptops Sysmon Event ID 1, 13; registry autorun monitoring; AMSI for wscript/cscript
Privilege Escalation Exploitation for Privilege Escalation T1068 Exploiting unpatched Windows drivers on ops workstations Kernel exploit alerting; EDR heuristic on token manipulation
Credential Access OS Credential Dumping T1003 Dumping LSASS from airport AD server EDR detect Mimikatz patterns; LSASS access prevention; Credential Guard
Discovery Network Service Scanning / Remote System Discovery T1046 / T1018 Scanning airport ops VLAN for accessible control servers IDS detect scanning; network segmentation; EDR unusual process spawning nmap
Lateral Movement Remote Services (SMB/WinRM/RDP) T1021.002 / T1021.006 Moving from IT to ops enclaves via misconfigured RDP Limit lateral RDP; monitor for abnormal parent-child process with mstsc/winrs
Command & Control Web Service / Encrypted Channels T1102 / T1573 HTTPS C2 over airport proxy to Slack/Telegram API SSL inspection + anomaly detection; block unsanctioned cloud apps
Exfiltration Exfiltration Over Web Services T1567.002 Leaking passenger PII via Dropbox/Drive DLP; CASB monitoring; block unauthorized sync tools
Impact Data Encrypted for Impact (Ransomware) T1486 Encrypting airport flight ops IT systems Immutable backups; anomaly-based detection; SOC playbooks

Detection & Response Playbook (Airport/Vendor)

Host & Identity

  • Alert on mass token refresh/MFA prompts; unusual SSO from hosting ASNs.
  • Detect shadow copy deletion, EDR disablement, and backup tampering.
  • Watch for RMM installs (AnyDesk/ScreenConnect/RustDesk) outside change windows.

Network & Exfiltration

  • Model low‑and‑slow exfil to object stores (S3‑compatible endpoints, Mega, VPS).
  • Hunt C2 pivots (Cobalt/Sliver/NetSupport): TLS JA3/JA4 clusters, DoH outliers.
  • Alert on SMB write bursts to admin shares (encryption prep) and cross‑host service starts.

Continuity & Communications

  • Pre‑stage manual check‑in/baggage runbooks; test tenant/vendor call trees.
  • Coordinate rapid data‑breach assessment for GDPR/NIS2 exposure while restoring services.

Hardening Priorities (30‑Day Checklist)

  1. Third‑Party Controls: Vendor tiering; baseline security controls; session‑recorded RMM; least privilege; break‑glass accounts with phishing‑resistant MFA.
  2. Identity Resilience: Conditional access (geo/ASN/device posture); fast token invalidation; admin paths with WebAuthn/Passkeys.
  3. Backup Strategy: 3‑2‑1 with immutable copies; restore drills for DCS/AODB/handlers.
  4. Network Segmentation: Tenant/vendor zones; restrict East‑West; proxy egress allow‑lists; dedicated exfil detection.
  5. Endpoint & Email: Block .lnk and Internet‑sourced macros; strip archives; EDR with canary files.

Sources & Further Reading (Europe‑Only)

Download Full Report

Deep Dive - RTX Ransomware Attacks on European Airports


Inquire Now
Inquire Now
Oops! Something went wrong while submitting the form.