When most people think about critical infrastructure, they think about power grids, pipelines, or financial systems. But few industries depend on as many interconnected digital systems as aviation. The recent cyberattack on Collins Aerospace — a key provider of airport operations software — demonstrated just how fragile that ecosystem can be when infrastructure is compromised.
And if you know me, you know that I travel a lot, so this particular incident certainly hit home and more personally than some others.
The disruption impacted hundreds of airports, flight check-in processes, and ground operations systems across Europe and beyond. The target itself wasn’t an airline or an airport but rather a software supplier that sits in the middle of the aviation infrastructure stack. That’s exactly why this incident deserves more attention than it’s getting: it was a supply chain disruption that rippled across an entire sector.
This wasn’t just about one compromised endpoint or a malware blast. It was about network access, privileged communications channels, and trusted systems that quietly underpin global travel. And that’s exactly where infrastructure intelligence comes in.
Most industries rely on third-party platforms, but aviation goes a step further. Airlines, airports, baggage handlers, logistics firms, and border security authorities all depend on a web of shared systems, many operated by vendors like Collins Aerospace. These include:
What looks like “one system going down” is actually an infrastructure failure with dozens of dependencies.
While specifics of the Collins attack haven’t been fully disclosed publicly, enough patterns exist to create a likely “connect the dots” based on precedent:
These gaps don’t emerge from technology failure; they emerge from a lack of intelligence about the infrastructure behind the systems we trust.
This incident wasn’t unpredictable. The challenge is that too few organizations have visibility into the infrastructure attackers use to stage, deploy, and command their operations.
Infrastructure intelligence addresses that problem by shifting the timeline. Instead of defending at execution, you monitor what bad actors are staging, what they are setting up in advance of their attack, to detect and mitigate threats before they occur.
Here’s how:
Tracking adversary infrastructure before activation
Attackers almost always register domains, acquire IP space, or reuse past infrastructure, often weeks in advance to properly age the assets. These assets can be flagged well before the first intrusion, providing time to proactively address defenses.
Mapping relationships across campaigns
Infrastructure reuse is one of the biggest tells in threat actor behavior. Even if domains rotate, underlying hosts, registrars, certificates, or behavioral patterns don’t. Like everyone else, bad actors often have their own tradecraft that gets automated and thus re-used.
Monitoring DNS signaling for emerging threats
Even highly targeted attacks leave infrastructure exhaust including DNS lookups, anomalous resolution patterns, or subnet behaviors.
What happened here happened before and will happen again. Any industry with:
is one compromised vendor away from a cascading outage. But note that this isn’t a compliance problem. It’s a visibility problem, and one that infrastructure intelligence can help address.
Security teams have invested billions in SIEMs, EDR, NDR, MDR, and every other acronym in the alphabet. But most of these tools focus on what's already inside the network and/or what’s already public knowledge.
Infrastructure intelligence instead looks outward, at the infrastructure attackers build, control, and operate before they strike.
Imagine a world where operators, and their suppliers, could see:
That’s not wishful thinking. It’s now possible, and it’s what organizations adopting infrastructure intelligence are already doing.
The Collins Aerospace incident teaches a few hard truths:
In aviation, delays measured in minutes trigger headlines. In cybersecurity, delays measured in days are still considered “good response time.”
It’s time to flip that equation.
Infrastructure intelligence gives defenders something they’ve historically lacked: foresight. And as attackers move faster and supply chain compromises become the norm, foresight is no longer a luxury. It’s the new baseline for resiliency.