Security

Seattle airport 'possible cyberattack' snarls travel yet again

No word yet on if ransomware is to blame


The Port of Seattle, which operates the Seattle-Tacoma International Airport, is investigating a "possible cyberattack" after computer outages disrupted the airport's operations and delayed flights.

The internal internet and web systems outage occurred early Saturday morning, according to an Xeet by the official account belonging to the airport, which serves as a traffic hub for Alaska Airlines and Delta Air Lines. 

In a subsequent Xeet, the Port of Seattle confirmed it had "isolated critical systems and is in the process of working to restore full service and do not have an estimated time for return."

The disruptions continued through Sunday, with the airport urging travelers to check in before arriving at Sea-Tac, and give themselves extra time to get to their gates. We're told terminal screens were also experiencing technical difficulties, adding to the disruption.

Airport goers reported long lines as multiple airlines issued tickets by hand, and local media said "thousands" of travelers were affected.

As of Monday, the Port's website remained offline. While airport and port authorities did not immediately respond to The Register's inquiries about the cyberattack, including whether it was a ransomware infection, the transportation authorities told ABC that the federal government was involved in the probe.

"We are conducting a thorough investigation with the assistance of outside experts," Lance Lyttle, aviation managing director at Seattle-Tacoma International Airport, said in a statement. 

"We have contacted and are working closely with federal partners, including TSA and Customs and Border Protection," Lyttle added.

A CISA spokesperson told The Register: "CISA is aware and working with our stakeholders in monitoring the incident."

The likely cyberattack comes as ransomware gangs batter critical infrastructure including transportation organizations. 

Of the 395 ransomware attacks claimed by criminals in July, more than a third (125 or 34 percent) targeted these critical industries, according to NCC Group. 

The researchers noted that these essential services and facilities make them "valuable targets" to financially motivated criminals, and said "ransomware actors pressure these targets into payment, exploiting their need to remain operational."

Plus, to make matters worse for weary travelers, the weekend cyberattack comes a month after a faulty CrowdStrike update caused a global outage that also snarled flights at airports around the world. ®

Send us news
11 Comments

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals

Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom

Sordid search history 'evidence' in case that could see him spend 35 years for extortion and wire fraud

AMD internal data reportedly offered for sale

Second sensitive info theft claimed by the same crims since June