Spanish
VisaVerge official logo in Light white color VisaVerge official logo in Light white color
  • Home
  • Airlines
  • H1B
  • Immigration
    • Knowledge
    • Questions
    • Documentation
  • News
  • Visa
    • Canada
    • F1Visa
    • Passport
    • Green Card
    • H1B
    • OPT
    • PERM
    • Travel
    • Travel Requirements
    • Visa Requirements
  • USCIS
  • Questions
    • Australia Immigration
    • Green Card
    • H1B
    • Immigration
    • Passport
    • PERM
    • UK Immigration
    • USCIS
    • Legal
    • India
    • NRI
  • Guides
    • Taxes
    • Legal
  • Tools
    • H-1B Maxout Calculator Online
    • REAL ID Requirements Checker tool
    • ROTH IRA Calculator Online
    • TSA Acceptable ID Checker Online Tool
    • H-1B Registration Checklist
    • Schengen Short-Stay Visa Calculator
    • H-1B Cost Calculator Online
    • USA Merit Based Points Calculator – Proposed
    • Canada Express Entry Points Calculator
    • New Zealand’s Skilled Migrant Points Calculator
    • Resources Hub
    • Visa Photo Requirements Checker Online
    • I-94 Expiration Calculator Online
    • CSPA Age-Out Calculator Online
    • OPT Timeline Calculator Online
    • B1/B2 Tourist Visa Stay Calculator online
  • Schengen
VisaVergeVisaVerge
Search
Follow US
  • Home
  • Airlines
  • H1B
  • Immigration
  • News
  • Visa
  • USCIS
  • Questions
  • Guides
  • Tools
  • Schengen
© 2025 VisaVerge Network. All Rights Reserved.
News

Millions Affected by Dublin Airport Supplier Cyber Breach Data Exposed

A ransomware attack on Collins Aerospace’s MUSE system exposed booking-related passenger data for August 2025 flights through Dublin Airport. While no passports or card data were reported leaked, names, contacts, itineraries and frequent flyer numbers were taken. Authorities including Ireland’s DPC and ENISA are investigating. Passengers should enable 2FA, change travel-account passwords, and monitor loyalty accounts for suspicious activity.

Last updated: October 27, 2025 10:13 am
SHARE
VisaVerge.com
📋
Key takeaways
Collins Aerospace MUSE ransomware attack exposed names, contact details, itineraries, and booking references from August 2025.
Dublin Airport processed 3,784,759 passengers in August 2025; all August travelers should treat data as potentially affected.
Everest group claims about 1.5 million passenger records; no passport numbers or payment card details confirmed exposed.

(DUBLIN, IRELAND) Dublin Airport is warning that millions of passengers who flew through the hub in August 2025 may have had parts of their personal information exposed after a ransomware attack struck a key third-party supplier, Collins Aerospace, and its widely used MUSE (Multi-User System Environment) software.

The incident, detected in mid-September and made public in late October, has drawn in Irish and European regulators, triggered airline notifications, and raised urgent questions about how a single vendor compromise can ripple across aviation. While investigators say no passport numbers or payment card details were exposed, data tied to August bookings—names, contact information, travel itineraries, booking references, frequent flyer numbers—was taken, raising the risk of targeted phishing and loyalty account theft. The Collins Aerospace breach also forced several European airports to revert to manual check-in and boarding as systems were taken offline to contain the attack.

Millions Affected by Dublin Airport Supplier Cyber Breach Data Exposed
Millions Affected by Dublin Airport Supplier Cyber Breach Data Exposed

Scope and immediate impact

  • Dublin Airport processed 3,784,759 passengers in August 2025. Officials say every traveler during that month should treat their data as potentially affected until forensics conclude.
  • The Everest ransomware group claimed responsibility and says it accessed about 1.5 million passenger records from systems connected to Collins Aerospace.
    • That figure is lower than Dublin’s August total, but Everest’s listing on the dark web includes booking details and flight data samples.
    • The full dataset remains behind a password and is not publicly available, according to security briefings shared with airlines and airport authorities.
  • Immediate priorities are safety, containment, and slowing secondary harms such as scams that often follow a breach of this size.

The focus for authorities and companies now is on containment and protecting passengers from follow-on fraud using the leaked data.

Why a vendor breach can be so disruptive

Collins Aerospace’s MUSE software underpins check-in, boarding, and related functions at roughly 170 airports worldwide. When a core service like MUSE is hit by ransomware, even short outages can force airports into manual processing:

  • Staff print passenger lists and check IDs by hand.
  • Boarding gates use visual checks and radios instead of scanners.
  • Airlines and airports deploy operational workarounds to keep flights moving.

DAA (Dublin Airport Authority) said its own systems were not directly compromised, but the vendor-side outage and data exfiltration forced coordinated responses with airlines and state agencies.

Timeline (key events)

  1. Attackers claim exfiltration around September 10–11.
  2. Attackers say contact with Collins Aerospace began September 16; no agreement reached.
  3. September 18 — Collins Aerospace notified DAA of the breach.
  4. September 19 — DAA confirmed boarding pass data tied to August flights had been posted online by cybercriminals.
  5. October 7 — Everest posted a public claim on its leak site.
  6. October 26–27 — Dublin Airport, several airlines, and European cybersecurity bodies briefed travelers and partners, warning of sophisticated fraud attempts.

What was and was not exposed

  • Stolen fields include:
    • Booking references
    • First and last names
    • Frequent flyer numbers
    • Contact data (email addresses, phone numbers)
    • Trip details (flight numbers, itineraries, seat info)
  • Confirmed not exposed:
    • National ID or passport numbers
    • Payment card or bank information

This distinction matters: without card data, direct payment fraud is less likely. Instead, attackers are likely to pursue targeted phishing and loyalty-account fraud, using accurate trip details to convince victims to click malicious links or reveal further data.

⚠️ Important
If you were traveling through Dublin August 2025, assume data exposure and beware targeted phishing. Do not click links in messages; verify via the airline app or official website only.

Operational disruption and staff response

When Collins Aerospace shut down parts of the MUSE environment to contain the breach, airports relying on it:

  • Shifted to manual verification at check-in counters and boarding gates.
  • Printed hard copies of passenger manifests and seat assignments.
  • Relied on radio communications and visual checks to move passengers.

For staff this required calm and training: gate agents matched names on lists with IDs while keeping boarding moving. Airline call centers handled surges of concerned passengers, while security teams rotated credentials and blocked suspicious logins.

Loyalty programs and account takeover risk

Because frequent flyer numbers were in the stolen fields, criminals may attempt to:

  • Log into airline accounts, steal miles, or book award tickets.
  • Resell stolen award tickets or miles on secondary markets.

Airlines are advising customers to enable two-factor authentication (2FA), reset passwords, and watch for unusual account activity. Some carriers have already locked accounts showing risky login behavior.

Guidance for affected passengers

If you passed through Dublin Airport in August 2025, take these concrete steps:

  1. Enable multi-factor authentication on airline and frequent flyer accounts.
  2. Change passwords on travel-related accounts; avoid reusing old passwords.
  3. Verify messages by going directly to the airline’s app or website rather than clicking links.
  4. Treat messages about “urgent rebooking” or “payment verification” with extra caution.
  5. Check loyalty balances for strange redemptions or bookings you did not make.
  6. Monitor credit reports for unusual activity—even though no card data was exposed.
  7. Report suspicious messages to your airline and, if in Ireland, to the Data Protection Commission.

If you believe your personal data is being misused, contact Ireland’s Data Protection Commission for guidance, including how to file a complaint. The DPC’s official site is available here: Data Protection Commission.

Regulators and airport leaders say there is no need to cancel or change trips based solely on the breach. The immediate risk is in inboxes and phones, not at the gate.

📝 Note
Enable 2FA on all travel-related accounts and reset passwords now. Check loyalty accounts for unusual activity and report any suspicions to the airline and Data Protection Commission.

Investigation, regulators, and industry response

  • Ireland’s Data Protection Commission (DPC) has opened a full investigation and is coordinating with aviation safety and cybersecurity bodies.
  • The Irish Aviation Authority and the National Cyber Security Centre have been briefed.
  • The European Union Agency for Cybersecurity (ENISA) notes that ransomware targeting supply-chain providers in aviation fits a broader pattern this year.
  • Industry analysis (VisaVerge.com) finds attackers increasingly target technology providers to reach many airports and airlines at once, turning a single compromise into a cross-border problem quickly.

Airlines and airports are revisiting vendor contracts, security clauses, and breach-reporting requirements. Some are exploring fallback tools that can run locally or offline if shared platforms fail.

Technical questions under investigation

Forensics teams are prioritizing:

  • How attackers first gained access to MUSE-related systems.
  • What privileges and lateral access the attackers obtained.
  • How long they moved undetected before discovery.

Remediation choices depend on the initial attack vector:
– If a stolen password was used → prioritize multi-factor enforcement and credential hygiene.
– If a software flaw was exploited → prioritize patch management and code review.

Policy and architectural lessons

Aviation is debating structural changes to reduce single points of failure:

  • Decentralize critical services so one vendor outage cannot cascade.
  • Improve vendor risk assessments and independent audits.
  • Implement stronger multi-factor authentication for system access.
  • Limit data retention where possible—shorter retention reduces exposure if attackers access records after trips have ended.

European regulators may move toward tighter rules for cybersecurity in aviation infrastructure, similar to other critical sectors. This could lead to mandatory standards, more frequent testing, and clearer reporting timelines.

Human stories and the real-world cost

  • A parent received a message with their child’s name and seat number asking to “confirm a meal selection.” The message looked authentic because the details were correct.
  • A frequent traveler discovered two award tickets booked out of their account; recovery took hours on the phone and damaged trust.

These examples explain why airports and airlines are urging August passengers to remain vigilant.

Communication and what passengers should expect

Clear, consistent messaging matters. Dublin Airport has emphasized repeatedly that no passport information, payment card details, or financial data were exposed. Airlines echo that message while urging account protections and caution around links.

Authorities also ask passengers not to share screenshots or links to stolen data online, as spreading those details can increase harm.

Final takeaways

  • The Collins Aerospace breach demonstrates how a single compromised vendor can create cross-border disruption.
  • Passengers should focus on account security: enable 2FA, change passwords, and verify messages via official channels.
  • Airports and regulators are likely to push for architectural and contractual changes to reduce vendor-related risks.
  • The DPC’s investigation will shape corrective steps and potential penalties, but the immediate priority is protecting passengers from targeted scams.

For now, the practical steps are simple and effective: secure your accounts, ignore suspicious links (even if they include real trip details), and contact your airline via official channels if you suspect fraud. Dublin Airport and partners will continue to share updates as investigations progress.

VisaVerge.com
Learn Today
Collins Aerospace → A major aviation supplier providing software and systems for check-in and boarding, including the MUSE platform.
MUSE → Multi-User System Environment software used for check-in, boarding, and passenger processing at many airports.
Ransomware → Malicious software that encrypts or exfiltrates data, often used by criminals to extort victims or publish stolen information.
Everest (ransomware group) → The cybercriminal group claiming responsibility for the Collins Aerospace breach and claiming to have exfiltrated records.
Data Protection Commission (DPC) → Ireland’s national authority responsible for enforcing data protection rules and investigating breaches.
ENISA → European Union Agency for Cybersecurity, which provides guidance and analysis on cybersecurity threats and incidents.
Two-factor authentication (2FA/MFA) → A security measure requiring two forms of verification before granting access to an account, reducing credential abuse.
Booking reference → A unique code associated with a passenger’s reservation, often used to retrieve or change bookings online.

This Article in a Nutshell

In mid-September 2025, a ransomware attack on Collins Aerospace’s MUSE software led to exfiltration of passenger booking data linked to August flights through Dublin Airport. Although investigators say passport numbers and payment card details were not exposed, stolen fields included names, emails, phone numbers, booking references, itineraries, seat info and frequent flyer numbers. Dublin Airport processed 3,784,759 passengers in August and urged those travelers to treat their data as potentially affected. Everest ransomware group claimed roughly 1.5 million records. Airports reverted to manual processing to maintain operations while regulators including Ireland’s DPC, the Irish Aviation Authority, NCSC and ENISA coordinate investigations. Passengers are advised to enable multi-factor authentication, reset travel-account passwords, monitor loyalty accounts and verify communications through official channels. The breach highlights supply-chain vulnerabilities in aviation and is prompting industry reviews of vendor risk, retention policies and fallback systems to reduce single points of failure.

— VisaVerge.com
Share This Article
Facebook Pinterest Whatsapp Whatsapp Reddit Email Copy Link Print
What do you think?
Happy0
Sad0
Angry0
Embarrass0
Surprise0
Robert Pyne
ByRobert Pyne
Editor In Cheif
Follow:
Robert Pyne, a Professional Writer at VisaVerge.com, brings a wealth of knowledge and a unique storytelling ability to the team. Specializing in long-form articles and in-depth analyses, Robert's writing offers comprehensive insights into various aspects of immigration and global travel. His work not only informs but also engages readers, providing them with a deeper understanding of the topics that matter most in the world of travel and immigration.
Subscribe
Login
Notify of
guest

guest

0 Comments
Inline Feedbacks
View all comments
U.S. Visa Invitation Letter Guide with Sample Letters
Visa

U.S. Visa Invitation Letter Guide with Sample Letters

U.S. Re-entry Requirements After International Travel
Knowledge

U.S. Re-entry Requirements After International Travel

Opening a Bank Account in the UK for US Citizens: A Guide for Expats
Knowledge

Opening a Bank Account in the UK for US Citizens: A Guide for Expats

Guide to Filling Out the Customs Declaration Form 6059B in the US
Travel

Guide to Filling Out the Customs Declaration Form 6059B in the US

How to Get a B-2 Tourist Visa for Your Parents
Guides

How to Get a B-2 Tourist Visa for Your Parents

How to Fill Form I-589: Asylum Application Guide
Guides

How to Fill Form I-589: Asylum Application Guide

Visa Requirements and Documents for Traveling to Cote d’Ivoire (Ivory Coast)
Knowledge

Visa Requirements and Documents for Traveling to Cote d’Ivoire (Ivory Coast)

Renew Indian Passport in USA: Step-by-Step Guide
Knowledge

Renew Indian Passport in USA: Step-by-Step Guide

You Might Also Like

ED Exposes Punjab Immigration Agents’ Fraudulent U.S. Visa Scheme
India

ED Exposes Punjab Immigration Agents’ Fraudulent U.S. Visa Scheme

By Sai Sankar
Allegiant Exits Airport After Four Years Amid 2025 Network Shift
Airlines

Allegiant Exits Airport After Four Years Amid 2025 Network Shift

By Robert Pyne
Texas, Florida Drive Far More ICE Arrests Than California — But Why
Immigration

Texas, Florida Drive Far More ICE Arrests Than California — But Why

By Robert Pyne
Swiss Embassy India Enforces Strict Schengen Visa Document Policy from August 2025
Documentation

Swiss Embassy India Enforces Strict Schengen Visa Document Policy from August 2025

By Sai Sankar
Show More
VisaVerge official logo in Light white color VisaVerge official logo in Light white color
Facebook Twitter Youtube Rss Instagram Android

About US


At VisaVerge, we understand that the journey of immigration and travel is more than just a process; it’s a deeply personal experience that shapes futures and fulfills dreams. Our mission is to demystify the intricacies of immigration laws, visa procedures, and travel information, making them accessible and understandable for everyone.

Trending
  • Canada
  • F1Visa
  • Guides
  • Legal
  • NRI
  • Questions
  • Situations
  • USCIS
Useful Links
  • History
  • Holidays 2025
  • LinkInBio
  • My Feed
  • My Saves
  • My Interests
  • Resources Hub
  • Contact USCIS
VisaVerge

2025 © VisaVerge. All Rights Reserved.

  • About US
  • Community Guidelines
  • Contact US
  • Cookie Policy
  • Disclaimer
  • Ethics Statement
  • Privacy Policy
  • Terms and Conditions
wpDiscuz
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?