Incident Analysis

Airports Authority of India Ransomware Attack 2023: Systems Compromised, Passenger Data at Risk

In 2023, the Airports Authority of India (AAI) — the state agency responsible for managing over 100 airports across India — confirmed that ransomware had compromised its systems. The attack put passenger data at risk and disrupted operational systems at affected airports. The incident joined a growing list of significant aviation sector ransomware attacks and demonstrated that state-owned airport authorities are not immune to the ransomware threat facing the broader aviation sector. For aviation cybersecurity professionals globally, the AAI incident is significant not only as a data point on the frequency of aviation ransomware but as a demonstration of the particular risks that large, complex government aviation organisations face — legacy systems, constrained IT budgets, and vast data holdings.

Airports Authority of India ransomware attack 2023: systems at one of the world's largest airport authorities compromised, demonstrating that government aviation bodies face the same ransomware threat as commercial operators.

The Airports Authority of India: Scale and Data Holdings

To understand the significance of the AAI incident, consider the scale of the organisation:

  • AAI manages over 100 airports across India including major international hubs
  • The organisation handles hundreds of millions of passengers annually across its airport network
  • AAI systems hold passenger data, flight operational data, infrastructure management data, and financial records at significant scale
  • As a government entity, AAI operates legacy IT infrastructure across its network — older systems that are harder to patch and protect than modern platforms
  • Multiple third-party operators, airlines, and service providers connect to AAI systems — creating a complex supply chain risk surface

Passenger Data Risk in Government Airport Authority Attacks

Ransomware attacks on airport authorities carry a specific passenger data risk dimension. Government airport management bodies accumulate significant passenger data through:

  • Passenger processing systems: Check-in, immigration support, and departure control data flowing through AAI-managed systems
  • CCTV and biometric data: Government airports increasingly deploy biometric systems — facial recognition, fingerprint — creating special category data holdings
  • Security screening data: Passenger screening records, including enhanced screening outcomes and associated personal data
  • Operational records: Flight manifests, passenger name records, and travel history data held for regulatory compliance
  • Staff data: Employee personal data across AAI's large workforce, including sensitive security clearance records

Why Government Airport Authorities Are Attractive Ransomware Targets

Government aviation bodies present a specific risk profile that makes them attractive targets for ransomware operators:

  • Limited IT security investment: Government IT budgets often lag behind the private sector — legacy systems, underfunded security teams, and slower patching cycles
  • Operational criticality: Disrupting a government airport authority directly impacts flight operations and passenger movement — creating pressure to restore systems quickly
  • Large data holdings: Extensive passenger data creates both leverage (threat of data disclosure) and potential for secondary monetisation
  • Complex procurement environments: Government procurement processes make rapid deployment of modern security tooling difficult
  • Political sensitivity: Attacks on government aviation infrastructure attract political and media attention — increasing the reputational pressure on the affected organisation

Implications for UK and EU Airport Authorities

The AAI incident carries direct implications for airport authorities operating under CAA CAP 1753 and EASA Part-IS frameworks:

  • Legacy system risk: Many UK and EU airport authorities operate legacy systems comparable to AAI — old software, outdated infrastructure, and unpatched vulnerabilities
  • Regulatory obligations: UK airports classified as OES under NIS Regulations have binding security and incident reporting obligations that the AAI incident illustrates the cost of failing to meet
  • Passenger data GDPR exposure: A comparable attack on a UK airport authority would likely trigger ICO investigation under the framework established by the British Airways enforcement
  • Supply chain exposure: Airlines, ground handlers, and service providers connecting to airport authority systems are exposed to risks from authority system compromise
  • NIS2 for EU airport authorities: EU airport authorities under NIS2 face mandatory security measures and 24-hour incident reporting — demonstrating the regulatory cost of incidents like the AAI attack

Frequently Asked Questions

Was flight safety affected by the AAI ransomware attack?

Publicly available information does not indicate that safety-critical air traffic control systems were affected by the 2023 AAI ransomware incident. Safety-critical ATC and navigation systems are typically maintained on isolated, dedicated infrastructure separate from general IT networks — though the Boryspil Airport incident demonstrates that this separation is not always adequate. The disruption in the AAI case appeared to primarily affect administrative and passenger-facing operational systems rather than safety-critical infrastructure.

What regulatory reporting requirements would apply to a comparable attack on a UK airport authority?

A ransomware attack on a UK airport authority would trigger multiple reporting obligations: notification to the CAA under NIS Regulations (for OES-designated airports); notification to the ICO within 72 hours if personal data was affected; NCSC notification for significant attacks on critical national infrastructure; and potentially police/NCA reporting. The airport authority's accountable manager and board would be expected to take personal responsibility for the response and ensure regulatory obligations are met within required timeframes.

How should airport authorities prioritise cybersecurity investment given constrained budgets?

Constrained-budget airport authorities should prioritise: (1) MFA on all remote access, email, and administrative systems — high impact, relatively low cost; (2) Network segmentation to isolate passenger-facing systems from operational and OT systems; (3) Immutable or offline backups of critical systems with tested recovery; (4) Patch management — systematic application of operating system and application security patches; (5) Staff phishing awareness training. These five controls address the most common attack vectors and are achievable within realistic public sector IT budgets.

Get a cybersecurity assessment for your airport

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Featured Product

Coro

Learn more

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.