
Introduction: a high-impact supply-chain hit on aviation IT
In September 2025, a cyberattack against Collins Aerospace (an RTX company) disrupted passenger processing across several major European airports by impacting MUSE (Multi-User System Environment), a common check-in/boarding platform used by multiple airlines. National authorities and the vendor confirmed the incident as ransomware. In mid-October, the Everest ransomware group publicly claimed responsibility for breaching Collins, linking itself to the September airport disruption.
In brief
- What happened: Collins Aerospace suffered a cyber incident that affected systems supporting its MUSE passenger processing software, leading to check-in outages and manual fallback at airports including Brussels, Berlin and London Heathrow.
- Attribution claim: On Oct. 17–18, Everest posted Collins/RTX as a victim on its leak site, asserting a breach and teasing data publication.
- Impact: Widespread delays/cancellations; Brussels Airport asked airlines to cancel large portions of departures while waiting for a secure update. Online/self-service check-in often remained functional.
- Official posture: The UK NCSC said it is working with Collins and partners; Collins/RTX issued status updates as restoration proceeded.
Context / history / connections
Timeline highlights (all dates 2025):
- Sept 19–21: Airports report “technical disruptions” escalating to major queues and cancellations as MUSE is affected.
- Sept 22: EU cybersecurity agency acknowledgment (reported by major outlets) that the event was ransomware; authorities coordinate with the vendor and airports.
- Sept 24: RTX posts a MUSE System Update, confirming a product cybersecurity incident involving ransomware on systems that support MUSE and describing restoration efforts.
- Oct 17–18: Everest lists Collins/RTX on its leak site and claims the breach; industry press notes the claim while investigations and monitoring continue.
This incident underscores the fragility of shared, third-party operational platforms in aviation: a single software supplier servicing many airlines and airports can become a choke point for real-world operations.
Technical analysis / details of the vulnerability
Where MUSE sits: MUSE is a shared passenger processing platform that lets multiple airlines operate check-in desks and boarding gates on the same hardware and network segments. Because it’s multi-tenant by design and often integrated with departure control, baggage, and identity verification flows, availability is critical; segmentation and least-privilege must be rigorously enforced. RTX’s update confirms the ransomware affected systems that support MUSE, not necessarily every deployment equally (cloud, on-prem, or hybrid).
Observed failure modes during the incident:
- Desk terminals running the shared platform were impacted, forcing staff to switch to manual processing.
- Self-service kiosks / online check-in often remained available, suggesting blast radius differences between service tiers and integrations.
Threat actor posture: The Everest group operates a classic double-extortion model (encryption + data theft). Its public claim about Collins indicates either direct intrusion into vendor infrastructure or access via a connected third party. At the time of writing, the claim is public, but forensic and law-enforcement validation is not publicly detailed. Treat the claim as credible but unverified beyond the vendor’s ransomware confirmation.
Practical consequences / risks
- Operational continuity risk: Centralized airport processes (DCS, CUTE/CUPPS, bag drop, gates) can be simultaneously degraded across multiple hubs if a shared vendor is hit.
- Safety risk (indirect): While air traffic control/safety systems were not impacted, prolonged manual workarounds increase human-factor risk (misrouted baggage, boarding errors).
- Data exposure risk: Everest’s claim implies exfiltration; sensitive data (configuration, credentials, PII from passenger flows) could be at risk if present in affected systems. Confirmation is pending from official sources; monitor for disclosures.
- Sector spillover: Ransomware crews target high-leverage vendors for reputational impact and bargaining power—part of a broader shift tracked by major outlets and agencies.
Operational recommendations / what to do next
For airports and airlines using shared platforms (MUSE or equivalents):
- Supplier risk deep-dive: Re-assess vendor SBOMs, backup/restore designs, recovery time objectives, and isolation controls for shared kiosks vs. agent desktops. Require evidence of recent tabletop exercises specifically for ransomware impacting SaaS/on-prem support systems.
- Network segmentation & zero trust: Enforce strict segmentation between check-in endpoints, kiosks, baggage sortation, and airline corporate networks. Use per-tenant access policies and just-in-time admin.
- Credential hygiene: Rotate credentials (service accounts, API keys, SSO trust) that touch vendor systems; monitor for token replay and anomalous OAuth flows.
- Hardening endpoints at the edge: Kiosk/desk images should be immutable, application-whitelisted, and auto-reprovisionable. Disable local admin; broker updates from signed, verified channels only.
- Data minimization: Ensure passenger PII cached at the edge is ephemeral; disable unnecessary logs.
- Continuity playbooks: Maintain paper/manual check-in SOPs with staff training; pre-stage offline boarding contingencies (e.g., fallbacks for weight & balance, bag reconciliation).
- Third-party monitoring: Subscribe to vendor compromise indicators and telemetry channels; integrate them into SIEM/SOAR for automated containment.
- Legal & comms alignment: Pre-draft notification language for GDPR/PII exposure and airport-wide passenger communications to reduce confusion and queues.
Differences / comparisons with other cases
Unlike many “single-tenant” ransomware events that confine blast radius to one company, this case targeted a multi-tenant, operational platform whose unavailability immediately affected multiple airports and airlines—a force-multiplier typical of modern supply-chain attacks. Reuters and AP reporting around this incident emphasized the scale of disruption compared to ordinary enterprise outages.
Summary / key takeaways
- A ransomware incident at Collins Aerospace systems supporting MUSE triggered airport-wide processing disruption across Europe in Sept 2025.
- Everest has claimed the Collins breach (Oct 2025), linking itself to the September chaos; treat attribution as claimed, not yet officially confirmed.
- The event demonstrates the outsized risk posed by shared operational platforms and reinforces the need for segmentation, immutable endpoints, and robust continuity playbooks.
Sources / bibliography
- UK National Cyber Security Centre (NCSC) — statement on the Collins Aerospace incident. (NCSC)
- RTX (Collins Aerospace) — MUSE System Update (vendor confirmation of ransomware impact on systems supporting MUSE). (RTX)
- Associated Press — Airport cyberattack disrupts more flights across Europe (impact details and mitigation context). (AP News)
- Reuters — coverage confirming ransomware context and industry implications. (Reuters)
- CyberNews — Everest ransomware group claims Collins Aerospace breach (attribution claim and leak-site context). (Cybernews)

