State-sponsored threat intel
We track APT28, APT41, Lazarus, MuddyWater active against the European aerospace supply chain: industrial espionage, IP theft, CAD models, avionics code, dual-use R&D. MITRE ATT&CK-mapped detection.
The aerospace sector and its entire associated supply-chain economy are primary targets for state-sponsored APTs hitting industrial intellectual property, and for supply-chain attacks entering via email and cloud interconnections with suppliers and partners. Extended sector: OEMs, prime contractors, sub-supply, MRO, commercial space, R&D — the entire European aerospace economy.
The aerospace sector is not "manufacturing like the others": the adversary is structured as a nation-state, the supply chain has 4-5 layers of depth with daily email and cloud interconnections, and industrial IP carries multi-year value. Three factors that radically change the cyber outpost required.
We track APT28, APT41, Lazarus, MuddyWater active against the European aerospace supply chain: industrial espionage, IP theft, CAD models, avionics code, dual-use R&D. MITRE ATT&CK-mapped detection.
BEC (Business Email Compromise) on compromised supplier accounts is the most exploited vector: substitute invoices, manipulated payment orders, payloads signed by trusted partners. AI detection on linguistic anomalies and patterns.
Cloud interconnections are the new vector: OAuth consent phishing, tenant-to-tenant trust abuse, API key compromise, federation attack on shared SSO, injection in federated CI/CD pipelines. Cross-tenant oversight with UEBA.
Fortgale actively tracks these groups based on documented incidents against the European aerospace supply chain over the past 24 months. The TTPs are integrated into detection rules, IOCs feed the SOC.
Industrial espionage. Spear phishing on R&D technical staff, exploitation of Exchange and VPN 0-days. Long-time target of European aerospace supply chain.
Long-term industrial espionage. Aerospace IP theft, persistent modifications to build servers, multi-year access. Civil aerospace and dual-use technologies.
Industrial espionage + finance. Job-offer impersonation via LinkedIn against aerospace engineers, supply-chain attack on developer tooling and CI/CD.
Mass low-cost phishing, credential harvesting, persistence via PowerShell. Pivoting to regional supply-chain partners.
78% of attacks on the aerospace sector in 2025 don't enter through the victim's direct perimeter, but through a supply-chain link: a supplier, a partner, an automated interconnection. Email and cloud trust relationships are the two dominant vectors.
The attacker doesn't spoof the supplier — they compromise the real supplier's email account and send legitimate-looking communications from there. Observed patterns: substitute invoices with a changed IBAN, payment orders from an impersonated CFO, firmware updates or technical documents carrying signed payloads. Fortgale detection: AI linguistic-anomaly checks, behavioural baseline on payment patterns, authenticated lookahead on lookalike domains, SOC-level correlation of email and network events.
Aerospace supply chains share cloud environments daily: federated Microsoft 365 tenants between OEMs and sub-suppliers, OAuth consent phishing on R&D accounts, API key compromise on ERP/CRM/PLM/MES integrations, federation attack on shared SSO, injection in federated CI/CD pipelines (e.g. GitHub Actions with partner secrets). Fortgale detection: cross-tenant UEBA, monitoring of unusual OAuth consent grants, continuous audit of Entra ID guest accounts, MITRE ATT&CK T1199 and T1078.004.
The European aerospace economy groups thousands of pure-sector companies — OEMs, primes, sub-suppliers, MRO, commercial space — with over 70% in export. Including supply-chain induced activity (specialised logistics, certification, R&D), the industrial base exceeds tens of thousands of companies. This is the base state-sponsored APTs target — and which NIS2 classifies as essential for the space sector.
European aerospace federations: OEMs, prime contractors, mechanical and electronic sub-suppliers, embedded software, MRO. ~92% are SMEs below 250 employees — the most exposed and least defended segment of the supply chain.
Year-over-year growth of documented attacks against European aerospace targets. 67% attributed to state-sponsored groups, APT28 and APT41 the most recurring.
ENISA estimate of the share of incidents in the aerospace sector entering via supply chain (email BEC, cloud federation, compromised partners) rather than direct perimeter. Mean time-to-detection: 287 days.
Most serious space-sector incidents reported to national CSIRTs over the past year involved compromise of R&D credentials or access to build servers and CAD repositories.
MITRE ATT&CK mapping of techniques Fortgale has observed in real incidents and intelligence advisories against European aerospace targets. Detections written and validated on customer SOCs, not theory.
Office macro documents signed with valid certificates (stolen from partners). Recurring themes: "AS9100 certification update", "Tier-1 supplier notification", "OEM quality audit". Targets: R&D engineers, procurement directors, security managers.
Real supplier email accounts used to send substitute invoices with changed IBAN, payment orders, technical documents with payloads. Mean access persistence before detection: 23 days.
Exploitation of unpatched legacy SSL VPNs (Pulse Secure, Fortinet FortiOS, Citrix NetScaler) as initial access. Mean time observed from public CVE to exploitation against European aerospace targets: 9 days.
Microsoft 365 credentials of R&D personnel acquired via infostealer logs (RedLine, Lumma, Vidar) and resold on underground forums. MFA bypass via session token hijack or token reissue.
Compromise of system integrators or software sub-suppliers with site-to-site VPNs to prime contractor systems. Mean persistence observed before detection: 187 days.
Tricking R&D users into granting OAuth consent to malicious apps with Mail.Read, Files.Read.All, offline_access permissions. Persistence via refresh tokens, survives password reset.
Main manufacturers: airframes, engines, avionics, commercial satellites, propulsion systems. Multi-site perimeters with shared build servers and CAD repositories.
Mechanical and electronic components, embedded software, quality certification (AS9100, EN 9100). SMEs with mixed IT/OT perimeters — the most exposed link of the supply chain.
Civilian satellite operators, ground segment, commercial payloads, Earth Observation, satellite telecommunications, commercial launchers. NIS2 essential entities.
Maintenance, repair, overhaul: mixed IT/OT environments with proprietary tooling, connected aircraft diagnostic access, airworthiness-certification ERP.
Aerospace supply chains: specialised transport, cleanroom warehousing, batch traceability, supply-chain quality certifications.
Universities, consortia, civilian R&D laboratories with access to national and European programmes (Horizon Europe, ESA). Recurring targets for pre-patent IP theft.
180+ profiled actors, focus on state-sponsored APTs and access brokers active in the aerospace supply chain. Vertical reports and advisories.
Discover CTI →MITRE ATT&CK-mapped detection, median containment ~11 min. Extended to critical sub-suppliers via shared SOC.
Discover MDR →Pillar for critical manufacturing. Solutions for industrial machinery, production lines and MRO environments.
Discover →NIS2 includes the space sector among essential entities and critical manufacturing (covering much of the aerospace supply chain) among important entities. To these add contractual requirements from OEMs and prime contractors (e.g. ISO/IEC 27001, NIST CSF, IEC 62443 for OT), ECSS standards for commercial space missions, and GDPR for personal data. Fortgale produces a single mapping matrix.
Three reasons: (1) extremely high-value intellectual property (designs, patents, avionics code, CAD models, dual-use R&D data); (2) access to a layered supply chain with hundreds of interconnected sub-suppliers; (3) ability to pivot to less-defended suppliers to reach large OEMs. Documented groups: APT28 (Russia), APT41 (China), Lazarus (North Korea), MuddyWater (Iran).
Email supply-chain attacks are the most exploited vector: Business Email Compromise (BEC) with a real supplier account compromised, substitute invoices, manipulated payment orders, payloads signed by trusted partners. Four measures: (1) DMARC/DKIM/SPF enforcement; (2) AI detection on linguistic anomalies and payment patterns; (3) authenticated lookahead on lookalike domains; (4) MDR with SOC correlating email anomalies with network events.
Cloud interconnections are the new supply-chain attack vector: (1) OAuth consent phishing on suppliers' Microsoft 365 tenants; (2) tenant-to-tenant trust abuse via Entra ID guest accounts; (3) API key compromise on SaaS integrations (ERP, CRM, PLM, MES); (4) federation attack on shared SSO; (5) injection in federated CI/CD pipelines. Fortgale monitors cross-tenant access with UEBA and MITRE ATT&CK-mapped detection (T1199, T1078.004, T1528).
Yes. The space sector is explicitly included among NIS2 essential entities. Many European aerospace companies also fall under the critical manufacturing classification (important). When multiple qualifications coexist, the strictest prevails. Fortgale supports NIS2 self-assessment and control mapping.
When the target is the European aerospace supply chain, the attacker is structured, funded and patient — and often enters through a weak supply-chain link, not your direct perimeter. Request a threat briefing on the APT groups active against your sector and the supply-chain attack patterns observed via email and cloud.
No nurturing sequences, no auto-replies. One of our analysts calls you back within one business day.
The full Report (executive summary · operational IoCs · technical runbook) is restricted. Share two details and one of our analysts contacts you with access and a short technical briefing.
Response in 30 minutes, containment in 1–4 hours. Even if you are not a Fortgale customer.