What the Tulsa Airport Breach Means for Smaller Airports
Tulsa International had a cybersecurity team. They still got breached. If you're running a smaller airport with fewer resources, this is your wake-up call.
Aviation Relations
2/15/20267 min read


Quick Answer
A Russian ransomware group just posted executive emails, employee IDs, financial records, and governance documents from Tulsa International Airport — a mid-size facility with dedicated cybersecurity staff. If a staffed airport got hit, smaller Part 139 airports with fewer resources need to pay attention. TSA EA 23-01 already requires cybersecurity incident response plans at all Part 139 airports, and mandatory reporting under CIRCIA is expected by mid-2026. The time to inventory your assets, segment your networks, and run a structured self-assessment is now — not after you're on a leak site.
On January 30, 2026, a Russian ransomware group called Qilin posted Tulsa International Airport on its dark web leak site. Executive emails with banking correspondence. Employee passports and driver's licenses. Annual budgets, revenue spreadsheets, NDAs, telehealth reports, governance meeting minutes, insurance documents, tenant databases, and vendor revenue sheets. All of it was published as proof of compromise.
By February 11, airport officials publicly confirmed the breach, stating that cybersecurity and technology teams had immediately contacted law enforcement and launched a comprehensive investigation.
Qilin isn't a fringe operation. They're arguably the most prolific ransomware-as-a-service threat actor of 2025, with over 1,000 claimed victims. And they just added a U.S. commercial airport to that list.
Tulsa International is not a small airport. TUL handles roughly 80 flights per day to more than 20 domestic destinations, serves over 3 million passengers annually, and supports an on-airport workforce of approximately 14,000 employees. In its statement, the airport noted that it has dedicated cybersecurity and technology teams that detected the intrusion, contacted law enforcement, and worked to contain the incident. Operations and daily passenger travel, they said, were not affected. The airport also clarified that it does not hold passenger data directly; airlines handle that.
But here's the question that should keep airport managers at smaller facilities up at night: If Qilin can breach a mid-size commercial airport with dedicated cybersecurity staff, what happens when they scan a Class III or Class IV airport without one?
What We Know About the Breach
Qilin has been tracked by researchers since 2022. It operates a ransomware-as-a-service model, meaning the group provides its malware and infrastructure to affiliates who carry out the attacks in exchange for a cut of the ransom. The group listed TUL on its leak site on or around January 30, and the airport's initial confirmation to the press came shortly after. The airport issued a broader public statement on February 11.
The data samples published by Qilin reportedly included documents dated between 2022 and 2025 — relatively fresh material. Beyond what's already been listed, the published samples reportedly contained court case documents and communications between the CFO's office and external banking officials. The airport spokesperson, Kim Kuehler of the Tulsa Airports Improvement Trust, stated that the airport "has taken steps to contain the incident and is confident the risk has been mitigated."
The investigation remains ongoing, with law enforcement involved. The full scope of the data exfiltration has not been disclosed.
One thing worth noting: Tyler Moore, chair of Cyber Studies at the University of Tulsa, told the Tulsa World that when ransomware groups publish sample data, it is authentic in the vast majority of cases. That tracks with what anyone who's worked in federal cybersecurity already knows — these groups need credibility to extract ransoms. When they post proof, it's almost always real.
Why Smaller Airports Are More Exposed
Tulsa's statement explicitly referenced cybersecurity and technology teams — plural. That's not a luxury most Part 139 airports have. At many Class II, III, and IV airports, IT may be a single person. It might be outsourced to a municipal IT department that also manages the water utility and the city clerk's network. There may be no dedicated cybersecurity budget at all — not even a line item.
The resource gaps at smaller airports aren't a mystery to anyone who's worked in this space. Legacy systems — building automation, access control, SCADA, remote monitoring — often predate modern security practices and may be running on operating systems that no longer receive patches. Network architectures tend to be flat, which means a compromise on the administrative side could potentially reach operational systems on the airfield. Incident response plans, when they exist, are usually built around physical security events—not cyber events. Even airports that recognize the risk often lack the staffing bandwidth to address it.
Here's the uncomfortable reality about ransomware-as-a-service operations: they don't choose targets based on passenger count or hub classification. They scan for vulnerabilities. A smaller airport running unpatched systems behind a flat network with default credentials is, by definition, a softer target than a larger facility with segmented networks and a security operations center. The economics of RaaS mean that Qilin's affiliates are incentivized to hit as many targets as possible — volume matters as much as size.
The regional ripple effect is already playing out. KFOR in Oklahoma City reported that the TUL breach immediately raised concerns about Will Rogers World Airport. OKC's airport director, Jeff Mulder, acknowledged that TSA is working with airports on cybersecurity and that Will Rogers has been working to secure its networks. Ron Vaughn, a cybersecurity expert interviewed by KFOR, noted that Will Rogers is more complex than Tulsa—more employees, more passengers, deeper integration with city government systems—and that this complexity creates an additional attack surface. This hub-and-spoke concern isn't unique to Oklahoma. It's happening at every regional cluster in the country.
The Regulatory Reality
If you operate a Part 139 certificated airport — any class, I through IV — you are already subject to cybersecurity requirements that many airport managers may not fully appreciate.
TSA Emergency Amendment 23-01 (EA 23-01) requires TSA-regulated airports to designate a cybersecurity coordinator, report cybersecurity incidents to CISA within 24 hours, develop and implement a cybersecurity incident response plan, and complete a cybersecurity vulnerability assessment. These aren't aspirational recommendations. They are regulatory requirements with enforcement mechanisms.
And the regulatory floor is rising. The Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) final rule, expected in May 2026, will add mandatory 72-hour reporting requirements for covered entities experiencing substantial cyber incidents, as well as 24-hour reporting for ransomware payments. Airports fall squarely within the critical infrastructure sectors covered by CIRCIA. When this rule takes effect, the reporting obligations will build on what EA 23-01 already requires.
Looking further ahead, the FAA's Civil Aviation Cybersecurity Aviation Rulemaking Committee — chartered in May 2025 under the FAA Reauthorization Act of 2024 — is developing recommendations on cybersecurity standards for airports, aircraft systems, and air traffic control. The ARC's charter calls for interim reports every six months, with final recommendations likely informing new standards tied to Airport Improvement Program grant eligibility. If you're an airport that depends on AIP funding — and most smaller airports do — cybersecurity compliance may eventually become a condition of receiving those grants.
On the enforcement side, TSA can assess civil penalties of up to $17,062 per violation under 49 CFR 1503.401, with aggregate penalties of up to $1,200,000 per civil penalty action for aviation-related violations. These aren't theoretical numbers. They're on the books, and the compliance environment is only getting more rigorous.
The airports that start assessing their cybersecurity posture now are positioning themselves ahead of the curve. The airports that wait will be playing catch-up under compliance deadlines — and potentially under the pressure of an active incident.
What's Achievable Right Now
None of this is meant to be overwhelming. At most smaller airports, budgets are tight, staff are stretched, and cybersecurity can feel like one more unfunded mandate. But there are practical steps that any airport can start this month — steps that meaningfully reduce risk without requiring a six-figure security budget.
Know your inventory. You cannot protect what you don't know you have. Start by mapping every connected system at your airport: IT infrastructure, operational technology, building automation, access control, weather observation systems, non-federal navigation aids, and, if applicable, airfield lighting controls. Most airports that go through this exercise discover systems they didn't realize were networked — or that they'd forgotten about entirely. A complete asset inventory is the foundation on which everything else is built, and it's also a direct requirement under the vulnerability assessment mandate in EA 23-01.
Segment your networks. If your administrative email system and your airfield lighting controls sit on the same network segment, a ransomware infection that encrypts your accounting files could cascade into systems that affect airfield operations. Network segmentation — separating administrative, operational, and guest networks into isolated zones — is one of the highest-impact steps an airport can take. It doesn't eliminate risk, but it contains blast radius. For many airports, this can be accomplished with existing infrastructure and a competent network administrator.
Assess where you stand. You don't need to start with a full penetration test or a $50,000 consulting engagement. Start with a structured self-assessment that maps your current security posture against the regulatory requirements you're already subject to under EA 23-01. Identify where the gaps are. Prioritize them by risk — what's most likely to be exploited, and what would cause the most damage if it were? A clear picture of your current state is worth more than any amount of general cybersecurity awareness.
The Signal, Not the Exception
The TUL breach isn't an isolated incident — it's a signal. Ransomware groups are actively targeting aviation infrastructure. Qilin alone has claimed over 150 victims in the first six weeks of 2026. The regulatory environment is tightening to match the threat, with EA 23-01 already in effect, CIRCIA on the horizon, and the FAA's cybersecurity ARC developing recommendations that could reshape compliance requirements for every Part 139 airport in the country.
The bottom line: Tulsa had a cybersecurity team and still got breached. Your advantage isn't having more resources than they did — it's knowing exactly where you're exposed before someone else finds out for you.
Where does your airport stand? The free Aviation Relations cybersecurity preview assessment is designed for airport managers and operations directors — from Part 139-certificated airports to general aviation facilities operating non-federal navigation aids—no technical expertise required. Get an immediate snapshot of your risk areas mapped to current TSA, FAA, and federal grant requirements — then upgrade to the full report for a comprehensive gap analysis with prioritized action items, regulatory cross-references, and a 90-day implementation roadmap.
→ Start your free preview at https://aviationrelations.com/airport-cybersecurity-assessment
© 2025. All rights reserved.
Need to know:
I AM EMPLOYED AS AN ILS ELECTRONICS ENGINEER WITH THE FEDERAL AVIATION ADMINISTRATION. MY CYBERSECURITY WRITING IS CONDUCTED IN MY PERSONAL CAPACITY, BASED ON MY MSIT EDUCATION, AND MAINTAINED WITH CLEAR ETHICAL BOUNDARIES.
I do not provide Part 171 equipment compliance consulting or services within my federal job scope. All content uses personal time and resources, is based on publicly available information, and does not represent FAA positions or policy.
The views and guidance provided through Aviation Relations represent my professional opinion and experience as an individual and do not represent official FAA policy, positions, or endorsements. All content is provided in a personal capacity and is separate from any official FAA duties or responsibilities.