AerCap Sees Ransomware Attack | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Most Recent Daily Episodes

Episode Date

Airborne-Monday

Airborne-Tuesday

Airborne-Wednesday Airborne-Thursday

Airborne-Friday

Airborne On YouTube

Airborne-Unlimited-12.01.25

AirborneNextGen-
12.02.25

Airborne-Unlimited-12.03.25

Airborne-FltTraining-12.04.25

AirborneUnlimited-12.05.25

AFE 2025 LIVE MOSAIC Town Hall (Archived): www.airborne-live.net

Fri, Jan 26, 2024

AerCap Sees Ransomware Attack

Aircraft Lessor Hit with 1-Terabyte Hack from 'Slug' Group

AerCap confirmed a ransomware attack in a filing with the US Securities and Exchange Commission, stating that the firm was robbed of 1 terabyte of data by the "Slug" group.

The group has threatened to slowly trickle out releases of the data unless AerCap pays their ransom, setting a 2-week deadline to begin paying. The leak plans appear to have 5 gigabytes published after 3 days of non-payment, 30 gigs after a week, with the rest of the data published at the end of the 2-week term. No indication has been given of how much the ransom sits at.

Slug seemed like a small-timer at first, with only the AerCap caper to their hame,but things have a way of moving quickly in the ransomware space. Unlike the usual method of exploiting weaknesses and encrypting the data and systems of a target, Slug opted for a less invasive and hands-off method. They merely copied internal AerCap data without encrypting anything, allowing the firm to continue on with business as usual. (By ransomware standards, it's a courtesy, though the extortion angle mitigates the kindness quite a bit.) The only drive to enforce ransom payment is the fear of public disclosure of their internal documentation. The company hasn't been too noisy about the hack, and their tone so far appears nonplussed about the whole affair.

In their Form K-6 to the SEC, AerCap gave a brief overview of the event. "On January 17, 2024, we experienced a cybersecurity incident related to ransomware. We promptly took steps to investigate with the support of third-party cybersecurity experts and notified law enforcement. We have full control of all of our IT systems and to date, we have suffered no financial loss related to this incident. Our investigation into this incident, including the extent to which data may have been exfiltrated or otherwise impacted, remains ongoing."

FMI: www.aercap.com

Advertisement

More News

Aero-FAQ: Dave Juwel's Aviation Marketing Stories -- ITBOA BNITBOB

Dave Juwel's Aviation Marketing Stories ITBOA BNITBOB ... what does that mean? It's not gibberish, it's a lengthy acronym for "In The Business Of Aviation ... But Not In The Busine>[...]

NTSB Prelim: Rutan Long-EZ

The Pilot Attempted Several Times To Restart The Engine And Diverted To Long Beach Airport/Daughtery Field On October 20, 2025, about 1603 Pacific daylight time, an experimental am>[...]

ANN's Daily Aero-Term (12.05.25): Hazardous Weather Information

Hazardous Weather Information Summary of significant meteorological information (SIGMET/WS), convective significant meteorological information (convective SIGMET/WST), urgent pilot>[...]

Aero-News: Quote of the Day (12.05.25)

"The latest development underscores the government of Malaysia’s commitment in providing closure to the families affected by this tragedy..." Source: From statements made by >[...]

Airborne-Flight Training 12.04.25: Ldg Fee Danger, Av Mental Health, PC-7 MKX

Also: IAE Acquires Diamond Trainers, Army Drones, FedEx Pilots Warning, DA62 MPP To Dresden Tech Uni The danger to the flight training industry and our future pilots is clear. Dona>[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2025 Web Development & Design by Pauli Systems, LC