Cyber risks increase across interconnected airfreight systems

Cyber risks increase across interconnected airfreight systems

  • Expanding digital connectivity across airlines, airports, handlers and customs systems has increased cybersecurity exposure in airfreight, prompting a shift from perimeter-based defence to resilience planning, continuous monitoring and strengthened third-party oversight as cloud migration and data-sharing deepen interdependence.
  • Vendor access, software supply-chain dependencies and rising identity compromise risks are driving tighter controls, including zero-trust frameworks, multi-factor authentication, session-based privileged access, and more sophisticated identity-verification and awareness training to counter AI-enabled social engineering.
  • Operators are investing in data governance, automated discovery, and continuity planning to manage shadow data, maintain operations during system disruption, and mitigate breach impact, reflecting an industry expectation that network intrusion is inevitable and must be met with robust detection and response capabilities.

 

Airfreight operators are reporting a sustained rise in cybersecurity exposure as digital platforms link airlines, airports, handlers, forwarders, and customs systems. Network interdependence has increased efficiency in cargo booking, cargo processing, and regulatory clearance, but it has also expanded the number of external access points through which attackers can enter operational systems. Disruptions to airport services, booking platforms, and third-party software providers in recent years have demonstrated how a single compromise can affect multiple organisations, slowing cargo flows and delaying aircraft operations.

Cloud migration, integrated transport management systems, and data-sharing arrangements have accelerated across carriers and logistics providers. These developments support faster scheduling and real-time shipment visibility, but they also require continuous outbound and inbound data exchange. The increased reliance on external platforms and vendors means that an incident originating outside a carrier’s own network can still affect its ability to process cargo or manage aircraft turnaround.

Industry responses are shifting from perimeter controls to resilience planning, identity management controls, and continuous monitoring of third-party access. Operators are assessing the operational impact of ransomware attacks, credential compromise, and data exposure across integrated networks, as well as testing continuity and recovery plans that maintain essential functions if systems are temporarily offline.

Vendor access and supply chain dependencies

Airfreight operations rely on shared platforms for booking, ground handling, warehouse management, and customs clearance. These systems connect multiple organisations, often across regions, creating dependencies that can allow a breach in one environment to extend to others. Recent incidents at airports and logistics hubs have shown how software supply chain disruptions can halt or delay cargo processing, even when the affected organisation is not directly targeted.

Vendors and service providers increasingly access internal systems to support maintenance, operational planning, and real-time tracking. The growth of integrated digital workflows has reduced manual handling, but it has also increased the number of accounts, credentials, and application programming interfaces connected to operational networks. Industry security teams are reviewing which suppliers have access to critical systems and are assessing the conditions under which third-party access is granted.

Some operators are introducing risk-based tiering for suppliers, along with continuous monitoring of access patterns and configuration changes. These measures aim to quickly detect anomalies, restrict unauthorised access, and reduce the chance that compromised vendor credentials can be used to move laterally into airfreight systems. Incident response plans are also being revised to reflect the reality that disruptions may originate from external platforms rather than internal systems.

Gideon Teerenstra, Europe Cyber Director at S-RM, said organisations must treat key suppliers differently from general vendors. “The key suppliers should therefore be subject to a comprehensive review, including an initial in-depth assessment to deliver insight and enable prioritisation of risk-mitigating activities, continuous vendor monitoring, and have a battle-tested incident response plan ready,” he said.

Darren Guccione, CEO and co-founder of Keeper Security, said third-party environments are effectively part of an operator’s infrastructure. “Every third-party platform, cloud service, and shared data environment must be treated as an extension of the organisation’s own attack surface,” he said.

Ron Reiter, CTO and co-founder of Sentra, said shared accountability is essential. “Shared visibility between partners is key; every entity touching sensitive data must be accountable for how it’s accessed and protected,” he said.

Identity compromise and social engineering

Credential compromise remains one of the most common entry points for cyberattacks affecting airfreight operations. Attackers use phishing, voice impersonation, social engineering, and email compromise to obtain login information, bypassing technical controls. The introduction of generative AI has increased the scale and accuracy of impersonation attempts, making it more difficult for employees and automated filters to detect fraudulent communications.

As attackers improve their ability to imitate trusted senders or internal personnel, airfreight organisations are introducing identity verification steps that do not rely solely on shared personal information. Helpdesk procedures for account recovery, password resets, and system access approvals are being strengthened to limit the possibility of unauthorised instructions being executed through impersonation.

Zero-trust identity frameworks are being adopted to restrict movement inside networks. Multi-factor authentication is now mandatory across most airfreight systems, and privileged access controls are being implemented to ensure that user accounts cannot perform operations beyond the minimum required for their roles. Some operators are adopting session-based access tools, allowing privileged access only for defined tasks and revoking it once the session ends.

AI-driven social engineering has also increased the need for security awareness training across cargo terminals, operations centres, and third-party support environments. Training now includes examples of realistic impersonation, rather than generic phishing indicators. In addition, organisations are implementing operational controls that ensure payment requests, routing instructions, or aircraft handling orders require verification through independent channels.

Teerenstra said basic identity checks that rely on static personal information are no longer reliable. “Many of the ‘secrets’ that are currently used to identify a call, such as date of birth, social security number, and home address, are commonly sold on the dark web and are therefore not reliable sources to verify a caller’s identity,” he said.

Duncan Greatwood, CEO of Xage Security, said credential misuse remains a leading risk. “Adopting Zero Trust principles, such as continuous reauthentication, strict identity verification, and least-privilege access, limits how far an attacker can move even if credentials are compromised,” he said.

Matthew Corwin, Deputy Chief Privacy Officer at Guidepost Solutions, said awareness training must reflect the capabilities of AI-enabled impersonation. “Security awareness training should emphasise the sophistication and quality of current social engineering attacks leveraging AI tools,” he said.

Data governance, continuity planning, and resilience

Airfreight organisations manage large volumes of operational and commercial data across warehouse management systems, booking platforms, flight scheduling systems, and customs clearance environments. Over time, data is often copied or transferred across internal repositories, shared platforms, and analytical environments. This can result in “shadow data” that is stored outside monitored systems, leaving it exposed to unauthorised access.

Shadow data presents particular challenges when evaluating the impact of incidents or reporting the scope of data exposure to regulators or partners. Operators are increasing investment in data classification, inventory management, and automated discovery to maintain visibility across data flows and storage locations.

Resilience planning is also being updated to ensure operations can continue if core systems are disrupted. Manual fallback procedures remain part of contingency planning but are not considered sustainable for extended periods. Organisations are developing playbooks that cover ransomware response, network segmentation, and system isolation while maintaining ground operations at a reduced scale.

Reiter said data that is not classified as sensitive can still be exploited. “Less sensitive data can still be weaponised when combined with other sources to create potent attack vectors,” he said.

Corwin said resilience planning now prioritises ongoing testing. “These companies are investing in risk assessments and business impact assessments to ensure they understand their exposure and current capabilities,” he said.

Teerenstra said resilience strategies assume network intrusion will occur. “The sector presumes breaches are inevitable and focuses on continuous monitoring, threat detection, response preparedness, and minimising breach impacts,” he said.

Picture of Edward Hardy

Edward Hardy

Having become a journalist after university, Edward Hardy has been a reporter and editor at some of the world's leading publications and news sites. In 2022, he became Air Cargo Week's Editor. Got news to share? Contact me on Edward.Hardy@AirCargoWeek.com

subscribe to acw for free
stay informed. stay ahead

To get the latest air cargo news and industry trends delivered directly to your inbox, subscribe now!

Newsletter

Stay informed. Stay ahead. To get the latest air cargo news and industry trends delivered directly to your inbox, sign up now!

related articles

Europe faces new pressures and opportunities

AVIAREPS bets on Southeast Asia’s cargo ascent

AI adoption accelerates as tariff volatility reshapes shipping strategies