How to protect valuable aviation and aerospace IP and R&D
- ESET Expert

 - 11 minutes ago
 - 7 min read
 

You can’t soar when your secrets are leaking below.
When the United States initiated the Advanced Technology Bomber program, better known as the B-2 Spirit, in the 1970s, the fast track to a cutting-edge stealth bomber tracked to the fact that the Northrop Corporation already had experience with mature flying-wing designs, which enabled the necessary low radar signature, as far back as 19421. Those prototypes, the Northrop XB-35 and YB-35B, were clearly reflected in the concept for the now famous B-2 Spirit and its successor, the B-21 Raider.
That B-2 Spirit? While security was obviously tight, the B-2 program never faced the modern cyber threat landscape; if it had the single unit cost of $2.13 billion back in the 1990s, including development and engineering, it would have had to absorb significant cybersecurity costs too. Now, however, in an age where military secrets have leaked on public forums, even top-flight security can fall short. So perhaps the B-2’s 33-year genesis was lucky to conclude before widespread digitalization hit R&D.
A story of strategic interest
The advantage of having domestic companies at the forefront of technological development is incalculable. The U.S. government, especially its military, is known for in-depth and often exclusive cooperation with private companies to extend hard capabilities, helping iterate designs years ahead of what’s known by the public. At the same time, it’s a quid pro quo relationship, with aviation and aerospace companies accessing brain power and some R&D costs offset by government investment.
Behind all the nondisclosure agreements and red tape lies the fact that it's in the best interests of countries with world-beating aviation and aerospace industries to keep ahead. The same is true of China’s, Russia’s or even Iran’s aviation, aerospace and government community. However, breakthroughs are expensive, and so is the infrastructure that supports them. There’s a bit of a loophole here though — what you can’t create wholly at home is best stolen in the name of national interest. Isn’t copying the highest form of flattery?
To the danger zone
The sector has seen several security incidents in recent memory; 2021 saw the breach of Bombardier, a well-known Canadian aerospace manufacturer, with the Cl0p ransomware gang exploiting a vulnerability in their file-transfer app to steal data — from purposely isolated servers, no less.
Is network segmentation2, thus, failure-prone? It depends. In 2024, ESET Research discovered that the GoldenJackal APT group had been using a custom toolset to target air-gapped systems and steal confidential information from high-profile machines. This is important for two reasons:
It confirms that not even air-gapping might be enough, with network segmentation failing to deliver on its promise.
Breaching air-gapped networks is resource-intensive; therefore, the fact that GoldenJackal developed a sophisticated espionage and sabotage toolset in as little as five years doesn’t bode well for companies with valuable R&D and IP.
In a high-profile case from January 2025, the Japanese Aerospace Exploration Agency (JAXA) was breached through its vulnerable VPN by MirrorFace, an APT closely followed by ESET Research. The attackers reportedly stole documents on JAXA’s Martian moon (MMX) and manned lunar exploration plans, including sensitive files shared to the company by other partners, like NASA.
Even the largest companies can have hidden security gaps. The Safran Group, a top aviation manufacturing company from France, had their systems leak sensitive data due to a misconfiguration. This left them vulnerable over a large period of time, which is rather dangerous for a business that supplies the sector’s giants like Airbus or national aerospace organizations.
Strictly personal
IP is still largely developed by our feeble human intellects. While that is bound to evolve with ever-increased AI assistance in the sector, human-led innovation is mostly vulnerable because of humans. A powerful example can be found via a high-profile phishing campaign by Lazarus group (aka HIDDEN COBRA) against a Spanish aerospace company in 2023 where the attackers contacted employees of the targeted company via a fake recruiter on LinkedIn.
Employees were tricked into opening a malicious executable presenting itself as a coding challenge or quiz. Among the four execution chains, the attack delivered three types of payloads via DLL side-loading. The most notable payload included the LightlessCan backdoor, which introduced techniques to hinder detection by real-time security monitoring software and analysis by cybersecurity professionals. These campaigns are also likely to be scaled and accelerated with the assistance of AI.
Through the fire
The ramifications of a successful breach attempt vary, depending on the victim. For a manufacturer in aviation or aerospace and their supply chain, the most immediate dangers are:
Disruptions: Cyberattacks can halt production, disrupt supply chains and raise budget costs due to recovery expenditures.
Competitive loss: Leaked trade secrets may let rivals bypass costly R&D, undermining market leadership.
Reputation hit: Breaches erode trust — leaked designs or processes can drive away current and future partners.
Stock valuation: Attacks can lower share prices as well as shareholder confidence, as investors seek secure, stable returns.
Vulnerabilities: Stolen proprietary code or trade secrets, especially in aviation systems, could expose critical zero-day risks that in the future could turn manufacturer incidents into operational incidents.
Mighty wings: Preventing disasters
There’s no easy way to say this — aircraft and aerospace IP and R&D security must be commensurate with the value represented by one’s cutting-edge designs. However, when even advanced measures like network segmentation fall short, where can the sector turn?
Audit and plan ahead
For the sector’s complex supply chains and deeply involved research partnerships, awareness of the state of a connected party’s security affairs is key. Always verify third-party risk exposure (vulnerabilities, attack surface size, their own suppliers’ risk envelopes, etc.) and establish a far-reaching security strategy with accountability for CISO or other respective security managers.
Layered security
The building blocks of aviation IP and R&D security start with the endpoints that the concepts and designs are saved on, with added protection served by further layers added to endpoint security, like detection and response for fast incident resolution, vulnerability, and patch management to address security holes, or threat intelligence to empower security analysts with the right view of their firm’s APT group-infested threat surface.
Managed Detection and Response (MDR)
Where businesses sit in supply chains, especially sensitive areas like aviation and aerospace or in the red-hot UAV and drone sub-sector, achieving immediate improvement security can pay big dividends. SMB clients can have confidence in your security posture and compliance status if you’ve retained a reputable MDR service, and your security teams can also benefit from further input concerning your security environment.
Insights gained here may lead to positive use cases for custom deployment and upgrades, premium support, or even customized solutions based on the types of threats and mitigation your business faces in this arena.
Identity and access management
Limit access to sensitive projects using role-based access controls and monitor insider threats with behavioral analytics, enabled by Extended Detection and Response (XDR) tools, for example. Moreover, use only secure collaboration platforms with external partners, or try to have them secured with cloud app protection.
Awareness
A great way to prevent security incidents is to educate the workforce on what not to do when they see a suspicious email in their mailbox, for example. This can prevent as much as 60% of breaches, taking care of the human factor proactively.
Won’t get fooled again
All in all, for aviation and aerospace, security should be positioned as mission critical, occupying equal billing with innovation programs, recruiting and retaining talent, and securing contract awards. It cannot be seen as a post-incident expense, but rather as a major part of the business’ strategy. To take flight or break orbit, the cost of innovation is high, but the cost of neglecting cybersecurity is even higher, as exemplified by the cases mentioned in this blog. Thus, protecting IP and research isn’t optional; it’s mission critical.



Comments