Air Côte d’Ivoire confirms cyberattack following ransomware claims

The main airline serving the West African nation of Côte d’Ivoire was hit with a cyberattack earlier this month that forced it to institute business continuity plans. 

Air Côte d’Ivoire did not respond to requests for comment but released a statement on Friday confirming reports that hackers had breached its systems on February 8. Last week, the INC ransomware gang claimed it stole 208 GB of data from the airline. 

In its statement, the airline said the cyberattack “affected parts of its information system” and it had to call in technical teams to assist with flights and other operations.

The airline is partially owned by Air France, which did not respond to requests for comment. Air Côte d’Ivoire said it sent a notification of the incident to France’s National Agency for the Security of Information Systems (ANSSI) and the Ivory Coast Telecommunications Regulatory Authority (ARTCI).

Côte d’Ivoire’s Computer

Emergency Response Team (CI-CERT) and international experts have been brought in to investigate the incident and determine the extent of the data breach. 

“Air Côte d’Ivoire is aware of the risks that the data leak could entail for its service providers, its passengers and its employees,” the airline said in its statement.  

“We are making every effort with the competent authorities to limit the consequences. We want to reassure the public of the stability of our flight program and the continuity of its operation in stringent compliance with international safety standards.”

Based in the country’s largest city of Abidjan, the airline is relatively small with a fleet size of 14, but offers flights to dozens of African countries as well as Lebanon and France. 

In its post about the attack, the INC ransomware gang threatened the company to pay an undisclosed ransom by February 24. 

The ransomware gang previously took credit for an attack on the Pennsylvania Office of the Attorney General, the government of Panama in the fall of 2025 and the government of Hungary in 2024. The group caused chaos across the U.S. in November when it shut down a system hundreds of local municipalities use to warn residents of emergencies. 

Regional airlines continue to face attack by ransomware gangs hoping the disruption to air travel will force them to pay ransoms quickly. South African Airways, Hawaiian Airlines, Envoy Air, Australian airline Qantas, Spanish airline Iberia and severalRussian airlines were all targeted by hackers last year.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

Next Post

Global data protection authorities warn generative AI companies against replicating real people

Related Posts

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts

A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of privilege escalation that allows unauthenticated attackers to grant themselves administrative privileges by simply specifying the administrator user role during registration. It affects versions
Read More

Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability

Two hacking groups with ties to China have been observed weaponizing the newly disclosed security flaw in React Server Components (RSC) within hours of it becoming public knowledge. The vulnerability in question is CVE-2025-55182 (CVSS score: 10.0), aka React2Shell, which allows unauthenticated remote code execution. It has been addressed in React versions 19.0.1, 19.1.2, and 19.2.1. According
Read More

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware

Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as STAC6565. Cybersecurity company Sophos said it investigated almost 40 intrusions linked to the threat actor between February 2024 and August 2025. The campaign is assessed with high confidence to share overlaps with a hacking group known as Gold Blade, which is also
Read More