A Massive Breach Hits Dublin Airport’s Data Partner
Dublin Airport’s operator, daa (Dublin Airport Authority), has issued an urgent notice after discovering a large-scale data breach linked to one of its external IT suppliers.
The breach reportedly affected travel data for over 3.8 million passengers who flew through Dublin Airport in August 2025.
According to daa, the breach occurred within a third-party vendor’s server that handled airline and passenger processing information. Early reports suggest that Collins Aerospace, a supplier responsible for critical flight data systems, was the company impacted.
daa confirmed that its own IT infrastructure remains secure, but admitted that sensitive information processed by the external partner was compromised.
What Data Was Exposed
Preliminary findings indicate that the stolen data includes passenger travel details, such as:
- Flight numbers and booking information
- Boarding times and destinations
- Frequent flyer and ticket references
- Possibly limited personal identifiers like names or travel IDs
While financial information and passwords were not directly impacted, daa is urging passengers to remain cautious and monitor for phishing or identity theft attempts in the coming weeks.
How the Breach Was Discovered
The breach was detected after unusual network activity was observed on a third-party system during a routine cybersecurity audit.
Upon investigation, forensic analysts discovered that the vendor’s IT environment had been accessed by unauthorized users, potentially linked to a sophisticated data extraction campaign.
daa immediately contacted Ireland’s Data Protection Commission (DPC) and the National Cyber Security Centre (NCSC) to report the incident, in line with GDPR requirements.
Affected passengers are being notified by email as investigations continue.
Statement from Dublin Airport Authority (daa)
In an official statement, daa said:
“We are aware of an incident involving a third-party IT supplier that may have resulted in the unauthorized access of passenger data.
We take this matter extremely seriously and are working with cybersecurity experts and relevant authorities to ensure the safety of our systems and the integrity of our customers’ data.”
The operator emphasized that no daa-managed systems were directly compromised, and airport operations, check-ins, and flights are continuing as normal.
Expert Analysis: A Classic Supply-Chain Compromise
Cybersecurity analysts describe the daa breach as another example of “supply-chain vulnerability” — where attackers exploit a vendor rather than the primary organization.
According to Dr. Maeve O’Connell, a cybersecurity researcher at Trinity College Dublin:
“Airports rely heavily on third-party data handlers and software vendors. A single weak link — like an outdated or misconfigured server — can lead to breaches at massive scale.
This incident shows that even organizations with strong in-house security can be exposed through external partners.”
This mirrors previous global incidents such as the MOVEit transfer hack and SolarWinds compromise, which impacted thousands of organizations through vendor-side vulnerabilities.
What Passengers Should Do
daa and cybersecurity experts recommend that anyone who traveled through Dublin or Cork airports in August 2025 take the following precautions:
- Stay alert for phishing emails claiming to be from airlines or airport authorities.
- Avoid clicking on suspicious travel-related links or forms requesting “verification.”
- Monitor frequent flyer accounts for unusual activity.
- Check identity-theft alerts via services like Equifax or TransUnion.
- Use strong, unique passwords for airline, booking, and loyalty program accounts.
Even though financial data was not reported stolen, social engineering attacks often follow publicized breaches like this one.
Why This Matters
This incident is another wake-up call for the aviation industry, which remains a high-value target for cybercriminals.
From passenger data and airline systems to flight logistics, the complexity of connected platforms creates numerous entry points.
The daa breach reinforces two key lessons:
- Third-party risk management is critical in cybersecurity governance.
- Visibility and monitoring across supplier networks must become standard practice for all airports and public infrastructure operators.








