AerCap Sees Ransomware Attack | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Most Recent Daily Episodes

Episode Date

Airborne-Monday

Airborne-Tuesday

Airborne-Wednesday Airborne-Thursday

Airborne-Friday

Airborne On YouTube

Airborne-Unlimited-05.20.24

Airborne-Unlimited-05.28.24

Airborne-FlightTraining-05.29.24 Airborne-Unlimited-05.30.24

Airborne-Unlimited-05.24.24

Fri, Jan 26, 2024

AerCap Sees Ransomware Attack

Aircraft Lessor Hit with 1-Terabyte Hack from 'Slug' Group

AerCap confirmed a ransomware attack in a filing with the US Securities and Exchange Commission, stating that the firm was robbed of 1 terabyte of data by the "Slug" group.

The group has threatened to slowly trickle out releases of the data unless AerCap pays their ransom, setting a 2-week deadline to begin paying. The leak plans appear to have 5 gigabytes published after 3 days of non-payment, 30 gigs after a week, with the rest of the data published at the end of the 2-week term. No indication has been given of how much the ransom sits at.

Slug seemed like a small-timer at first, with only the AerCap caper to their hame,but things have a way of moving quickly in the ransomware space. Unlike the usual method of exploiting weaknesses and encrypting the data and systems of a target, Slug opted for a less invasive and hands-off method. They merely copied internal AerCap data without encrypting anything, allowing the firm to continue on with business as usual. (By ransomware standards, it's a courtesy, though the extortion angle mitigates the kindness quite a bit.) The only drive to enforce ransom payment is the fear of public disclosure of their internal documentation. The company hasn't been too noisy about the hack, and their tone so far appears nonplussed about the whole affair.

In their Form K-6 to the SEC, AerCap gave a brief overview of the event. "On January 17, 2024, we experienced a cybersecurity incident related to ransomware. We promptly took steps to investigate with the support of third-party cybersecurity experts and notified law enforcement. We have full control of all of our IT systems and to date, we have suffered no financial loss related to this incident. Our investigation into this incident, including the extent to which data may have been exfiltrated or otherwise impacted, remains ongoing."

FMI: www.aercap.com

Advertisement

More News

ANN FAQ: Contributing To Aero-TV

How To Get A Story On Aero-TV News/Feature Programming How do I submit a story idea or lead to Aero-TV? If you would like to submit a story idea or lead, please contact Jim Campbel>[...]

ANN's Daily Aero-Linx (05.29.24)

Aero Linx: International Association of Professional Gyroplane Training (IAPGT) We are an Association of people who fly, build or regulate Gyroplanes, who have a dream of a single >[...]

ANN's Daily Aero-Term (05.29.24): NORDO (No Radio)

NORDO (No Radio) Aircraft that cannot or do not communicate by radio when radio communication is required are referred to as “NORDO.”>[...]

Airborne 05.28.24: Jump Plane Down, Starship's 4th, Vision Jet Problems

Also: uAvionix AV-Link, F-16 Viper Demo, TN National Guard, 'Staff the Towers' A Saturday afternoon jump run, originating from SkyDive Kansas City, went bad when it was reported th>[...]

ANN's Daily Aero-Term (05.30.24): Beyond Visual Line Of Sight (BVLOS)

Beyond Visual Line Of Sight (BVLOS) The operation of a UAS beyond the visual capability of the flight crew members (i.e., remote pilot in command [RPIC], the person manipulating th>[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2024 Web Development & Design by Pauli Systems, LC