Qilin Ransomware Group Targets Tulsa International Airport (TAIT)

The aviation sector has seen its first major ransomware casualty of 2026.

The Tulsa Airports Improvement Trust (TAIT), the governing body for Tulsa International Airport (TUL) and Riverside Parkway Port (RVS), has officially confirmed a data security incident following a targeted campaign by the Qilin ransomware group.

While flight operations remain unaffected, the breach has exposed sensitive administrative, financial, and personal data, highlighting persistent vulnerabilities in municipal infrastructure.

The breach was not a "smash and grab" but a multi-day dwell operation:

  • Initial Access: Unauthorized entry occurred between January 17 and January 20, 2026.
  • Discovery: TAIT IT monitoring flagged anomalous administrative activity on January 20, triggering an immediate isolation of the affected servers.
  • Public Disclosure: After a forensic audit, TAIT issued a formal notice on February 13, 2026, confirming the exfiltration of sensitive files.

The Russian-speaking Qilin group has claimed responsibility for the hit.

Unlike groups that focus solely on encryption, Qilin utilizes a double-extortion model.

The Proof : The group has already leaked 18 samples of the stolen data on their Dark Web onion site to pressure TAIT into negotiations.

Leaked files include:

  • C-Suite email correspondence with high-level banking officials.
  • PII: Copies of employee IDs, driver’s licenses, and passports.
  • Financials: Annual budget spreadsheets and revenue forecasts.
  • Legal: Tenant databases and non-disclosure agreements (NDAs).

As we see more infrastructure hits in 2026, a rising concern for the Hacklido community should be data poisoning or Shadow AI.

Preliminary reports suggest that some of the leaked "metadata" included prompts and outputs from unsanctioned AI tools used by staff for "summarizing" internal board meetings.

This creates a secondary risk: if an attacker knows what an AI is being used for, they can craft much more convincing AI-generated phishing lures for the next phase of the attack.

Lessons for Pentesters:

  • Focus on the Management Plane: Many organizations harden their core product but leave the Improvement Trust or Administrative arms with legacy MFA or weaker VPN protocols.
  • Exfiltration Monitoring: Detection shouldn't just be about unauthorized access, but about the volume of data leaving the network (Egress filtering).

Stay ahead. Stay dangerous.

Team Hacklido ❤️
Join our Community – https://t.me/hacklido