Heathrow and the MUSE Cyberattack: More Than Just Airport Delays
News and information from the Advent IM team.
When Heathrow and several other major European airports found themselves plunged into long queues, manual check-ins and delayed flights this September, the headlines focused on passenger disruption. The underlying story is more complex, and its implications reach far beyond irritated travellers.
The disruption stemmed from a cyberattack on MUSE (Multi-User System Environment), a shared platform developed by Collins Aerospace and used by airlines and airports to handle check-in, baggage and boarding. With MUSE offline, airports had little choice but to revert to paper and patience.
That surface story is only the beginning. This incident shines a light on systemic vulnerabilities in aviation and in the way we govern technology in critical national infrastructure.
A single point of failure
Shared platforms like MUSE deliver efficiency and scalability. One vendor system allows dozens of airlines to share desks, kiosks and gates. But efficiency comes with concentration risk. When MUSE failed, the failure cascaded across airports in multiple countries at once. For many organisations, this will be a wake-up call: vendor concentration isn’t simply a cost issue – it’s a strategic risk.
The unintended consequences
The obvious problems were queues and cancellations. The less visible consequences may prove more costly:
Beyond the check-in desk
The pressing question now is whether the attack was contained to MUSE or if it provided attackers with a foothold elsewhere.
Airports are complex ecosystems of interconnected networks: from baggage handling and retail systems to access control and fuel pumps. If segmentation is weak, a compromise in one system can provide pathways into others.
Vendor access rights create further risk. Shared platforms often mean shared credentials and remote access arrangements. If these were abused, attackers could attempt to pivot deeper into airport networks.
There’s also the prospect of data exposure. Passenger manifests, staff rosters or operational diagrams are valuable targets. Even if the immediate attack was focused on disruption, it may have doubled as reconnaissance for future campaigns.
What comes next
The most likely developments include:
If attribution identifies criminal groups, the focus will be resilience and recovery. If state involvement is suggested, the political consequences will stretch far wider than aviation.
The bigger lesson
The Heathrow incident is not just an IT disruption; it’s a governance problem. It demonstrates the fragility of shared systems when vendor resilience is taken on trust. It shows how operational efficiency can tip into systemic risk. And it underlines the importance of treating supply-chain dependencies as core to enterprise risk management, not as a footnote.
For Government, Defence and critical national infrastructure, the message is unavoidable: shared systems that underpin essential services must be stress-tested, regulated, and continuously assured. Trust without verification is not resilience.
By Ellie Hurst, Commercial Director.