Anatomy of a Breach

Anatomy of a Breach: Collins Aerospace — Ransomware Grounds Passenger Processing at Heathrow, Brussels, and Berlin Airports

> series: anatomy_of_a_breach —— part: 200 —— target: collins_aerospace_muse —— airports: heathrow_brussels_berlin —— impact: manual_check-in<span class="cursor-blink">_</span>_

Hedgehog Security 31 August 2025 13 min read

Heathrow. Brussels. Berlin. Passenger processing down. Manual check-in. Ransomware.

In August 2025, a ransomware attack on Collins Aerospace's MUSE passenger processing system disrupted operations at several major European airports including London Heathrow, Brussels Airport, and Berlin Brandenburg. The MUSE system — used by airlines and airports for check-in, boarding pass issuance, flight management, and departure control — was rendered unavailable. Airlines and airports were forced to revert to manual passenger processing.

The attack, claimed by the Everest cybercrime group, spread rapidly across borders because the Collins MUSE system is deployed at multiple airports throughout Europe — a shared platform where a single compromise cascades to every airport using the system. The impact echoed the CrowdStrike outage (2024), where a single vendor's failure grounded flights globally — but this time, the disruption was caused by a deliberate criminal attack rather than a faulty update. Airlines resorted to handwritten boarding passes and manual passenger check-in, creating significant queues and delays — the same fallback procedures seen during the CrowdStrike incident.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

One vendor. Multiple airports. Multiple countries. All disrupted simultaneously.

Shared Aviation Systems
Collins Aerospace's MUSE system is used across multiple airports — creating concentration risk where a single vendor compromise affects airports in different countries simultaneously. For UK aviation, <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses shared aviation system security and resilience.
Heathrow Affected
London Heathrow — the UK's busiest airport — was among those disrupted, directly affecting UK travellers and aviation operations. The Collins attack was the second major disruption to Heathrow in two years (after <a href="/blog/anatomy-of-a-breach-crowdstrike-outage">CrowdStrike</a>), reinforcing that aviation IT resilience is a recurring challenge. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors aviation-critical systems.
Manual Fallback Procedures
Airports reverted to manual check-in — handwritten boarding passes and physical processes. While disruptive, the existence and testing of manual fallback procedures limited the safety impact. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides incident response planning including fallback procedure documentation and testing.
Cross-Border Impact
The attack affected airports across the UK, Belgium, and Germany simultaneously — demonstrating that shared vendor systems create cross-border risk that requires international coordination. <a href="/cyber-essentials">Cyber Essentials</a> addresses critical infrastructure vendor security.

200 articles. Seventeen years. Aviation keeps getting disrupted. The root causes haven't changed.

Article #200 in this series documents a shared vendor ransomware attack disrupting European airports — a scenario that combines the vendor concentration risk of CrowdStrike (2024), the ransomware against critical infrastructure of Colonial Pipeline (2021), and the aviation disruption of multiple previous incidents. After 200 articles, the controls remain unchanged: penetration testing, Cyber Essentials, SOC in a Box, and incident response.


Article #200. Heathrow, Brussels, Berlin disrupted by ransomware. Is your critical infrastructure resilient?

<a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses vendor and aviation security. <a href="/cyber-essentials">Cyber Essentials</a> provides the baseline. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors critical systems.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles