Cybercriminals are taking greater risks by targeting high-profile organizations to secure larger payoffs and enhance their online reputational clout, cybersecurity experts said, after a weekend hack crippled airport check-in systems across Europe and stranded thousands of passengers.
The European Union’s cybersecurity agency ENISA confirmed on Monday that the hack on Collins Aerospace, owned by RTX, was a ransomware attack, but did not say where the attack originated from. The outage, which has affected check-in and baggage drop services, has impacted dozens of flights since Friday.
“Broadly, the majority of ransomware activity is still geared towards extortion through data encryption and theft,” said Rafe Pilling, Director of Threat Intelligence at Sophos, a British cybersecurity firm.
“The subset of attacks deliberately engineered for maximum disruption, often by Western-based groups, are the outliers, but they are becoming more visible and more ambitious,” he added.
It was not clear which group was behind the hack. Ransomware gangs routinely publicize attacks and leak stolen data on dark web “leak sites,” but websites that monitor those portals had not, as of Monday, detected any group claiming Collins Aerospace, or RTX, as a target.
Ransomware is malicious software used by cybercriminals to encrypt a company’s data and demand payment for its release. They typically operate in the shadows, and many try to avoid targets that might earn them unwanted attention from law enforcement agencies.
Other groups, however, are becoming more brazen in the kind of targets they choose, cybersecurity experts said.
In April, a group of hackers dubbed Scattered Spider was widely reported to be behind an attack that crippled British retailer Marks & Spencer, preventing one of the best-known names in British retailing from taking online orders for weeks.
Last Thursday, Britain’s National Crime Agency charged two teenagers over a 2024 cyberattack on London’s Transport for London, which it said caused “significant disruption and millions in losses.”
The NCA said investigators believed the TfL attack was carried out by members of Scattered Spider.
Scattered Spider was involved with approximately 120 network intrusions and has earned around $115 million in ransom payments.
“It’s clear from the number of recent cyberattacks and their impact that this is a problem that will grow, possibly rapidly, until software developers get much better at writing secure software and company IT staff get much better at evaluating the security of software their company cho0ses to purchase or to use remotely,” said Martyn Thomas, Emeritus Professor of IT at Gresham College, London.
“We have been lucky so far, as the motivation of cyber criminals has been disruption or financial gain,” Thomas said. “If they were to decide to cause serious injury or many deaths, the same attack strategies could be used on critical systems in healthcare or major infrastructure.”
One potential factor adding to the rise in higher-profile and more criminally risky ransomware targets is the pursuit of reputation within criminal circles: The bigger the target, the more online clout cybercriminals have with other hackers.
“A small but determined set of largely Western-based cybercriminals are honing their skills and becoming emboldened by their past success and the success of others,” said Pilling at Sophos.
“Their motivation isn’t only financial, though, and pulling off a high-impact breach also brings social standing and credibility within their peer networks.”
(Reporting by James Pearson in London. Editing by Jane Merriman)



How One MGU Grew Fivefold When Capacity Fled Cat-Prone Property Markets
The Future of Knowledge in Insurance: From Training to AI-Powered Productivity
Why Insurance Telematics Integrations Fail
The Good Neighbor 




