2026 Futuriom 50: Highlights →Explore

Executive Summary

In September 2025, RTX Corporation (formerly Raytheon Technologies) experienced a significant ransomware attack targeting its Collins Aerospace Multi-User System Environment (MUSE) passenger processing platform. The ransomware—suspected to be from the Hardbit or Loki ransomware families—caused widespread operational disruptions, leading to flight cancellations and delays at major European airports including London Heathrow, Brussels, Cork, Dublin, and Berlin. The attack was detected on September 19th, prompting RTX to initiate a full incident response, notify authorities, and deploy technical mitigations across affected customer networks. Law enforcement arrested a UK-based suspect linked to the attack, underscoring the event’s criminal intent and sophistication.

This incident highlights a rising trend of ransomware groups targeting critical infrastructure and supply chain applications, often by leveraging commodity Ransomware-as-a-Service (RaaS) tools. It also signals a shift in attacker behavior towards less sophisticated malware, which can still yield significant operational disruption due to integrated, shared technology platforms in aviation and other sectors.

Why This Matters Now

This incident demonstrates the urgent need for robust cyber resilience within critical infrastructure and supply chain environments, as attackers now exploit both advanced and basic ransomware to disrupt essential services. The attack’s impact on pan-European airport operations serves as a critical warning for organizations relying on shared platforms to prioritize segmentation, detection, and zero trust controls.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The disruptions were caused by a ransomware attack impacting RTX's Collins Aerospace MUSE system, which provides critical passenger processing functions at major airports.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Applying distributed Zero Trust segmentation, east-west traffic control, and egress policy enforcement would have constrained attacker movement and reduced impact of ransomware. Enhanced visibility and anomaly detection could have enabled earlier detection and mitigation, limiting both spread and operational disruption.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF) with Distributed Inline Enforcement

Mitigation: Blocked unauthorized access attempts at the perimeter via real-time policy checks.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Limited the attacker's ability to escalate or reuse compromised credentials between segmented environments.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Prevented unauthorized internal communication, halting adversarial spread.

Command & Control

Control: Egress Security & Policy Enforcement

Mitigation: Detected or blocked malicious C2 traffic attempting to exit the environment.

Exfiltration

Control: Cloud Firewall (ACF) and Inline IPS (Suricata)

Mitigation: Flagged and prevented mass or suspicious outbound data transfers.

Impact (Mitigations)

Raised rapid alerts on abnormal file encryption activity and coordinated response.

Impact at a Glance

Affected Business Functions

  • Check-in systems
  • Baggage handling
  • Boarding operations
Operational Disruption

Estimated downtime: 10 days

Financial Impact

Estimated loss: $5,000,000

Data Exposure

Potential exposure of passenger and employee data due to system compromise.

Recommended Actions

  • Apply distributed Zero Trust segmentation to strictly enforce least-privilege access between workloads and users.
  • Enable east-west traffic monitoring and inline policy enforcement to detect and block unauthorized internal movement.
  • Implement comprehensive egress controls with FQDN and signature-based policy to obstruct command & control and data exfiltration attempts.
  • Deploy real-time anomaly detection and threat response systems to rapidly surface and contain ransomware or destructive behavior.
  • Regularly audit and harden all access controls and remote access pathways, reducing attack surface and misconfiguration risk.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image