Threat Intelligence

The Underground Economist: Volume 5, Issue 19

by ZeroFox Intelligence
The Underground Economist: Volume 5, Issue 19
10 minute read

Cyberattacks on European Airports Reveal Contagion Risk

Over the weekend of September 19–21, 2025, a cyberattack caused widespread operational disruption at major European airports, resulting in a host of flight cancellations and delays. The attack reportedly targeted the Multi-User System Environment (MUSE) passenger processing software provided by Collins Aerospace, forcing airlines and ground services to revert to manual check-in and boarding procedures.1

  • On September 22, 2025, the European Union Agency for Cybersecurity (ENISA) confirmed that the cause of the disruption was a ransomware attack but did not disclose the threat actor behind it.2
  • Collins Aerospace is a U.S.-based aviation and defense technology company—with a global presence at more than 170 airports—that offers solutions for passenger processing and facilitation, airport operations, and baggage management.3

In a statement to Reuters, RTX Corporation (formerly Raytheon Technologies Corporation), the parent company of Collins Aerospace, stated that it was aware of the cyber disruptions at certain airports without specifying which ones; however, several airports in the region have since reported being affected by the software disruptions. Heathrow Airport in London (Europe’s busiest airport), Brussels Airport, Berlin Brandenburg Airport, Dublin Airport, and Cork Airport have also revealed varying degrees of impact.4

In previous systems, each airline managed its own dedicated service area in an airport, making access singular and contained to the airline itself. However, in recent years, concerns regarding efficiency have caused several airports to shift toward newer systems like MUSE, a shared-use platform that integrates passenger records, baggage details, and security requirements into one digital platform used across airlines to enable dynamic desks and gates within airports.5 

  • This change underpins the increased likelihood of vulnerabilities to European aviation, as an attack on one entity could impact multiple airports, unlike the previous system, wherein threat actors would only be able to target airlines individually.
  • As a result of MUSE’s compromise, every airline in an impacted airport likely could not access their shared digital framework, forcing them to rely on often cumbersome and time-consuming manual check-ins.
  • Due to the check-in disruptions, several airports experienced subsequent delays and flight cancellations, which are likely to persist if airlines continue to experience prolonged digital limitations.

As of writing, no threat actor has claimed responsibility for the attack. The attribution details—such as the ransomware strain or the threat actor responsible—have not yet been made public, and it remains unclear whether a third-party vendor or Collins Aerospace itself was targeted. There is currently no evidence to suggest a data breach has taken place or that passenger data has been compromised; however, digital forensic analysis is reportedly ongoing.6 

This attack highlights a critical vulnerability in the IT infrastructure used in the aviation industry, especially where third-party systems support multiple airports and airlines. The airline industry likely faces significant pressure to quickly meet ransomware demands, as customer satisfaction and maintaining scheduled flight times are crucial to its business model. It is likely that airport authorities and affected airlines will face pressure to reassess cyber resilience standards and supply chain risk management as a result of this attack.

Salesforce Business Account Advertised for Sale

On September 9, 2025, an actor known as “zoominfo” advertised unauthorized access to an unnamed Salesforce business account on the primarily Russian-language dark web forum RAMP. According to the actor, the account and data allegedly belongs to an undisclosed U.S.-based grocery retailer business with USD 68 million in transaction records and USD 9 million in its most recent accounts report.

  • The starting price is listed at USD 20,000, with bid increments of USD 2,000; however, an interested buyer can immediately purchase the access—without bidding—for USD 50,000.
  • The actor states that purchases can be made via escrow or middleman services, which are likely offered to increase zoominfo’s credibility and the perceived security of the purchase for potential buyers.

The actor zoominfo first appeared on the forum on August 21, 2025, and has zero reaction scores; as a newly registered account with limited presence on the platform, it is likely that potential buyers will be cautious about this advertisement. As such, ZeroFox cannot determine the legitimacy of the untested actor’s claims at this time.

  • Additionally, while this type of offer is common on the dark web, the extremely high price for such access is notably uncommon. There is a roughly even chance this signifies the actor’s inexperience, that it is a fraudulent offer, or that it is significantly overpriced due to the notoriety of the recent Salesforce breaches.

While the actor claims to have access to a Salesforce business account, zoominfo does not allude to the recent Salesforce breaches, nor is there any evidence to suggest that this alleged account is linked to the large-scale Salesforce breach; however, the possibility cannot entirely be ruled out. If the actor does possess full access to a business Salesforce account, that would very likely cause significant harm to the company and its customers.

New Trend Observed on Dark Web Forum

On September 8, 2025, the actor “CryptoCombiner” posted on the dark web forum Exploit, offering advice on what not to provide in advertisements to initial access brokers involved in cryptolockers campaigns, which are strictly prohibited on the forum. 

  • A cryptolocker campaign refers to a cybercrime operation that deploys a cryptolocker ransomware to infect victims’ computers, encrypt their files, and demand a ransom payment (typically in cryptocurrency) in exchange for the decryption key.
  • Ransomware campaigns have been prohibited on dark web forums Exploit and XSS since early 2022. This was mostly motivated by the DarkSide ransomware attack against Colonial Pipeline in May 2021, which garnered a lot of media and law enforcement (LE) attention.7
  • CryptoCombiner is one of the most vetted actors on Exploit, having joined in April 2022 and has made 488 posts as of the writing of this report.

In the post, CyptoCombiner listed elements not to provide in advertisements on the forum, including:

  • Annual or monthly income of the company. This is one of the primary indicators used by security researchers and LE officials to identify the victim company, as these figures can sometimes be unique to a particular organization.
  • Hospitals and medical facilities.
  • Administrative buildings (such as gas and water supply companies).
  • Schools and universities.
  • Domain access admins and pentesters.

When advertising initial access to a victim organization, threat actors have historically provided details such as those listed above about the alleged victim company. This is almost certainly done to provoke interest from other potential threat actors; however, it also provides security researchers and officials with significant information that they can use to notify the victim organization.

  • Notably, ZeroFox has observed that one of the most prominent initial access brokers on Exploit, “ProfessorKliq”, has recently started posting offers without mentioning any specific details other than the type of access and the associated price. This demonstrates the type of behavior advised by CryptoCombiner and is likely to be emulated by other threat actors on the forum.

A reduction in the amount of information that threat actors share about their targets will almost certainly make it more difficult for LE entities and security researchers to identify specific victims. One of the few remaining ways to identify a victim would be through direct communication with the seller, attempting to extract more details about the target. However, it is likely that this approach will cause sellers to be more cautious when dealing with potential buyers to further avoid detection.

New Android Botnet Advertised Dark Web Forum

On September 7, 2025, an actor using the alias “K1R0” posted on the dark web forum Exploit, advertising the sale of a new Android botnet called “Herodotus” for a monthly rental price of USD 4,000 (a test version is available for USD 700). K1R0 provided a list of specifications for the botnet, indicating Herodotus would enable users to:

  • Discreetly surveil everything the target does
  • Steal credentials, PINS, patterns, and messages
  • Control the device remotely
  • Hide and persist without detection
  • Obtain a host of personally identifiable information (PII), which would almost certainly be used for social engineering campaigns in further malicious campaigns.

Later, on September 16, 2025, K1R0 updated the thread, adding that Herodotus can disable Play Protect across Android versions and that it works well on Chinese phones as well. Further, K1R0 added that Herodotus can be used in conjunction with other botnets such as btmov/cracks, ermarc/hook, octo, hydra, tremendous, phoenix and teabot/ankras. The updated post with additional information was almost certainly an attempt to appeal to a wider target audience on the forum.

  • K1R0 joined Exploit on September 2, 2025, and has not been verified as of writing but has expressed interest in offering escrow, likely to boost their credibility. They have provided extensive details regarding the features of the botnet and the pricing, likely to establish legitimacy about their claims and increase buyer interest in the product.

Herodotus represents a sophisticated botnet that will likely generate significant interest from potential threat actors who are financially motivated or seeking to collect various PII in order to conduct a host of social engineering campaigns. Herodotus has likely been designed to allow even low-skilled attackers to use it, opening up a greater pool of threat actors. If legitimate, it is likely that Herodotus will cause significant financial damage against its targets and enable the exfiltration of sensitive data from mobile devices worldwide.

Recommendations

  • Develop a comprehensive incident response strategy.
  • Deploy a holistic patch management process, and ensure all IT assets are patched with the latest software updates as quickly as possible.
  • Adopt a Zero-Trust cybersecurity architecture based upon a principle of least privilege.
  • Implement network segmentation to separate resources by sensitivity and/or function.
  • Ensure critical, proprietary, or sensitive data is always backed up to secure, off-site, or cloud servers at least once per year—and ideally more frequently.
  • Implement secure password policies, phishing-resistant multi-factor authentication (MFA), and unique credentials.
  • Configure email servers to block emails with malicious indicators, and deploy authentication protocols to prevent spoofed emails.
  • Proactively monitor for compromised accounts and credentials being brokered in deep and dark web (DDW) forums.
  • Leverage cyber threat intelligence to inform the detection of relevant cyber threats and associated tactics, techniques, and procedures (TTPs).

Scope Note

ZeroFox Intelligence is derived from a variety of sources, including—but not limited to—curated open-source accesses, vetted social media, proprietary data sources, and direct access to threat actors and groups through covert communication channels. Information relied upon to complete any report cannot always be independently verified. As such, ZeroFox applies rigorous analytic standards and tradecraft in accordance with best practices and includes caveat language and source citations to clearly identify the veracity of our Intelligence reporting and substantiate our assessments and recommendations. All sources used in this particular Intelligence product were identified prior to 10:30 AM (EDT) on September 25, 2025; per cyber hygiene best practices, caution is advised when clicking on any third-party links.

ZeroFox Intelligence Probability Scale 

All ZeroFox intelligence products leverage probabilistic assessment language in analytic judgments. Qualitative statements used in these judgments refer to associated probability ranges, which state the likelihood of occurrence of an event or development. Ranges are used to avoid a false impression of accuracy. This scale is a standard that aligns with how readers should interpret such terms.


  1. hXXps://www.csoonline[.]com/article/4060804/european-airports-continue-to-crawl-after-a-cyberattack-on-collins-muse-systems.html
  2. hXXps://www.aa[.]com[.]tr/en/europe/eu-cybersecurity-agency-confirms-ransomware-attack-behind-airport-disruptions/3694832
  3. hXXps://www.collinsaerospace[.]com/what-we-do
  4. hXXps://www.reuters[.]com/en/cyberattack-causes-flight-delays-cancellations-brussels-airport-2025-09-20/
  5. hXXps://www.techtimes[.]com/articles/312010/20250920/software-behind-europes-check-chaos-what-muse-why-it-matters.html
  6. hXXps://www.reuters[.]com/business/aerospace-defense/european-airports-race-fix-check-in-glitch-after-hacking-disruption-2025-09-21/
  7. hXXps://www.cisa[.]gov/news-events/cybersecurity-advisories/aa21-131a

Tags: Threat Intelligence

See ZeroFox in action