From Chaos to Resilience: The Collins Aerospace MUSE Cyberattack

30 September, 2025 | Miscelanea

On 19 September 2025 a cyber intrusion against Collins Aerospace’s MUSE passenger-processing platform forced major European airports to revert to pen-and-paper operations. This report explains what happened, why it mattered, and the practical steps airports, airlines and vendors must take to avoid a repeat.

What happened — the operational shock

On 19 September 2025, a sophisticated cyber incident targeted the MUSE family of passenger-processing products from Collins Aerospace (often referred to as cMUSE or vMUSE). The attack disrupted automated check-in kiosks, bag-drop interfaces and gate boarding systems at several high-throughput airports — including London Heathrow, Brussels and Berlin Brandenburg — causing long queues, delays, multiple cancellations and temporary diversions.

Reports from industry intelligence firms and press outlets indicate the outage forced airports into manual fallback mode for hours, demonstrating how a single vendor outage can cascade into systemic operational disruption across carriers and terminals.

What is MUSE — and how it differs from airline PSS platforms

MUSE is a common-use passenger processing system (CUPPS). Its role is to enable shared terminal infrastructure — kiosks, counters and boarding gates — to be used by multiple airlines. That contrasts with a Passenger Service System (PSS) such as Navitaire (part of Amadeus), which focuses on airline commerce: reservations, ticketing, merchandising and revenue management.

In short: MUSE runs the physical passenger flow at the airport; Navitaire runs airline commercial systems. Both are critical, but they live at different layers of the travel stack — and a failure in the CUPPS layer can immediately affect thousands of passengers standing at kiosks and boarding gates.

AspectMUSE / cMUSE / vMUSENavitaire
Primary functionCommon-use passenger processing (check-in, kiosks, bag-drop, boarding gates)Passenger Service System (PSS): reservations, ticketing, merchandising, revenue mgmt
Primary usersAirports and terminal operators; airlines using shared infrastructureAirlines
Deployment modelOn-premises or cloud; CUPPS-compliant integrationsCloud-native, API-driven PSS
Typical interfacesKiosks, printers, biometric readers, gate systems (CUTE/CUPPS standards)Distribution APIs, NDC, EDIFACT, REST for commerce and booking
Operational riskSingle point failure at terminal level — immediate physical passenger impactBusiness continuity, revenue loss and check-in integrity if integrated with airport systems

Anatomy of the attack

Intelligence collected by several security firms points to a supply-chain compromise pattern: an initial intrusion into the vendor environment, followed by propagation to tenant airports. Threat actor attribution remains unsettled — analysts have proposed motives and capabilities ranging from hacktivist disruption to ransomware sabotage and state-sponsored operations — but common techniques line up with the MITRE attack taxonomy: supply-chain access (T1195), phishing (T1566), lateral movement and service stoppage (T1489).

Immediate operational outcomes observed:

  • Extended processing times at check-in and boarding points.
  • Multiple cancellations, diversions and delays at affected airports.
  • Use of pen-and-paper logs to maintain continuity.

Where MUSE and Navitaire sit in the travel stack

MUSE and Navitaire Travel Stack

Practical recommendations (operational & technical)

  1. Regular fallback drills: execute realistic manual check-in and boarding exercises with carriers and ground staff; test timelines and communication plans.
  2. Vendor risk governance: include rigorous cybersecurity SLAs, independent audits and mandatory breach notification windows in contracts with CUPPS/PSS vendors.
  3. Network segmentation: isolate CUPPS infrastructure from general corporate networks and strictly control vendor remote access with phishing-resistant MFA and jump hosts.
  4. Immutable backups: maintain offline, write-once backups for critical configurations and assets to enable restoration after ransomware or destructive attacks.
  5. Active threat hunting: monitor for credential leaks, suspicious admin logins and dark-web chatter tied to airport assets or vendor services.
  6. Staff training: ensure front-line staff know escalation paths and have quick reference procedures for manual operation modes.

Technical table: suggested compatibility & interface checklist

ComponentProtocol / StandardSecurity ControlsNotes
CUPPS / MUSE endpointsCUPPS / CUTE, SOAP/REST for vendor APIsMutual TLS, client certs, strong MFA for admin accessSegmented VLANs; restrict source IPs for vendor management
Kiosks & Gate HWProprietary device protocols; SSH/SNMP for managementDevice hardening, signed firmware, tamper detectionLeast-privilege networks; offline functional fallbacks
PSS (Navitaire)NDC, EDIFACT, REST APIsAPI gateways, WAF, rate limits, per-client credentialsUse service accounts per airline; rotate keys often
Admin & Vendor accessRDP/SSH, VPN, vendor portalsPrivileged access management, just-in-time access, session recordingAvoid permanent standing admin accounts
Telemetry & DetectionSyslog, EDR, SIEM integrationCentralized logging, long retention, anomaly detectionCorrelate vendor telemetry with airport telemetry

How RELIANOID helps secure these applications

Vendor diligence is necessary but not sufficient. RELIANOID’s Application Delivery Controller (ADC) offers a layered protection model that augments vendor hardening: advanced load balancing to absorb and distribute traffic spikes, integrated Web Application Firewall (WAF) rules to block common application-layer attacks, SSL/TLS termination and inspection to detect malicious payloads, and DDoS mitigation to preserve availability during volumetric incidents. Deployed in front of CUPPS endpoints or airline PSS (such as Navitaire), RELIANOID can implement strict access policies, rate limiting, and health-check-driven failover — turning single-vendor outages into manageable incidents rather than systemic shutdowns. Check our technical article about load balancing these applications and RELIANOID use cases in the field.

Conclusion

The September 2025 disruption that moved airports “from MUSE to manual” is a stark reminder that digitization concentrates operational risk. Aviation’s reliance on third-party platforms requires industrywide coordination: routine fallback testing, contractual security guarantees, segmented architecture and resilient infrastructure. With a combination of operational preparedness and technical controls — including ADCs, WAFs, immutable backups and strong access governance — airports and airlines can reduce the odds that a single vendor breach becomes a continent-wide travel crisis.

Related Blogs

Posted by reluser | 03 February 2026
At RELIANOID, we understand that in today’s hyper-connected world, digital supply chains are only as secure as their weakest link. From payroll systems and file-sharing platforms to HR tools and…
115 LikesComments Off on How RELIANOID Takes Extreme Measures to Manage Third-Party Risks
Posted by reluser | 29 January 2026
The global financial ecosystem remains under constant pressure from cybercriminals who actively probe for weaknesses across the sector’s highly interconnected infrastructure. With financial institutions relying on vast networks of third-party…
142 LikesComments Off on Emerging Cyber Threats Impacting Today’s Financial Ecosystem
Posted by reluser | 07 January 2026
The maritime industry has long been perceived as a stronghold of mechanical engineering and international trade, operating on timeless principles of navigation and logistics. However, as the digital transformation reshapes…
260 LikesComments Off on Cybersecurity in Maritime: The Quiet Threat Persisting Throughout the Entire Lifecycle of a Ship