Condensed threat matrix
Legacy protocols create new attack surfaces : One of the banes of the OT world is the reliance on legacy technology that cannot easily be patched or upgraded without causing major disruptions. Similarly, the Boeing 747-8 employs a hybrid bus architecture. While it integrates modern flight management technologies like the Thales TopFlight Flight Management System (FMS), many subsystems still rely on ARINC 429 and MIL-STD-1553, protocols that lack authentication or encryption. As mentioned in arXiv:1707.05032, this can leave vulnerabilities such as code injection and manipulation, data injection, data leakage and DoS. Even the newer Ethernet-based systems using AFDX (ARINC 664) lack cryptographic safeguards. As we just mentioned, traditionally, the 747 relies on physical controls such as restricted physical accessibility. In this case, that control has already been compromised. These channels expose the aircraft to MitM, spoofing and replay attacks, particularly during retrofitting or maintenance cycles. Ukwandu et al. (2022) highlight the avionics industry’s slow adoption of secure protocols. In industrial control environments, encryption overlays can mitigate similar threats, but latency concerns make this approach difficult to apply to real-time flight systems, where latency could cause serious consequences due to delayed flight control response.
b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=300%2C200&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=768%2C514&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=1024%2C685&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=1536%2C1028&quality=50&strip=all 1536w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=1240%2C826&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=150%2C100&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=1042%2C697&quality=50&strip=all 1042w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=251%2C168&quality=50&strip=all 251w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=126%2C84&quality=50&strip=all 126w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=717%2C480&quality=50&strip=all 717w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=538%2C360&quality=50&strip=all 538w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=374%2C250&quality=50&strip=all 374w” width=”1024″ height=”685″ sizes=”(max-width: 1024px) 100vw, 1024px” />
Daniel Hoffman
Implants hidden during retrofit : Physical access during retrofitting introduces other opportunities for adversaries: Embedding covert implants, often designed to activate under specific environmental triggers. Munro (2020) outlines scenarios where miniature computers (e.g., Raspberry Pi-class) are concealed inside avionics bays or power rails, undetectable without teardown, signal analysis or x-ray. These devices can be used for a variety of purposes.
Implants and embedded surveillance : Surveillance implants can be introduced during retrofit, as mentioned above. Devices such as passive RF microphones, compromised baseband transceivers or altered inflight entertainment systems may capture sensitive audio or telemetry. Habler, Bitton and Shabtai (2022) show how these systems resist conventional detection methods, making post-deployment audits extremely difficult. These implants evade standard EM sweeps and require teardown or x-ray inspection for detection.
Surveillance threat vectors :
Passive RF microphones. These devices can harvest ambient audio and transmit it using harvested electromagnetic energy making them extremely hard to detect using traditional EM sweeps. Compromised baseband transceivers. These are found in satellite phones, LTE modems or embedded SIMs and can silently leak GPS coordinates, conversations or system data. Tampered inflight entertainment systems (IFE). IFEs may appear benign but often sit on segmented yet accessible network backplanes. If compromised, they can bridge passenger interfaces with avionics. Non-traditional data exfiltration channels : When it comes to data exfiltration in a traditional IT/OT environment, we often rely on catching them on the way out by monitoring the transmission methods. That becomes much more complex on our 747. Radar emission modulation has been identified as a viable vector for stealth exfiltration. As outlined in NSA TEMPEST guidance (2023), such techniques mimic normal behavior and evade detection. Additional pathways include SATCOM hijacking, Bluetooth beacons or optical LED flicker, all under-monitored in legacy aircraft. Hardening this plane for use as AF1, we will need to consider these routes.
The supply chain as a soft target : The aviation supply chain continues to present a significant cybersecurity risk. Critical components such as firmware, diagnostic utilities and maintenance procedures may be altered or compromised during manufacturing or integration, especially when involving foreign vendors. The risk of malicious implants or latent, persistent vulnerabilities being introduced upstream is amplified by limited supplier visibility and insufficient cybersecurity controls across tiers (Aerospace Industries Association, 2023). A widely cited example is the 2020 SolarWinds breach, in which attackers compromised the Orion software update system to distribute malware to more than 18,000 organizations, including US federal agencies and Fortune 500 companies. The incident revealed how deeply embedded vulnerabilities in trusted vendor pipelines can bypass perimeter defenses and persist for months
Interior compromise : Cabin interiors present significant risks, particularly in classified missions. Seats, partitions and power outlets may hide passive surveillance devices or logic circuits. To align with SCIF and TEMPEST standards, best practices demand:
Full teardown and rebuild of interior components X-ray and RF scanning of structural cavities Chain-of-custody validation for all replacements RF shielding and acoustic integrity testing Standards like RTCA DO-355, DO-356A and CNSSAM TEMPEST/1-13 are essential to meeting executive transport and Continuity-of-Government mandates, Baker, Arlen & Parkinson, Paul. (2018).
Hardening retrofitted aircraft: actionable steps :
Apply RTCA and NIST best practices. Standards such as RTCA DO-355/356A and NIST SP 800-53 offer lifecycle risk frameworks, encryption recommendations and audit mechanisms. Though full-stack encryption may be infeasible, tailored implementations can reduce the attack surface without compromising performance. Validate every subsystem. Every avionics and support subsystem must undergo teardown, high-resolution imaging and verification against trusted baselines. Components failing this scrutiny should be replaced with certified domestic equivalents. Secure the toolchain. Vendors must meet DFARS cybersecurity requirements and ideally CMMC Level 2 or higher. Firmware developers and diagnostic engineers must operate within a verified secure development lifecycle (SDLC). Implement persistent telemetry and monitoring. Static scans are insufficient. Ongoing network behavior analysis, anomaly detection and forensic auditing are vital. This aligns with DoD recommendations in the 2023 Airborne Systems Cost Estimating Guide.
Cost and acquisition realities : While a donated airframe may seem economical, retrofitting costs can match or exceed new aircraft procurement. DoD and GAO benchmarks show that secure retrofits may cost hundreds of millions and still fall short of purpose-built assurances.
Domestic control still matters : Residual risk persists with foreign-origin systems, even after exhaustive review. This underlines the rationale behind VC-25B (Next AF1) procurement, a platform built domestically, under secure conditions. The project was slated for completion in 2024, Boeing now estimates 2027 2028. Which would still put delivery in line with, or ahead of a retrofit project, which could take 2-4 years according to Defense One and Aviation Source News. For a look at what would go into trying to secure this plane, read a sample blue team playbook.
Conclusion: A playbook for IT/OT convergence : This scenario serves as a high-stakes case study in securing legacy, cyber-physical systems. Cybersecurity leaders will increasingly face unconventional challenges. Whether it’s a power plant, a legacy fleet or a retrofitted aircraft, those who can bridge IT and OT worlds will shape the future of security strategy.This article is published as part of the Foundry Expert Contributor Network.Want to join?
First seen on csoonline.com
Jump to article: www.csoonline.com/article/4009002/foreign-aircraft-domestic-risks.html
b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=300%2C200&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=768%2C514&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=1024%2C685&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=1536%2C1028&quality=50&strip=all 1536w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=1240%2C826&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=150%2C100&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=1042%2C697&quality=50&strip=all 1042w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=251%2C168&quality=50&strip=all 251w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=126%2C84&quality=50&strip=all 126w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=717%2C480&quality=50&strip=all 717w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=538%2C360&quality=50&strip=all 538w, b2b-contenthub.com/wp-content/uploads/2025/06/hoffman-it-ot-convergence.png?resize=374%2C250&quality=50&strip=all 374w” width=”1024″ height=”685″ sizes=”(max-width: 1024px) 100vw, 1024px” />Daniel Hoffman
Implants hidden during retrofit : Physical access during retrofitting introduces other opportunities for adversaries: Embedding covert implants, often designed to activate under specific environmental triggers. Munro (2020) outlines scenarios where miniature computers (e.g., Raspberry Pi-class) are concealed inside avionics bays or power rails, undetectable without teardown, signal analysis or x-ray. These devices can be used for a variety of purposes.
Implants and embedded surveillance : Surveillance implants can be introduced during retrofit, as mentioned above. Devices such as passive RF microphones, compromised baseband transceivers or altered inflight entertainment systems may capture sensitive audio or telemetry. Habler, Bitton and Shabtai (2022) show how these systems resist conventional detection methods, making post-deployment audits extremely difficult. These implants evade standard EM sweeps and require teardown or x-ray inspection for detection.
Surveillance threat vectors :
Passive RF microphones. These devices can harvest ambient audio and transmit it using harvested electromagnetic energy making them extremely hard to detect using traditional EM sweeps. Compromised baseband transceivers. These are found in satellite phones, LTE modems or embedded SIMs and can silently leak GPS coordinates, conversations or system data. Tampered inflight entertainment systems (IFE). IFEs may appear benign but often sit on segmented yet accessible network backplanes. If compromised, they can bridge passenger interfaces with avionics. Non-traditional data exfiltration channels : When it comes to data exfiltration in a traditional IT/OT environment, we often rely on catching them on the way out by monitoring the transmission methods. That becomes much more complex on our 747. Radar emission modulation has been identified as a viable vector for stealth exfiltration. As outlined in NSA TEMPEST guidance (2023), such techniques mimic normal behavior and evade detection. Additional pathways include SATCOM hijacking, Bluetooth beacons or optical LED flicker, all under-monitored in legacy aircraft. Hardening this plane for use as AF1, we will need to consider these routes.
The supply chain as a soft target : The aviation supply chain continues to present a significant cybersecurity risk. Critical components such as firmware, diagnostic utilities and maintenance procedures may be altered or compromised during manufacturing or integration, especially when involving foreign vendors. The risk of malicious implants or latent, persistent vulnerabilities being introduced upstream is amplified by limited supplier visibility and insufficient cybersecurity controls across tiers (Aerospace Industries Association, 2023). A widely cited example is the 2020 SolarWinds breach, in which attackers compromised the Orion software update system to distribute malware to more than 18,000 organizations, including US federal agencies and Fortune 500 companies. The incident revealed how deeply embedded vulnerabilities in trusted vendor pipelines can bypass perimeter defenses and persist for months
Interior compromise : Cabin interiors present significant risks, particularly in classified missions. Seats, partitions and power outlets may hide passive surveillance devices or logic circuits. To align with SCIF and TEMPEST standards, best practices demand:
Full teardown and rebuild of interior components X-ray and RF scanning of structural cavities Chain-of-custody validation for all replacements RF shielding and acoustic integrity testing Standards like RTCA DO-355, DO-356A and CNSSAM TEMPEST/1-13 are essential to meeting executive transport and Continuity-of-Government mandates, Baker, Arlen & Parkinson, Paul. (2018).
Hardening retrofitted aircraft: actionable steps :
Apply RTCA and NIST best practices. Standards such as RTCA DO-355/356A and NIST SP 800-53 offer lifecycle risk frameworks, encryption recommendations and audit mechanisms. Though full-stack encryption may be infeasible, tailored implementations can reduce the attack surface without compromising performance. Validate every subsystem. Every avionics and support subsystem must undergo teardown, high-resolution imaging and verification against trusted baselines. Components failing this scrutiny should be replaced with certified domestic equivalents. Secure the toolchain. Vendors must meet DFARS cybersecurity requirements and ideally CMMC Level 2 or higher. Firmware developers and diagnostic engineers must operate within a verified secure development lifecycle (SDLC). Implement persistent telemetry and monitoring. Static scans are insufficient. Ongoing network behavior analysis, anomaly detection and forensic auditing are vital. This aligns with DoD recommendations in the 2023 Airborne Systems Cost Estimating Guide.
Cost and acquisition realities : While a donated airframe may seem economical, retrofitting costs can match or exceed new aircraft procurement. DoD and GAO benchmarks show that secure retrofits may cost hundreds of millions and still fall short of purpose-built assurances.
Domestic control still matters : Residual risk persists with foreign-origin systems, even after exhaustive review. This underlines the rationale behind VC-25B (Next AF1) procurement, a platform built domestically, under secure conditions. The project was slated for completion in 2024, Boeing now estimates 2027 2028. Which would still put delivery in line with, or ahead of a retrofit project, which could take 2-4 years according to Defense One and Aviation Source News. For a look at what would go into trying to secure this plane, read a sample blue team playbook.
Conclusion: A playbook for IT/OT convergence : This scenario serves as a high-stakes case study in securing legacy, cyber-physical systems. Cybersecurity leaders will increasingly face unconventional challenges. Whether it’s a power plant, a legacy fleet or a retrofitted aircraft, those who can bridge IT and OT worlds will shape the future of security strategy.This article is published as part of the Foundry Expert Contributor Network.Want to join?
Surveillance threat vectors :
Passive RF microphones. These devices can harvest ambient audio and transmit it using harvested electromagnetic energy making them extremely hard to detect using traditional EM sweeps. Compromised baseband transceivers. These are found in satellite phones, LTE modems or embedded SIMs and can silently leak GPS coordinates, conversations or system data. Tampered inflight entertainment systems (IFE). IFEs may appear benign but often sit on segmented yet accessible network backplanes. If compromised, they can bridge passenger interfaces with avionics. Non-traditional data exfiltration channels : When it comes to data exfiltration in a traditional IT/OT environment, we often rely on catching them on the way out by monitoring the transmission methods. That becomes much more complex on our 747. Radar emission modulation has been identified as a viable vector for stealth exfiltration. As outlined in NSA TEMPEST guidance (2023), such techniques mimic normal behavior and evade detection. Additional pathways include SATCOM hijacking, Bluetooth beacons or optical LED flicker, all under-monitored in legacy aircraft. Hardening this plane for use as AF1, we will need to consider these routes.
The supply chain as a soft target : The aviation supply chain continues to present a significant cybersecurity risk. Critical components such as firmware, diagnostic utilities and maintenance procedures may be altered or compromised during manufacturing or integration, especially when involving foreign vendors. The risk of malicious implants or latent, persistent vulnerabilities being introduced upstream is amplified by limited supplier visibility and insufficient cybersecurity controls across tiers (Aerospace Industries Association, 2023). A widely cited example is the 2020 SolarWinds breach, in which attackers compromised the Orion software update system to distribute malware to more than 18,000 organizations, including US federal agencies and Fortune 500 companies. The incident revealed how deeply embedded vulnerabilities in trusted vendor pipelines can bypass perimeter defenses and persist for months
Interior compromise : Cabin interiors present significant risks, particularly in classified missions. Seats, partitions and power outlets may hide passive surveillance devices or logic circuits. To align with SCIF and TEMPEST standards, best practices demand:
Full teardown and rebuild of interior components X-ray and RF scanning of structural cavities Chain-of-custody validation for all replacements RF shielding and acoustic integrity testing Standards like RTCA DO-355, DO-356A and CNSSAM TEMPEST/1-13 are essential to meeting executive transport and Continuity-of-Government mandates, Baker, Arlen & Parkinson, Paul. (2018).
Hardening retrofitted aircraft: actionable steps :
Apply RTCA and NIST best practices. Standards such as RTCA DO-355/356A and NIST SP 800-53 offer lifecycle risk frameworks, encryption recommendations and audit mechanisms. Though full-stack encryption may be infeasible, tailored implementations can reduce the attack surface without compromising performance. Validate every subsystem. Every avionics and support subsystem must undergo teardown, high-resolution imaging and verification against trusted baselines. Components failing this scrutiny should be replaced with certified domestic equivalents. Secure the toolchain. Vendors must meet DFARS cybersecurity requirements and ideally CMMC Level 2 or higher. Firmware developers and diagnostic engineers must operate within a verified secure development lifecycle (SDLC). Implement persistent telemetry and monitoring. Static scans are insufficient. Ongoing network behavior analysis, anomaly detection and forensic auditing are vital. This aligns with DoD recommendations in the 2023 Airborne Systems Cost Estimating Guide.
Cost and acquisition realities : While a donated airframe may seem economical, retrofitting costs can match or exceed new aircraft procurement. DoD and GAO benchmarks show that secure retrofits may cost hundreds of millions and still fall short of purpose-built assurances.
Domestic control still matters : Residual risk persists with foreign-origin systems, even after exhaustive review. This underlines the rationale behind VC-25B (Next AF1) procurement, a platform built domestically, under secure conditions. The project was slated for completion in 2024, Boeing now estimates 2027 2028. Which would still put delivery in line with, or ahead of a retrofit project, which could take 2-4 years according to Defense One and Aviation Source News. For a look at what would go into trying to secure this plane, read a sample blue team playbook.
Conclusion: A playbook for IT/OT convergence : This scenario serves as a high-stakes case study in securing legacy, cyber-physical systems. Cybersecurity leaders will increasingly face unconventional challenges. Whether it’s a power plant, a legacy fleet or a retrofitted aircraft, those who can bridge IT and OT worlds will shape the future of security strategy.This article is published as part of the Foundry Expert Contributor Network.Want to join?
Interior compromise : Cabin interiors present significant risks, particularly in classified missions. Seats, partitions and power outlets may hide passive surveillance devices or logic circuits. To align with SCIF and TEMPEST standards, best practices demand:
Full teardown and rebuild of interior components X-ray and RF scanning of structural cavities Chain-of-custody validation for all replacements RF shielding and acoustic integrity testing Standards like RTCA DO-355, DO-356A and CNSSAM TEMPEST/1-13 are essential to meeting executive transport and Continuity-of-Government mandates, Baker, Arlen & Parkinson, Paul. (2018).
Hardening retrofitted aircraft: actionable steps :
Apply RTCA and NIST best practices. Standards such as RTCA DO-355/356A and NIST SP 800-53 offer lifecycle risk frameworks, encryption recommendations and audit mechanisms. Though full-stack encryption may be infeasible, tailored implementations can reduce the attack surface without compromising performance. Validate every subsystem. Every avionics and support subsystem must undergo teardown, high-resolution imaging and verification against trusted baselines. Components failing this scrutiny should be replaced with certified domestic equivalents. Secure the toolchain. Vendors must meet DFARS cybersecurity requirements and ideally CMMC Level 2 or higher. Firmware developers and diagnostic engineers must operate within a verified secure development lifecycle (SDLC). Implement persistent telemetry and monitoring. Static scans are insufficient. Ongoing network behavior analysis, anomaly detection and forensic auditing are vital. This aligns with DoD recommendations in the 2023 Airborne Systems Cost Estimating Guide.
Cost and acquisition realities : While a donated airframe may seem economical, retrofitting costs can match or exceed new aircraft procurement. DoD and GAO benchmarks show that secure retrofits may cost hundreds of millions and still fall short of purpose-built assurances.
Domestic control still matters : Residual risk persists with foreign-origin systems, even after exhaustive review. This underlines the rationale behind VC-25B (Next AF1) procurement, a platform built domestically, under secure conditions. The project was slated for completion in 2024, Boeing now estimates 2027 2028. Which would still put delivery in line with, or ahead of a retrofit project, which could take 2-4 years according to Defense One and Aviation Source News. For a look at what would go into trying to secure this plane, read a sample blue team playbook.
Conclusion: A playbook for IT/OT convergence : This scenario serves as a high-stakes case study in securing legacy, cyber-physical systems. Cybersecurity leaders will increasingly face unconventional challenges. Whether it’s a power plant, a legacy fleet or a retrofitted aircraft, those who can bridge IT and OT worlds will shape the future of security strategy.This article is published as part of the Foundry Expert Contributor Network.Want to join?
Apply RTCA and NIST best practices. Standards such as RTCA DO-355/356A and NIST SP 800-53 offer lifecycle risk frameworks, encryption recommendations and audit mechanisms. Though full-stack encryption may be infeasible, tailored implementations can reduce the attack surface without compromising performance. Validate every subsystem. Every avionics and support subsystem must undergo teardown, high-resolution imaging and verification against trusted baselines. Components failing this scrutiny should be replaced with certified domestic equivalents. Secure the toolchain. Vendors must meet DFARS cybersecurity requirements and ideally CMMC Level 2 or higher. Firmware developers and diagnostic engineers must operate within a verified secure development lifecycle (SDLC). Implement persistent telemetry and monitoring. Static scans are insufficient. Ongoing network behavior analysis, anomaly detection and forensic auditing are vital. This aligns with DoD recommendations in the 2023 Airborne Systems Cost Estimating Guide.
Cost and acquisition realities : While a donated airframe may seem economical, retrofitting costs can match or exceed new aircraft procurement. DoD and GAO benchmarks show that secure retrofits may cost hundreds of millions and still fall short of purpose-built assurances.
Domestic control still matters : Residual risk persists with foreign-origin systems, even after exhaustive review. This underlines the rationale behind VC-25B (Next AF1) procurement, a platform built domestically, under secure conditions. The project was slated for completion in 2024, Boeing now estimates 2027 2028. Which would still put delivery in line with, or ahead of a retrofit project, which could take 2-4 years according to Defense One and Aviation Source News. For a look at what would go into trying to secure this plane, read a sample blue team playbook.
Conclusion: A playbook for IT/OT convergence : This scenario serves as a high-stakes case study in securing legacy, cyber-physical systems. Cybersecurity leaders will increasingly face unconventional challenges. Whether it’s a power plant, a legacy fleet or a retrofitted aircraft, those who can bridge IT and OT worlds will shape the future of security strategy.This article is published as part of the Foundry Expert Contributor Network.Want to join?
Conclusion: A playbook for IT/OT convergence : This scenario serves as a high-stakes case study in securing legacy, cyber-physical systems. Cybersecurity leaders will increasingly face unconventional challenges. Whether it’s a power plant, a legacy fleet or a retrofitted aircraft, those who can bridge IT and OT worlds will shape the future of security strategy.This article is published as part of the Foundry Expert Contributor Network.Want to join?
First seen on csoonline.com
Jump to article: www.csoonline.com/article/4009002/foreign-aircraft-domestic-risks.html
![]()

