• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Charon Ransomware targets Middle East with APT attack methods

 | 

Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach

 | 

SAP fixed 26 flaws in August 2025 Update, including 4 Critical

 | 

August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

 | 

Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

 | 

Chrome sandbox escape nets security researcher $250,000 reward

 | 

Smart Buses flaws expose vehicles to tracking, control, and spying

 | 

MedusaLocker ransomware group is looking for pentesters

 | 

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • Data Breach
  • Hacking
  • Intelligence
  • International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists

International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists

Pierluigi Paganini February 05, 2025

The International Civil Aviation Organization (ICAO) is investigating a data breach affecting system and employee security.

The International Civil Aviation Organization (ICAO), a specialized agency of the United Nations, is investigating a significant data breach that has raised concerns about the security of its systems and employees data. In the updated statement published by ICAO, the agency said it is “actively investigating reports of a potential information security incident allegedly linked to a threat actor known for targeting international organizations.”

This comes after an individual claimed in a January 5 post on a popular hacking forum to have accessed 42,000 documents from ICAO, including personal information (PII).

“ICAO has confirmed that the reported information security incident involves approximately 42,000 recruitment application data records from April 2016 to July 2024 claimed to be released by the threat actor known as Natohub.” reads the statement published by the International Civil Aviation Organization. “After completing careful review of the data, ICAO can now confirm that 11,929 individuals are affected. ICAO is now reaching out to these individuals.”

From this perspective, the actors were interested not in disrupting specific IT/OT processes, but in acquiring targeted intelligence about specific individuals and their digital identity information. Such tactics are pertinent to traditional espionage and human intelligence (HUMINT), where cyberspace is a key channel for obtaining interest data. After completing a careful review of the data, ICAO confirmed that 11,929 individuals were affected. The compromised data includes recruitment-related information that applicants entered into the compromised system, such as names, email addresses, dates of birth, and employment history.

Shortly after the ICAO incident, Resecurity identified threat actors targeting the ACAO (Arab Civil Aviation Organization). As a result of a successful SQL injection exploitation in a vulnerable web application, records of staff/members and their credentials were exfiltrated. Multiple victims identified in the stolen data set included Safety Aviation Specialists and Incident Investigators. Such experts have a first-hand knowledge from the field and may be involved in sensitive communications. Traditional cybercriminal actors would not be interested in it due to the relatively low probability of monetization for profit via Dark Web markets, besides the opportunity to sell it to state-sponsored actors looking for specific targets of interest. Considering the tight timing of the recently disclosed ICAO incident, such a trend of targeting (international aviation organizations) is concerning.

Resecurity has notified the affected agency and shared the acquired data dump, which resulted from threat actors’ investigation. The data breach has not been previously disclosed. While specific details about the nature of the leaked data and the extent of the breach remain unclear, the incident highlights ongoing vulnerabilities within aviation organizations. The observed data set includes logins (usernames), hashes of passwords, emails, titles, and communications. Similar to the ICAO incident, the data has been leaked via one of the popular Dark Web communities on February 4, 2024.

The leaked data set identified representatives of the Qatar Aircraft Accident and Incident Investigation Unit (QAAI), the Aviation Investigation Bureau (AIB) of the Kingdom of Saudi Arabia, the Iran Civil Aviation Authority, the Jordan Civil Aviation Regulatory Commission (CARC), and various members of the Aviation Accident Investigation Division (AAID).

Notably, last year was extremely challenging due to the number of significant aviation incidents, some of which triggered a complicated geopolitical narrative based on the circumstances and the root cause investigation. The correlation with the newly disclosed malicious cyber activity targeting aviation safety experts at the beginning of Q1 2025 creates a precedent. It requires increased attention to protecting critical infrastructure and relevant organizations.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, International Civil Aviation Organization (ICAO))


facebook linkedin twitter

aviation Cybercrime data breach Hacking hacking news information security news International Civil Aviation Organization (ICAO) IT Information Security Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini August 13, 2025
Charon Ransomware targets Middle East with APT attack methods
Read more
Pierluigi Paganini August 13, 2025
Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Charon Ransomware targets Middle East with APT attack methods

    Malware / August 13, 2025

    Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach

    Data Breach / August 13, 2025

    SAP fixed 26 flaws in August 2025 Update, including 4 Critical

    Uncategorized / August 13, 2025

    August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

    Hacking / August 12, 2025

    Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

    Hacking / August 12, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT