UK authorities announce arrest in cyberattack that disrupted European airports

Britain’s National Crime Agency (NCA) said it has arrested a man as part of an investigation into a cyberattack that disrupted flights at Heathrow and several other European airports over the weekend.

NCA officers detained a man in his forties from West Sussex on suspicion of computer crime. He was later released on conditional bail, the agency said on Wednesday.

“Although this arrest is a positive step, the investigation into this incident is in its early stages and remains ongoing,” Paul Foster, deputy director of the NCA’s National Cyber Crime Unit, said in a statement.

The agency did not name the suspect or say whether he acted alone or as part of a wider cybercriminal group.

The incident, first reported on Sept. 19, crippled check-in and baggage systems at major airports including London Heathrow, Brussels, Berlin and Dublin, leaving thousands of passengers facing long queues and prompting hundreds of flight delays and cancellations.

The attack targeted the vMUSE self-service software supplied by Collins Aerospace, a subsidiary of U.S. defense giant RTX, which supports passenger check-in, baggage tagging and boarding. The European Union’s cybersecurity agency ENISA said on Monday that it had identified the type of ransomware used but did not disclose details.

Airport operators across Europe warned on Wednesday that disruptions were ongoing. Berlin’s airport said its check-in and baggage handling systems had yet to be restored and warned of further delays and cancellations. Brussels Airport also reported limited disruption.

London’s Heathrow said most flights were operating normally but urged passengers to check schedules before travelling. Dublin Airport said operations were “moving well,” though some airlines were still relying on manual workarounds.

Collins Aerospace said on Monday it was in the “final stages” of restoring its systems but has not issued further updates.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Next Post

UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

Related Posts

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week. The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It's rooted in Array's DesktopDirect, a remote desktop access solution that allows users to securely access
Read More

UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware

An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies, successfully infiltrating 34 devices across 11 organizations as part of a recruitment-themed activity on LinkedIn. Swiss cybersecurity company PRODAFT is tracking the cluster under the name Subtle Snail. It's assessed to be affiliated with Iran's Islamic
Read More

Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories

Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact" package with the intent to target GitHub-owned repositories. "We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish
Read More