Heathrow Airport, alongside several major European airports, experienced significant flight delays and cancellations following a cyberattack on September 19, 2025, which disrupted electronic check-in and baggage handling systems. The attack targeted the MUSE software provided by Collins Aerospace, a system used by multiple airlines to facilitate shared check-in desks and boarding gates. According to the airport’s initial communication, the disruption was described as a "technical issue," but further details revealed its cyber-related nature, prompting operational adjustments including manual check-in and boarding processes to mitigate passenger impact.
Brussels Airport reported some of the most severe consequences, cancelling nine flights and advising airlines to reduce departing flights by half between September 20 and September 22 to manage ongoing system issues. Passengers faced long queues and extended wait times as baggage tagging and check-in procedures reverted to manual methods. In contrast, Heathrow’s operations were reported to be less severely affected, with British Airways utilising backup systems to maintain service continuity, though most other airlines at the airport experienced disruptions. Berlin’s Brandenburg Airport also noted delays and longer waiting times due to the system outage.
The parent company of Collins Aerospace, RTX, acknowledged the cyber disruption and confirmed efforts to resolve the issue as swiftly as possible. They emphasised the impact was limited to electronic check-in and baggage drop-off systems, which could be alleviated through manual operations. Industry observers point to the attack exposing vulnerabilities in the aviation sector’s reliance on third-party digital infrastructure. Travel journalist Simon Calder told the BBC that disruptions at interconnected hubs like Heathrow could have cascading effects, affecting flight connections and the broader network.
Passengers conveyed the frustration caused by the delays and operational uncertainty. For instance, some reported lengthy queues exceeding two hours, with passengers being checked in manually over the phone, only to face boarding pass scanning issues at gates. Accessibility challenges were also highlighted, such as a passenger unable to secure necessary mobility assistance due to system outages.
Cybersecurity experts have speculated on the nature of the attack, with some suggesting it might be a ransomware incident—though the origin remains unclear. While there have been unfounded allegations linking the breach to Kremlin-sponsored hackers, the consensus among analysts is that recent cyberattacks on critical infrastructure are more commonly perpetrated by financially motivated criminal groups operating globally. Many known hacking groups are based in Russia or former Soviet states, though arrests worldwide suggest a diverse geography of cybercriminal activity, including actors from the UK and the US.
This incident follows other notable technological disruptions impacting UK airports in recent years, including border control system outages in 2024 that caused passport processing delays but were not attributed to cyberattacks. The recurring technological vulnerabilities and coordination complexities underline the importance of robust and resilient systems within the aviation industry to safeguard operational integrity and passenger experience against evolving cyber threats.
Heathrow has deployed additional staff to support check-in areas and advised passengers to verify flight statuses with their airlines before travelling, aiming to ease the disruption during this period. Transport Secretary Heidi Alexander confirmed government monitoring of the situation and efforts to receive regular updates on the unfolding event.
The broader European aviation network continues to manage the fallout from the cyberattack, underscoring the critical need for enhanced cybersecurity measures across the sector to prevent future incidents that can severely disrupt air travel and airport operations.
📌 Reference Map:
- Paragraph 1 – [1], [4], [6]
- Paragraph 2 – [1], [2], [3]
- Paragraph 3 – [1], [2], [4]
- Paragraph 4 – [1]
- Paragraph 5 – [1]
- Paragraph 6 – [1]
- Paragraph 7 – [1], [5]
- Paragraph 8 – [1], [6], [7]
Source: Noah Wire Services