In a recent government meeting, witnesses discussed the implications of a cyber attack on Seattle Tacoma International Airport (STIA), which was identified on August 24. Lance Liff, the Aviation Managing Director for the airport, detailed the incident, noting that it initially disrupted operations and inconvenienced passengers. STIA, which is undergoing significant renovations, is projected to serve 52 million passengers this year, up from its original design capacity of 30 million.
Liff emphasized that despite the attack, which was confirmed to be a ransomware incident perpetrated by the criminal organization Reseda, the airport's ability to ensure safe travel remained intact. The airport managed to maintain operations by collaborating with airlines and utilizing alternative systems, such as paper boarding passes for certain carriers. He reported that the majority of affected systems were restored within a week, thanks in part to over 4,000 hours of support from airport employees.
The ongoing investigation, led by the FBI, revealed that while critical systems were isolated to halt the attack, some data was encrypted and copied by the attackers. Reseda demanded a ransom payment, but the Port of Seattle has opted not to comply. The attackers have since posted files stolen from the port on a dark web site, demanding 100 Bitcoin for the data.
Liff assured that the airport is actively reviewing the leaked files and will notify individuals whose personal information may have been compromised, providing necessary support. The incident underscores the growing threat of cyber attacks in the aviation sector and the importance of robust cybersecurity measures.