Everest Ransomware Says It Stole 1.5M Dublin Airport Passenger Records – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Everest Ransomware Says It Stole 1.5M Dublin Airport Passenger Records – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Today, the Everest ransomware group published listings for two new victims, Dublin Airport and Air Arabia, on its dark web leak site. This announcement comes just days after the group claimed responsibility for breaching AT&T Careers, alleging the theft of 576,000 records containing personal details of applicants and employees.

Like the AT&T listing, both the Dublin Airport and Air Arabia entries are password-protected. This means the information is locked behind a password and instructs company representatives to “follow instructions” before a deadline expires. The password protection suggests that the full dataset is not yet available for public download or preview and that Everest is restricting access under certain conditions.

Dublin Airport

According to the group’s claims, the Dublin Airport breach includes approximately 1,533,900 personal records, including passenger data. The listing shared by the group shows data fields with detailed passenger and flight-related information that could be used to identify travellers and their travel activity. This includes the following:

  1. Full name
  2. Flight date
  3. Passenger ID
  4. Seat number
  5. Flight number
  6. Departure airport code
  7. Destination airport code
  8. Fast track or priority status
  9. Compartment or travel class
  10. Timestamp and barcode format
  11. Departure date and workstation ID
  12. Frequent flyer airline, number, and tier
  13. Operating carrier and marketing carrier
  14. Sequence number and passenger status
  15. Version number and number of segments
  16. Airline designator of the boarding pass issuer
  17. Free baggage allowance and baggage tag numbers
  18. Date of issue of the boarding pass and document type
  19. Airline numeric code and document form serial number
  20. Source of check-in and source of boarding pass issuance
  21. Device name, device ID, and device type used for check-in
  22. First and second non-consecutive baggage tag plate numbers
  23. Selectee indicator and international document verification status

The following screenshot from the Everest ransomware group’s dark web site shows Dublin Airport listed as a victim, along with details of the data the group claims to have stolen:

(Image credit: Hackread.com).

Air Arabia

For Air Arabia, a low-cost airline based in the United Arab Emirates with its main hub at Sharjah International Airport, Everest claims to possess personal details of more than 18,000 employees.

No other information or sample data has been provided by the group. However, in both cases, the group has given the companies six days to contact them before the stolen data is released online.

Everest Ransomware Group Lists Dublin Airport and Air Arabia as New Victims
Air Arabia is listed as a new victim of the Everest’s website (Image credit: Hackread.com)

Aviation Industry: The New Niche Target of the Everest Ransomware Group?

The Everest ransomware group is known for leaking stolen databases and making extortion demands. Since 2021, the group has listed hundreds of victims, including Coca-Cola and Mailchimp, and is known for targeting corporate databases, employee records, customer information, and financial data.

However, for the last couple of both, it has been targeting the aviation industry. In September this year, a cyberattack caused widespread disruption across several major European airports, affecting check-in systems and passenger processing. The incident was linked to a system outage involving Collins Aerospace, a key provider of airport and airline check-in technology.

Airports, including London Heathrow, Berlin, and Brussels, were among those impacted, leading to delays and operational slowdowns. While UK authorities arrested a 40-year-old man in West Sussex this week in connection with the attack, the Everest ransomware group claimed responsibility for targeting Collins Aerospace.

The group published its claims on its dark web domain on October 7 2025, stating it had breached the company’s systems and accessed sensitive data. In a detailed post titled “MUSE-INSECURE: Inside Collins Aerospace’s Security Failure,” the Everest group described how it allegedly gained access to Collins Aerospace’s systems through an exposed FTP server using easy-to-guess credentials.

Everest Ransomware Group Lists Dublin Airport and Air Arabia as New Victims
Collins Aerospace is listed as a victim by the Everest Ransomware Group (Image credit: Hackread.com).

According to the group, the server contained documents linked to airline operations and passenger data. Everest claims it downloaded large amounts of information between September 10 and 11 before access was cut off, suggesting the company’s monitoring systems detected the breach.

The group also stated that it contacted Collins Aerospace through a negotiator on September 16, but communication stalled soon after. It further alleged that the company later shut down critical servers related to air travel processes on September 19, which led to disruptions across multiple European airports.

Everest accused the company of poor internal coordination and downplaying the scale of the breach, while denying that it deployed ransomware in this attack.

Nevertheless, as for Dublin Airport and Air Arabia, Hackread.com will continue to monitor for official statements from both organisations, any sample data releases, and credible third-party analyses. If you believe you may be affected, follow recommended protective measures and await official guidance from Dublin Airport, Air Arabia, or the relevant authorities.





Source link