(WINDSOR, ONTARIO) Hackers briefly seized control of airport screens and the PA system at multiple Canadian airports on October 14, 2025, broadcasting unauthorized messages that included pro-Hamas content and Arabic chants and music, according to airport officials and federal authorities. The disruptions affected Windsor International Airport in Ontario as well as Victoria International Airport and Kelowna International Airport in British Columbia. Authorities, including the RCMP, said there was no direct threat to operations or passenger safety, and normal service resumed after delays.
Airport managers confirmed that the incidents involved political messages displayed on flight information displays and broadcast over loudspeakers. The group that claimed responsibility identified itself as Mutariff Siberislam. While some locations experienced flight delays of two to four hours, there were no reports of physical threats. These events were reported to the Canadian Centre for Cyber Security for investigation. Victoria International Airport said a cloud-based software issue let the PA system carry audio that should never have been allowed onto the network, which led to the unauthorized messages.

What happened and where
Officials at the affected airports described a short but disruptive breach that touched both visual and audio communication channels. Travelers saw airport screens flip to political content while the PA system played chants and music in Arabic. Security teams shut down the feeds, reset systems, and worked with national authorities. By late day, operations stabilized.
Investigators said the incidents did not compromise physical security, flight control, or safety systems, and there was no evidence of a threat against passengers.
Key facts at a glance:
– Affected locations: Windsor International Airport (Ontario); Victoria International Airport (British Columbia); Kelowna International Airport (British Columbia)
– Suspected cause at Victoria: cloud-based software issue allowing unauthorized audio onto the PA system
– Claimed group: Mutariff Siberislam
– Impact: Two to four hours of delays at some airports; operations normalized afterward
– Threat level: No direct threat to airport operations or passenger safety, according to authorities
– Reporting: Incidents referred to the Canadian Centre for Cyber Security for investigation
Passenger experience and operational impacts
For travelers crossing between Canada 🇨🇦 and the United States 🇺🇸 through Windsor and Detroit, even short delays at a regional airport can trigger missed connections or longer waits for family pick-ups on the other side of the border. In this case, the disruptions were temporary, but people in terminals felt the effects—especially when loudspeakers carried audio that did not match routine announcements and airport screens stopped showing normal flight data.
Authorities stressed that the breaches were limited to information systems. Airport infrastructure, screening checkpoints, and aircraft operations continued with added caution. That distinction matters for travelers: when airport screens and PA system messages appear off or confusing, passengers can still rely on direct airline staff guidance at gates and counters, which remained available throughout the day.
Practical steps followed on the ground:
1. Security teams shut down and reset compromised feeds.
2. Staff used manual backups and voice announcements to confirm boarding times.
3. Airlines and airports worked to restore schedules and move flights forward once systems were cleared.
Security and travel implications
Airport leaders said the content was political and that no threats were made against infrastructure or individuals. Even so, the incidents exposed weak points in public-facing systems that move critical information to travelers.
Why this matters:
– When the PA system and flight display boards are compromised, passengers can miss boarding calls or gate changes.
– Vulnerable groups—parents with children, seniors, new immigrants, and international students—are more likely to be stressed or disoriented by such disruptions.
– Communication-system disruptions can ripple beyond the airport: passengers may rebook flights, miss ground transport connections, or delay meet-ups and appointments.
Analysis by VisaVerge.com warns that communication failures often cause knock-on effects that extend travel time and complicate logistics for many passengers.
Technical and investigative notes
Officials reported the incidents to the Canadian Centre for Cyber Security, which coordinates federal guidance on digital threats. The Centre posts advisories and best practices for public bodies and critical services; travelers and industry professionals can follow updates via the Canadian Centre for Cyber Security to track current threat trends and recommended steps.
Investigative details so far:
– The group calling itself Mutariff Siberislam claimed responsibility.
– Authorities found no indication of physical intrusion at terminals.
– Early findings point to a remote compromise of public communication channels.
– Victoria International Airport specifically cited a cloud-based software issue that permitted unauthorized audio to reach the PA system.
That cloud detail is important for airport IT teams, who often use cloud dashboards to push content to airport screens and recorded boarding calls to the PA system.
Guidance for travelers and staff
For travelers who were present on October 14, the most practical steps were simple and effective:
– Listen for direct instructions from gate agents.
– Check airline apps for live updates.
– Look for printed postings at gates.
– Follow staff directions at counters and gates if electronic systems are unreliable.
Airports said staff followed standard procedures—confirming boarding times by voice and directing passengers to working counters. Where delays occurred, airports worked with airlines to move schedules forward once the systems were cleared.
Response, lessons and next steps
The RCMP and airport authorities emphasized that there was no evidence of a broader attack on aircraft, baggage systems, or security screening. The pattern observed on the day was visible disruption to airport screens and the PA system, followed by resets, manual backups, and a return to regular operations. The pauses—two to four hours in some places—forced waits but did not cancel travel for those affected.
Airports will review software controls that allow audio and visual content to reach public systems. Steps likely under consideration include:
– Hardening cloud dashboards and access controls.
– Adding additional validation for audio and visual feeds before they go live.
– Enhancing incident response playbooks for communication-system compromises.
The incident shows how a short digital breach can interrupt a busy travel day without touching flight controls or runway operations. In this case, officials said the threat stayed digital, and the fix—though disruptive—was contained.
For newcomers and families, clear signs and voice calls are more than convenience—they are lifelines through unfamiliar spaces. On October 14, when the PA system carried foreign audio and airport screens flashed off-message content, regular cues went missing and staff stepped in to fill the gap.
Canadian authorities will review the reports and examine whether extra safeguards are needed for common points of entry like airport screens and the PA system, aiming to keep public channels focused on travel information and to block unauthorized messages before they reach passengers.
This Article in a Nutshell
On October 14, 2025, Windsor, Victoria and Kelowna airports experienced brief cyber disruptions when hackers seized control of airport screens and PA systems, broadcasting pro-Hamas messages and Arabic chants. Airport managers and the RCMP said there was no direct threat to passenger safety, though some flights faced two-to-four hour delays. Victoria International Airport attributed the breach to a cloud-based software issue that allowed unauthorized audio onto the PA system. Security teams shut down and reset feeds, used manual backups, and reported the incidents to the Canadian Centre for Cyber Security. Authorities and airports will review cloud dashboard controls, access management and incident-response procedures to prevent future unauthorized messages and limit operational ripple effects for travelers.