
October 2025 witnessed one of the most disruptive cyber incidents in European aviation, with the Everest ransomware group targeting Dublin Airport and stealing the personal data of over 1.5 million passengers. The ramifications stretch far beyond data privacy, exposing deep operational vulnerabilities and setting new urgency for resilience across critical infrastructure.
The Attack: Data Theft at Scale
On October 25, the Everest group listed Dublin Airport as a victim, claiming to have exfiltrated 1,533,900 passenger records. Fields compromised include full names, flight details, frequent flyer info, travel status indicators, and even baggage tag information. The stolen data, now password-protected on Everest’s leak site, serves as leverage in double-extortion negotiations: airport representatives have six days to respond before the information is released online.
Collins Aerospace was previously targeted in September, with check-in and baggage systems disabled across Heathrow, Berlin, Brussels, Dublin, and Cork airports[12][6]. Airports were forced to revert to manual operations, triggering massive delays, flight cancellations, and piles of handwritten boarding passes and baggage tags, echoing the chaos seen in Dublin.
Aviation Sector Ripple Effects
The Everest campaign underlines two stark realities:
- Aviation is highly centralized around niche software platforms like Collins Aerospace’s MUSE system. When attacked, single points of failure cripple large swaths of the industry.
- Manual fallback procedures, though vital, proved slow and frustrating—leading to stranded passengers, missed business connections, medical emergencies, and even families sleeping in airport terminals.
Investigations by Irish authorities and the National Cyber Security Centre are ongoing. Meanwhile, Dublin Airport faces a server rebuild “from scratch,” with no end date for full recovery.
Lessons and Recommendations
This incident is a wake-up call:
- Digital over-centralization, inadequate backup capabilities, and untimely patching create a breeding ground for costly outages.
- Organizations must audit, harden, and diversify critical systems to withstand modern threats.
- Passengers affected are urged to change passwords, monitor for phishing, and stay alert for updates from airport authorities.
Conclusion
The Everest ransomware assault on Dublin Airport is not just a deep data breach—it’s an operational, reputational, and strategic challenge to aviation’s digital future. As the industry struggles to recover and lessons are learned (again), one question remains: Will airports worldwide finally put preparedness first, or will the next attack expose the same vulnerabilities



