%20(1).png)
On 19 September, Collins Aerospace’s MUSE platform, used by airlines to share check-in desks, kiosks and boarding gates, experienced a cyber-related disruption. While ENISA has confirmed ransomware was involved, no technical details or confirmed attribution have been released.
Flights were delayed, some cancelled, and passengers at Heathrow, Brussels and Berlin and many other major European airports queued for hours as staff reverted to manual boarding passes. These fallback processes kept planes moving, but at significant cost to efficiency and trust.
Single Vendor Dependency
The reliance on MUSE highlights the risks of single vendor dependency. Consolidating operations into one system brought efficiency, but it also created a single point of failure. When MUSE went down, there was no immediate substitute, and disruption spread quickly across multiple airports.
NIS2 and Why it Matters
The EU’s NIS2 Directive was introduced to address scenarios where digital failures or attacks cause widespread operational disruption. It requires critical entities including transport operators to implement:
Critically, NIS2 places accountability on boards and senior executives. Under NIS2, outages like MUSE would likely be scrutinised as potential failures of resilience planning, carrying regulatory and financial consequences if gaps were found.
Key Priorities
This incident highlights three urgent priorities:
Key Takeaways
The MUSE outage showed how quickly disruption spreads when critical services depend on a single provider.
While aviation felt the impact this time, the principle applies far more widely. Organisations in every sector are being asked by regulators, partners and their own boards to demonstrate that continuity is not left to chance.
The takeaway is that resilience must be owned at the organisational level. Relying entirely on a vendor to guarantee continuity is no longer enough.
Securing the Data Itself
Modern ransomware often turns outages into data breaches. If data theft were to be confirmed, the consequences would extend far beyond delays.
Binarii Labs addresses this risk by securing unstructured data at the source where every file is encrypted, fragmented and distributed so no attacker can ever access it in full. Even if systems are breached, the data remains protected, continuity is preserved, and organisations can meet the resilience and accountability that NIS2 now demands.