Cybersecurity in Aviation: Growing Operational Risk

By Chris Shieff

0Shares


Aviation is under fire

A recent study recorded a 600% increase in attacks on the aviation sector year-on-year. 71% of these involved credential theft or unauthorised access to critical systems.

The FBI also warned on June 28 that a cybercriminal group called ‘Scattered Spider’ had turned its attention toward the aviation sector, using impersonation to compromise security.

The alert was issued on X.

Protecting ourselves from these attacks has become a multi-million dollar industry.

High profile attacks in recent months have impacted both Aeroflot and Qantas, the latter likely carried out by none other than Scattered Spider – the group the FBI are worried about.

The FAA is paying attention

There has been a response to this growing risk.

There is an obvious intent to include cyber security in future regulations. While not yet law, recent advisories and bulletins make it clear that operators are expected to begin taking proactive steps.

A good place to start is AC 119-1A which provides an overview of cyber security requirements, risk assessments and best practices. Also keep an eye out for cyber threat alerts which can be published by SAFO, Notam or other notices.

The FAA is also actively working with ICAO and other agencies to harmonise future cyber protection practices under Annex 17 (Security).

What about business aviation?

The examples above relate to attacks on larger airlines and IT infrastructure. A valid question remains then, what does this all mean for biz av?

While not a traditional target, many business aviation operators lack dedicated IT departments or cyber defence teams. We also frequently carry high-net worth individuals on sensitive operations which may motivate nefarious cyber activity.

Recent reports from the industry show that biz av isn’t immune:

In 2020, a major manufacturer of business jets confirmed a cyber-security breach that compromised personal and aircraft ownership information.

Another example from May this year involved a Europe-based private jet operator which appeared on a ransomware group’s leak site. Sensitive crew info was shared, which reportedly included passport photos.

It’s clear that business aviation is not under the radar – therefore we must remain measured but cautious in our approach to emerging cyber threats.

EFBs – A Soft Target?

Feedback from industry experts and OPSGROUP members suggest that a closer look at the electronic security of EFBs warrants a closer analysis.

The role of EFBs in cyber crime warrants a closer analysis.

Eye-opening research, such as the work conducted by Cyber Security Consultancy Pen Test Partners, has highlighted that EFBs could act as an additional gateway for cyber crime if not correctly managed.

Look out for an dedicated article on this subject soon.

An extra tip – don’t forget your SMS

If your flight department operates under an SMS, it may be wise to include cyber security.

This means treating digital threats like any other hazard – reportable, measurable and mitigable.

It’s important we take steps now to keep our operations secure.

image_pdf

More reading:

Chris Shieff

Chris Shieff

OPSGROUP team member and Airbus pilot. Based in sunny Auckland, New Zealand. Question for us? Write to blog.team@ops.group.

One Comment

  • JB says:

    My lack of intellect may show, but I think EFB is not that big of a softspot.

    Software hacks, I think are more likely to be large scale which is easier to catch and usually results in downtime. Remember when whole of Jepessen/Boeing stopped working for a day? Those are managable, and possible to overcome safely.

    Critical data for example nav databases.

    Many business jet companies send them via email or some other not vulnerable way to the crew if the aircraft is not in a maitanace base, and imagine how catastrophic moving a few points could be. All you’d need to do is fake credentials, as already mentioned in the article, and know ARINC424 which is primitive and well documented online. I don’t have much expirenece with newest and greatest as I don’t have expierence with truly old and mighty, but I feel like above could affect more than a few companies and types.

    Similar case could be made for AFTN. What if crew realizes on the climb their routing has been tampered with? Or their permit number has been changed in their fleld 18? Lots of added workload and confusion. And in the essence it would require similar effort as getting into someones email.

    I could be totally off on this one. Even if I am, I think there should be more discussion on that level of things, rather than just flood of technical cybersecurity threat detection in all sort of software.

Leave a Reply

Copy link
Powered by Social Snap