{"id":29635,"date":"2019-10-11T14:57:26","date_gmt":"2019-10-11T14:57:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30576\/Planes-Gate-And-Bags-How-Hackers-Can-Hijack-Your-Local-Airport.html"},"modified":"2019-10-11T14:57:26","modified_gmt":"2019-10-11T14:57:26","slug":"planes-gate-and-bags-how-hackers-can-hijack-your-local-airport","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/","title":{"rendered":"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2019\/10\/11\/4331ab46-ad71-4ef8-83b3-78c79983db81\/thumbnail\/770x578\/3843bdd4f8098c6b1356cd8a88319792\/screenshot-2019-10-11-at-10-16-58.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>In an increasingly technology-focused world, aviation security is becoming a critical problem.&nbsp;<\/p>\n<p>This is not necessarily in reference to protesters disrupting flights or drones that are able to bring prominent airports <a href=\"https:\/\/www.zdnet.com\/article\/gatwick-drone-disruption-deemed-deliberate-new-powers-given-to-police\/\" target=\"_blank\" rel=\"noopener noreferrer\">to a grinding halt<\/a> for days over the holiday season.&nbsp;<\/p>\n<p>Instead, the use of networked systems and tech solutions to do everything from managing your booking to bags and planes themselves has opened new pathways for cyberattackers. &nbsp;<\/p>\n<p>Connectivity lies in the heart of the aviation industry today. I recall a flight four years ago, in which the accidental slice-through of a single fiber cable servicing an airport led to widespread chaos, missed flights and bags, queues a mile long, and the use of pen and paper to check-in passengers.&nbsp;<\/p>\n<p>The use of connected and smart solutions has led to a complex aviation environment and one that can be abused, theoretically causing everything from ground planes to the destruction of scheduling systems.<\/p>\n<p>We&#8217;ve already seen ransomware operators black out <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-attack-blacks-out-screens-at-bristol-airport\/\" target=\"_blank\" rel=\"noopener noreferrer\">screens at Bristol Airport<\/a>. Heathrow Airport was <a href=\"https:\/\/www.zdnet.com\/article\/heathrow-airport-fined-120000-over-usb-data-breach-debacle\/\" target=\"_blank\" rel=\"noopener noreferrer\">fined \u00a3120,000<\/a> by UK regulators after an employee lost a USB stick containing thousands of confidential and sensitive files relating to aviation security staff. Boeing 737 Max jets have&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/georgeavetisov\/2019\/03\/19\/malware-at-30000-feet-what-the-737-max-says-about-the-state-of-airplane-software-security\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">been grounded<\/a> in the past pending investigations into their cybersecurity posture.&nbsp;<\/p>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/travelers-kinda-hate-robots-at-airports\/\" target=\"_blank\" rel=\"noopener noreferrer\">Travelers kinda hate robots at airports<\/a><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Standard malware and human error are not the only factors that may compromise airport security. Instead, attackers have a wide pool of systems on offer to enter airport networks, relied upon and required by staff both on the ground and in the sky.&nbsp;<\/p>\n<p>This week, Pen Test Partners <a href=\"https:\/\/www.pentestpartners.com\/security-blog\/mapping-the-attack-surface-of-an-airport\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">published the results<\/a> of an investigation into how vulnerable our airports may be to attack, having tested a wide selection of systems and controls for weaknesses.<\/p>\n<p><strong>Access:<\/strong> While obtaining a crew pass during the test wasn&#8217;t possible, these RF cards &#8212; often making use of mag stripes and PIN codes &#8212; may be stolen or replicated through tools such as Proxmark, giving threat actors access to areas they should not have.&nbsp;<\/p>\n<p>&#8220;The biggest single challenge is the sheer volume of different entities that need access: passengers, crews, airline staff, security personnel, police, customs, and other government agencies, freight, meal service and many more,&#8221; the company says.&nbsp;<\/p>\n<p><strong>Building management systems (BMS):<\/strong> BMS is used to manage access control to key buildings and rooms, electronically controlling who can enter where. The team was able to purchase a controller through eBay and found that some BMS are vulnerable to remote exploit and authentication bypass.&nbsp;<\/p>\n<p><strong>HVAC:<\/strong> While potentially more irritating than dangerous if tampered with, Pen Test Partners found that airport air conditioning is usually controlled remotely by third-parties and this could be a potential avenue for exploit &#8212; especially if connected to more valuable systems. &nbsp;<\/p>\n<p><strong>Check-in desks:<\/strong> While publicly messing with a self-service kiosk is unlikely to go unnoticed, many check-in desks are rented by airlines from the airport, and the software running on them can be outsourced to private companies. The compromise of one link in this chain could lead to system failures.&nbsp;<\/p>\n<p><strong>Baggage:<\/strong> According to the researchers, most baggage systems are either partially or fully autonomous, backed by industrial controllers and Windows operating systems. &nbsp;<\/p>\n<p>&#8220;Whilst the baggage system itself is rarely directly exposed on an airport network, usually residing on a dedicated serial network, interfaces to it are sometimes exposed,&#8221; the team says.&nbsp;<\/p>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/news\/california-proposes-regulations-to-enforce-new-privacy-law\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">California proposes regulations to enforce new privacy law<\/a><\/p>\n<p><strong>Flight displays:<\/strong> As previously highlighted by the Bristol Airport incident, flight displays do seem to be a weak link. During the penetration test, the researchers were able to inject their own flight on to a display.&nbsp;<\/p>\n<p><strong>CCTV, Wi-Fi:<\/strong> Security issues surrounding cameras and Wi-Fi networks &#8212; especially when public &#8212; are well-documented. In the case of CCTV in the airport experiment, the researchers were able to recover private encryption keys, and when it comes to Wi-Fi, an aviation security concern is the possible spoofing of a network to lure staff or aviation devices into connecting to honeypots.&nbsp;<\/p>\n<p><strong>Going airside:<\/strong> In some cases, biometric data &#8212; such as face scans &#8212; are not automatically verified; instead, they are sent to nearby border officers for inspection. The networks facilitating these exchanges are not always segregated and may be visible on corporate networks.&nbsp;<\/p>\n<p>Scanners, x-ray machines, and concession spaces, too, are also networked. In the latter case, access to wider airport systems can be possible.<\/p>\n<p><strong>Planes and machinery:<\/strong> Pen Test Partners says control and billing systems for ground power necessary to keep planes running are networked, whereas fuel delivery is less so &#8212; but is also becoming increasingly automated.&nbsp;<\/p>\n<p>&#8220;The pilot&#8217;s Electronic Flight Bag can be used to specify the fuel load required, which is sent through an API to a tablet carried by the fueller, having been reviewed back at the airline&#8217;s flight operations for weight and balance,&#8221; the team note.&nbsp;<\/p>\n<p><strong>Airside vehicles:<\/strong> Vehicles are often equipped with ADS-B to keep them on the radar, but the problem is that this protocol is not encrypted or authenticated, potentially leading to compromise through rogue signals, thereby placing phantom vehicles on busy runways.<\/p>\n<p><strong>Instrument landing systems:<\/strong> Also known as ILS, these systems are widely used for aircraft to navigate on the ground. Unfortunately, they are also able to be spoofed.&nbsp;<\/p>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/financial-industry-spending-millions-to-deal-with-breaches-in-2019\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Financial industry spends millions to deal with breaches<\/a><\/p>\n<p><strong>Docking systems:<\/strong> Automated docking systems that use infrared to direct planes to their final destination are in use and are not invulnerable to exploit, as the team found when they were able to change a plane&#8217;s signature from an A380 to an A320.<\/p>\n<p>The overall complexity of the aviation environment is staggering, but the same simple principles apply to its security as to the enterprise.&nbsp;<\/p>\n<p>Software patching schedules, the monitoring of endpoints for suspicious behavior, and staff training help, but given that one compromised system has the potential to impact the operations of an entire airport, operators need to go further.&nbsp;<\/p>\n<p>Pen Test Partners says that the segregation of networks, the isolation or containment of systems unable to be properly secured, and the principles of least privilege should be a priority for airports worldwide to mitigate the risk of cyberattacks.&nbsp;<\/p>\n<h3>Previous and related coverage<\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30576\/Planes-Gate-And-Bags-How-Hackers-Can-Hijack-Your-Local-Airport.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29636,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8070],"class_list":["post-29635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerterror"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-11T14:57:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport\",\"datePublished\":\"2019-10-11T14:57:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/\"},\"wordCount\":1081,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png\",\"keywords\":[\"headline,hacker,terror\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/\",\"name\":\"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png\",\"datePublished\":\"2019-10-11T14:57:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,terror\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerterror\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/","og_locale":"en_US","og_type":"article","og_title":"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-11T14:57:26+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport","datePublished":"2019-10-11T14:57:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/"},"wordCount":1081,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png","keywords":["headline,hacker,terror"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/","url":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/","name":"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png","datePublished":"2019-10-11T14:57:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/planes-gate-and-bags-how-hackers-can-hijack-your-local-airport\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,terror","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerterror\/"},{"@type":"ListItem","position":3,"name":"Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29635"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29635\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29636"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}