
TL;DR
- The FBI confirms that Scattered Spider is now targeting airlines and transportation firms.
- Google’s Mandiant and Palo Alto Networks’ Unit 42 report active attacks on aviation systems.
- At least two airlines—Hawaiian Airlines and WestJet—have suffered breaches this June.
- The group uses phishing, social engineering, and threats to penetrate enterprise networks.
- Third-party IT vendors and contractors are increasingly at risk in the airline ecosystem.
FBI and Cybersecurity Giants Sound Alarm Over Sector-Wide Threat
The FBI has issued a warning that Scattered Spider, one of the most disruptive cybercriminal gangs operating today, has shifted its focus toward the aviation and transportation industries.
In a statement shared with TechCrunch, the FBI confirmed it has “recently observed” cyberattacks resembling Scattered Spider’s tactics specifically targeting airlines.
Executives from Google Mandiant and Palo Alto Networks’ Unit 42 have independently verified this surge in activity within the aviation threat landscape.
Scattered Spider Attack Patterns
Detail | Description | Source |
Hacker group name | Scattered Spider | FBI |
New target sector | Airlines, transportation | TechCrunch |
Tactics used | Phishing, social engineering, impersonation, extortion, threats | Mandiant |
Recent airline victims | WestJet (June 13), Hawaiian Airlines (June 27) | CBC |
Nature of risk | Includes large corporations and third-party IT vendors | FBI |
An Expanding Cyber Threat: From Casinos to Cockpits
Scattered Spider, believed to be composed of English-speaking young adults and teenagers, has been responsible for a series of high-profile intrusions across sectors. Initially known for attacks on hotel chains, casinos, and tech giants, the group now poses a direct threat to the global transportation infrastructure.
Their typical modus operandi includes:
- Social engineering: Impersonating IT staff to gain trust
- Phishing campaigns: Targeted messages designed to lure credentials
- Threats and extortion: Intimidating support staff or demanding ransom
- Third-party infiltration: Exploiting smaller vendors to access core systems
With this shift, Scattered Spider is now exploiting vulnerabilities in aviation IT networks, including those managed by vendors, contractors, and third-party platforms.
Recent Breaches: Hawaiian Airlines and WestJet Under Siege
The threat warning follows confirmed cyber intrusions this month at two major carriers:
- Hawaiian Airlines reported a cyber incident on June 27. While customer data compromise has not been confirmed, the airline noted that system hardening efforts are underway.
- WestJet, Canada’s second-largest airline, disclosed an ongoing breach on June 13. According to media reports, the attack has been linked to Scattered Spider, although full attribution is pending.
Both airlines are reportedly working with federal and private-sector investigators, but disruptions are ongoing. WestJet in particular has faced persistent issues restoring back-end services, raising concerns over potential ransomware deployment.
Why Airlines Are Vulnerable Now
Airlines operate in highly digitized, globally integrated ecosystems with multiple third-party dependencies—from ground services to IT contractors—creating numerous access points for hackers.
According to the FBI, “anyone in the airline ecosystem, including trusted vendors and contractors, could be at risk.” This increases the threat surface beyond the airline itself, highlighting the supply chain vulnerabilities that attackers frequently exploit.
As aviation companies modernize their systems and adopt AI-driven operations, the balance between innovation and cyber resilience is growing ever more precarious.
Financial Motive, Adversarial Creativity
Unlike state-sponsored groups with political aims, Scattered Spider is a financially motivated collective. Their tactics are low-cost but high-impact, often focusing on:
- Credential harvesting
- Network penetration and data exfiltration
- Double extortion: Demanding ransom while threatening to release data publicly
These attackers have previously launched campaigns against retail, insurance, and hospitality industries—causing tens of millions in operational disruptions and financial loss.
As they now target airlines and critical transportation infrastructure, the stakes are considerably higher, raising alarms across cybersecurity, regulatory, and national defense sectors.
Industry Response and Recommendations
In response to the growing threat, cybersecurity firms and federal agencies are urging aviation firms to adopt the following immediate actions:
- Zero trust architecture: Limit lateral movement inside networks
- Vendor access audits: Re-assess permissions and credentials for third-party systems
- Incident response playbooks: Rehearse and revise breach response procedures
- Multi-factor authentication (MFA): Mandatory for internal and external access
- Cyber hygiene training: Especially for help desk and remote support staff
For aviation companies operating across borders, regulatory compliance (e.g., GDPR, CISA guidelines, Transport Canada frameworks) must also now include provisions for active threat intelligence sharing.
Conclusion: Cyber Resilience Now Mission-Critical
With Scattered Spider expanding its reach into the aviation sector, airlines can no longer afford to see cybersecurity as a back-office function. Customer safety, flight operations, and brand reputation now hinge on digital resilience. As attacks become more deceptive, collaborative, and economically damaging, proactive defenses must keep pace—or risk being grounded by unseen adversaries.