On September 20, 2025, a ransomware attack on Collins Aerospace disrupted check-in and boarding systems at major European airports, including London Heathrow, Brussels, and Berlin, causing flight delays and cancellations that stranded passengers.
This wasn’t an anomaly. Whether in aviation, healthcare, finance, or virtually any other industry, organizations depend on complex webs of suppliers and service providers. When one link in that supply chain fails, the impact can cascade outward, causing substantial operational disruptions and eroding trust.
Third-party breaches aren’t edge cases. They’re now attackers’ preferred entry point. Even if you’ve hardened your own environment, a supplier’s gap in security can expose your business just the same.
The Collins Aerospace ransomware attack highlighted the fragility of interconnected supply chains. This one vendor compromise disrupted thousands of flights across Europe. Some airports reported over 1,000 computers corrupted, requiring manual recovery. Airlines, passengers, and connected services experienced days of disruption.
This was third-party risk in action, demonstrating that even highly fortified sectors like aviation can be undermined by a supplier compromise.
When ransomware rendered Collins Aerospace's automated systems inoperable, airports had to coordinate manual processes across multiple teams and external partners. During such crises, primary communication channels, like email, chat, or video conferencing, may be unreliable or compromised, making backup communication channels essential for incident response.
Modern OOB platforms like CYGNVS extend beyond communications to support the full incident response lifecycle:
This combination of readiness, execution, and defensibility turns OOB from a redundancy into a resilience multiplier.
The Collins Aerospace ransomware attack underscored what every CISO already knows: third-party risk is no longer peripheral. It’s central to cyber resilience.
You can’t control every supplier, but you can:
Third-party risk may be inevitable, but with preparation, secure communications, and practice, you can reduce chaos and limit damage when the weakest link breaks.