• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 

China-linked group Salt Typhoon breached satellite firm Viasat

 | 

Iran experienced a near-total national internet blackout

 | 

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

 | 

Healthcare services company Episource data breach impacts 5.4 Million people

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • Data Breach
  • Hacking
  • Intelligence
  • International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists

International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists

Pierluigi Paganini February 05, 2025

The International Civil Aviation Organization (ICAO) is investigating a data breach affecting system and employee security.

The International Civil Aviation Organization (ICAO), a specialized agency of the United Nations, is investigating a significant data breach that has raised concerns about the security of its systems and employees data. In the updated statement published by ICAO, the agency said it is “actively investigating reports of a potential information security incident allegedly linked to a threat actor known for targeting international organizations.”

This comes after an individual claimed in a January 5 post on a popular hacking forum to have accessed 42,000 documents from ICAO, including personal information (PII).

“ICAO has confirmed that the reported information security incident involves approximately 42,000 recruitment application data records from April 2016 to July 2024 claimed to be released by the threat actor known as Natohub.” reads the statement published by the International Civil Aviation Organization. “After completing careful review of the data, ICAO can now confirm that 11,929 individuals are affected. ICAO is now reaching out to these individuals.”

From this perspective, the actors were interested not in disrupting specific IT/OT processes, but in acquiring targeted intelligence about specific individuals and their digital identity information. Such tactics are pertinent to traditional espionage and human intelligence (HUMINT), where cyberspace is a key channel for obtaining interest data. After completing a careful review of the data, ICAO confirmed that 11,929 individuals were affected. The compromised data includes recruitment-related information that applicants entered into the compromised system, such as names, email addresses, dates of birth, and employment history.

Shortly after the ICAO incident, Resecurity identified threat actors targeting the ACAO (Arab Civil Aviation Organization). As a result of a successful SQL injection exploitation in a vulnerable web application, records of staff/members and their credentials were exfiltrated. Multiple victims identified in the stolen data set included Safety Aviation Specialists and Incident Investigators. Such experts have a first-hand knowledge from the field and may be involved in sensitive communications. Traditional cybercriminal actors would not be interested in it due to the relatively low probability of monetization for profit via Dark Web markets, besides the opportunity to sell it to state-sponsored actors looking for specific targets of interest. Considering the tight timing of the recently disclosed ICAO incident, such a trend of targeting (international aviation organizations) is concerning.

Resecurity has notified the affected agency and shared the acquired data dump, which resulted from threat actors’ investigation. The data breach has not been previously disclosed. While specific details about the nature of the leaked data and the extent of the breach remain unclear, the incident highlights ongoing vulnerabilities within aviation organizations. The observed data set includes logins (usernames), hashes of passwords, emails, titles, and communications. Similar to the ICAO incident, the data has been leaked via one of the popular Dark Web communities on February 4, 2024.

The leaked data set identified representatives of the Qatar Aircraft Accident and Incident Investigation Unit (QAAI), the Aviation Investigation Bureau (AIB) of the Kingdom of Saudi Arabia, the Iran Civil Aviation Authority, the Jordan Civil Aviation Regulatory Commission (CARC), and various members of the Aviation Accident Investigation Division (AAID).

Notably, last year was extremely challenging due to the number of significant aviation incidents, some of which triggered a complicated geopolitical narrative based on the circumstances and the root cause investigation. The correlation with the newly disclosed malicious cyber activity targeting aviation safety experts at the beginning of Q1 2025 creates a precedent. It requires increased attention to protecting critical infrastructure and relevant organizations.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, International Civil Aviation Organization (ICAO))


facebook linkedin twitter

aviation Cybercrime data breach Hacking hacking news information security news International Civil Aviation Organization (ICAO) IT Information Security Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini June 24, 2025
The U.S. House banned WhatsApp on government devices due to security concerns
Read more
Pierluigi Paganini June 24, 2025
Russia-linked APT28 use Signal chats to target Ukraine official with malware
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    The U.S. House banned WhatsApp on government devices due to security concerns

    Mobile / June 24, 2025

    Russia-linked APT28 use Signal chats to target Ukraine official with malware

    APT / June 24, 2025

    China-linked APT Salt Typhoon targets Canadian Telecom companies

    APT / June 24, 2025

    U.S. warns of incoming cyber threats following Iran airstrikes

    Cyber warfare / June 24, 2025

    McLaren Health Care data breach impacted over 743,000 people

    Data Breach / June 23, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT