
Cyberattack on German air traffic control: APT 28 in the crosshairs
In an increasingly digitalized world, critical infrastructures such as air traffic control are increasingly becoming the target of cyber attacks. Recently, the German Air Traffic Control (DFS), based in Langen near Frankfurt am Main, fell victim to such a hacker attack. The attack, which paralyzed the DFS's office communications, not only alarmed security authorities but also alarmed the public. While air traffic was not affected, the incident raises serious questions about cyber security in Germany, particularly in connection with the suspected involvement of the hacker group "APT 28", which is closely linked to the Russian military intelligence service GRU. The attack on the DFS was discovered last week, as an air traffic control spokesman confirmed to the German Press Agency (dpa). The system affected was the internal office communications, which are essential for the exchange of information within the organization. "We are currently in the process of taking defensive measures," the spokesman continued, without giving precise details about the systems affected or the type of defensive measures. However, the DFS stressed that air traffic was not affected and continued as normal. This underlines the robustness of the air traffic control's operational systems, which are obviously separated from office communications. The role of APT 28 Media reports, especially from Bayerischer Rundfunk, suggest that the notorious hacker group "APT 28" could be behind the attack. This group, also known as "Fancy Bear", has been monitored by security authorities worldwide for years and is considered one of the most active and dangerous cyber actors. APT 28 is attributed to the Russian military intelligence service GRU by the Federal Office for the Protection of the Constitution (BfV) and has been