Anatomy of a Breach

Anatomy of a Breach: Garmin — WastedLocker Ransomware Takes Down Aviation, Fitness, and Marine Services

> series: anatomy_of_a_breach —— part: 140 —— target: garmin —— ransomware: wastedlocker —— services_down: aviation_fitness_marine —— reported_ransom: $10,000,000<span class="cursor-blink">_</span>_

Hedgehog Security 31 August 2020 13 min read

Aviation databases. Fitness tracking. Marine charts. Factory production. All down. For five days.

On 23 July 2020, Garmin suffered a WastedLocker ransomware attack that encrypted systems across its entire operation. Garmin Connect — used by millions of athletes and fitness enthusiasts worldwide — went offline. flyGarmin and Garmin Pilot — aviation services used by pilots for navigation database updates and flight planning — went down, raising safety concerns (pilots require current navigation databases). Garmin's marine and automotive navigation services were disrupted. Factory production lines halted. Even the company's call centres and internal email systems were affected. The outage lasted approximately five days.

Garmin reportedly paid approximately $10 million in ransom to obtain the decryption key — a payment complicated by the fact that WastedLocker was attributed to Evil Corp, a Russian cybercrime group whose leaders were under US Treasury OFAC sanctions. Paying ransom to sanctioned entities carries potential legal exposure under US law. Garmin reportedly used a third-party intermediary to negotiate and facilitate the payment — highlighting the ethical and legal complexities of ransomware payments.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

When ransomware grounds pilots, the consequences extend beyond business.

Aviation Systems Offline
flyGarmin provides navigation database updates that pilots need for safe instrument flight. When flyGarmin went offline, pilots could not update their navigation databases — raising safety concerns. For organisations whose services affect safety of life, ransomware resilience is not a business decision — it is a safety obligation. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> validates resilience of safety-critical systems.
$10M Ransom and Sanctions Risk
The reported $10 million payment — to a group under US sanctions — created dual jeopardy: pay the ransom and risk sanctions violations, or refuse to pay and face prolonged outage affecting millions of users and aviation safety. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence's incident response</a> includes legal and regulatory guidance on ransom payment decisions.
Millions of Users Affected
Garmin Connect serves millions of fitness users who lost access to training data, health monitoring, and activity tracking for five days. While inconvenient rather than dangerous for fitness users, the outage demonstrated the dependency that millions of consumers have on connected service platforms. <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides the monitoring that detects ransomware before encryption completes.
Manufacturing Production Halted
Like <a href="/blog/anatomy-of-a-breach-norsk-hydro">Norsk Hydro</a> (2019), the Garmin attack disrupted physical manufacturing — demonstrating that IT ransomware can have OT consequences. <a href="/penetration-testing/infrastructure">Our infrastructure testing</a> includes IT/OT boundary security assessment and production system resilience.

Ransomware against safety-critical services creates obligations beyond business continuity.

The Garmin attack demonstrated that when ransomware affects safety-critical services — aviation navigation, marine charts, emergency communications — the stakes extend beyond business continuity to human safety. For UK organisations operating in aviation, maritime, healthcare, or any sector where service availability has safety implications, ransomware resilience must be engineered to safety-critical standards.

Cyber Essentials establishes baseline controls. Infrastructure testing validates ransomware resilience including backup integrity and recovery procedures. SOC in a Box monitors for ransomware indicators 24/7. And UK Cyber Defence provides the incident response, crisis management, and legal guidance that organisations need when ransomware threatens safety-critical services.


Garmin's ransomware took aviation databases offline. Could your safety-critical services survive the same?

<a href="/penetration-testing/infrastructure">Infrastructure testing</a> validates resilience. <a href="/cyber-essentials">Cyber Essentials</a> establishes the baseline. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects ransomware. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> manages the crisis.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles