Top aviation company Safran Group left itself vulnerable to cyberattacks, likely for well over a year, underlining how vulnerable big aviation firms are to threat actors, according to research by Cybernews.
The Cybernews research team recently discovered that the French-based multinational aviation company, the eighth largest aerospace supplier worldwide, was leaking sensitive data due to a misconfiguration of its systems. The vulnerability left the company at risk from cyberattacks over an extended period of time.
According to its own estimates, Safran Group’s revenue for 2022 was above €19 billion. It collaborates with Airbus, the second-largest aerospace company globally after Boeing, to manufacture aerospace equipment.
Safran is also involved in developing cutting-edge technologies beyond aviation, such as modules currently in use in the James Webb Telescope, the world’s largest optical telescope in space. Also, the company manufactures surface-to-air defense systems and missiles.
Cybernews reached out to Safran Group regarding the leak researchers found, and at the time of writing, the misconfiguration has been fixed.
Researchers found a publicly available environment file used by the beta deployment of the open-source video-calling app Jitsi Meet. The Cybernews team estimates that the file stayed publicly available for around a year-and-a-half, leaving Safran Group vulnerable to potential attacks throughout that time.
The leaked sensitive information included the Laravel app key, JSON Web Token (JWT) key, MySQL credentials, and Simple Mail Transfer Protocol (SMTP) credentials for the "no-reply" email.
The Cybernews researchers highlight that the exposure of these keys and credentials could have made it relatively easy for attackers to gain access to the website's backend, employee computers, and other servers.
The Laravel app key is a token that helps to keep user browser cookies safe. If threat actors know this token, they can use it to decrypt cookies, which might contain session IDs. Knowing them, a threat actor could be able to hijack the session and therefore the account.
The leak also included the JWT secret key, another type of token, which is usually used for authentication. These tokens can be both for a user, and for an admin. If attackers had access to this key, they could create an admin account and have privileged access to a website.
“The JWT secret key is used to generate and verify JWT tokens in use on that site,” added Cybernews researcher Aras Nazarovas.
Threat actors could also have used the admin accounts to plant web shells – malicious scripts that enable them to compromise web servers and launch additional attacks.
The leaked MySQL database logins could be used to get into the company's database stored on the same server and steal information. If hackers took control of Safran Group’s systems, they could move around and get access to confidential documents or even damage their equipment.
If the threat actor gets access to the SMTP credentials, they can use them to send emails to trick people into giving away sensitive information. The emails would appear to all intents and purposes to be legitimate, as they would be sent from the company’s servers.
This could negatively have impacted other aviation companies, stressed Nazarovas.
“Other aviation companies would expect messages from this email, and would be the primary target of this attack, as it was for a video-conferencing application that they likely used before, for meetings with Safran employees,” he said.
Cybernews researchers advise the company to take swift action to mitigate risks and prevent future breaches by changing leaked credentials. It is crucial to ensure that leaked keys are in longer bit-lengths and encoded using secure encryption/hashing algorithms.
Additionally, the company should consider whether the platform needs to be accessible through the internet or only through a VPN, which would provide an additional layer of security.
Sensitive infrastructure a tempting target
Due to Safran Group's position in the aviation supply chain, with only one hop between the company and the aircraft builders that use its products, a supply-chain attack could have a far-reaching impact, posing a risk to the company and its customers in the aviation sector.
As the company is developing cutting-edge technologies, it is a substantial target for advanced persistent threat (APT) groups, often associated with nation-states or state-sponsored groups and driven by political or economic motives.
Safran has already been targeted by threat actors. As reported in 2011, the company fell victim to two cyberattacks, which are suspected to be part of an espionage attempt.
The unidentified hackers allegedly attempted to map the company's computer system between 2009 and 2010. While no serious spying activities were reported, government officials confirmed that there were attempts to do so.
In 2018, Safran is believed to have suffered a cyberattack on its internal network. According to the US government and media reports at the time, hackers believed to be linked to a state security ministry in China collaborated with six hackers and two insiders at a company's Chinese office to steal jet engine blueprints.
While the authorities did not specifically name Safran, media reporting on the incident said they believed it was “almost certainly” the target of the espionage operation.
Tough times for aviation
The aviation industry had a rough start to the year. In January, an alerting system responsible for notifying pilots and airlines of potential dangers experienced a glitch that resulted in the temporary suspension of domestic flights throughout the US. Some media sources said over 7,800 flights were delayed, and 1,200 were canceled, while others claimed as many as 11,000 in total were disrupted.
The same month, an FBI “No-Fly” list containing around 1.5 million entries was leaked from an unprotected server at CommuteAir airlines. On February 14, Scandinavian Airlines (SAS) suffered a cyberattack that knocked the airline’s website and mobile app offline for multiple hours, with Anonymous Sudan taking responsibility for the attack.
The aviation industry is considered a prime target for cybercriminals due to its critical infrastructure. In recent years, experts have seen a substantial increase in cyberattacks against the industry, which reportedly suffers a ransomware attack every week.
A rising number of state-sponsored and organized crime syndicates are capable of large-scale targeted intrusions to disrupt operations and steal valuable intellectual property.
Rising cybersecurity concerns in the aviation sector
Ghousuddin Syed, vice president of technology and infrastructure at ISN, told Cybernews that the aviation industry and other critical infrastructure segments see an average cost of a data breach that is “approximately $1 million higher than other industries.”
“Each year, we see differences in the distribution of cyberattack vectors in aviation. In 2022, ransomware was the most prominent form of cyberattack plaguing the industry, accounting for slightly over 30% of total attacks,” said Syed, pointing out that by contrast the trend appears to be reversing in other sectors.
“The total volume of ransomware incidents in all industries dropped 23% in 2022 when compared to 2021,” he said.
In addition to stealing data or money, attackers may also aim to create chaos and destruction. Changing passenger lists, flying tables and routes, or luggage inventories can disrupt an airline's operations and harm its reputation. In 2022, numerous airport websites were targets of distributed denial of service (DDoS) campaigns arising from the Russia-Ukraine conflict.
Lionel Sigal, Head of CTI at cybersecurity firm CYE, told Cybernews that although most airline networks are not directly connected to aircraft systems, the possibility of attacks on planes cannot be ruled out. In the event of a successful attack on the network connected to the plane, hackers could change flight routes, hijack a plane, or even crash it.
“An airport and airlines are attractive targets for attack by various actors, from criminals to state agents and superpowers, that allow the attacker to get influence, economic, psychological, and financial gains,” said Sigal.
Bob Rudis, VP of Data Science at GreyNoise Intelligence, told Cybernews that organized crime and “financially motivated opportunistic attackers” usually have no incentive to conduct harmful attacks of this kind, as “no one gets paid.”
However, nation-states or ideological groups would be more likely to conduct such campaigns. That said, to date this possibility is not causing much concern.
“We have no public data on whether groups aligned with nation-states that may have malicious intentions, such as North Korea, Iran, and Russia, have successfully caused negative outcomes to actual flights, sector-aligned manufacturers, and supply chains,” said Rudis.
But ongoing cyber incidents such as ransomware and DDoS attacks, spam, phishing, hacking, fraud, and those caused by human error can be expected to continue, he added.
“The consequences will be similar to what we presently see,” said Rudis.
Bearing in mind that cyberattacks evolve over time, Syed stresses that all industries, especially those deemed critical, need “to consistently evaluate and reinforce their cybersecurity measures.”
“This is proving to be a busy year for new cybersecurity regulations and initiatives, and we don’t see this momentum slowing down anytime soon,” he said.
More from Cybernews:
Subscribe to our newsletter