Ransomware is being blamed for non-working flight information screens at Bristol Airport in the UK over the weekend. Credit: Getty Images When travelers at Bristol Airport in the U.K. looked at flight information screens over the weekend, they saw a blue screen with white lettering that stated:OUT OF SERVICEWe are sorry for the inconvenience. Our Engineers are currently working to resolve the issue as soon as possible.Officials for the U.K.’s ninth busiest airport blamed it on a ransomware attack. The airport chose to take the electronic screens that normally direct travelers offline on Friday as a “precautionary measure” while they worked to “contain the problem.”Arrival and departure information was instead posted on whiteboards and announced over the public speaker system over the weekend.Bristol Airport tweeted about the “technical problems” with the flight information screens, making it clear that flights were unaffected. We are currently experiencing technical problems with our flight information screens. Flights are unaffected and details of check-in desks, boarding gates, and arrival/departure times will be made over the public address system. Additional staff are on hand to assist passengers— Bristol Airport (@BristolAirport) September 14, 2018While airport spokesman James Gore did not specify what ransomware variant hit the airport, he told the BBC that Bristol Airport would not pay the undisclosed ransom demand to get the system working.We believe there was an online attempt to target part of our administrative systems and that required us to take a number of applications offline as a precautionary measure, including the one that provides our data for flight information screens. That was done to contain the problem and avoid any further impact on more critical systems.Details of the cyber attackThe flight screens were offline starting Friday morning, all of Saturday, and into the wee hours of Sunday. Gore blamed the long downtime on a “cautious approach” as IT rebuilt affected systems, but “at no point were any safety or security systems impacted or put at risk.” The airport released a statement to the press about the administrative systems being subjected to an “on-line criminal attempt. A number of processes, including the application providing data for flight information screens in the terminal, were taken off line purely as a precautionary measure, while the problem was contained and to avoid any further impact.”The plan to use whiteboards, use additional announcements over the speakers, and bring in extra staff to keep passengers informed of flight information was part of an “established contingency plan.”Bristol Airport always remains vigilant against all types of hostile on-line activity. As with every event of any type we will monitor and keep under review how to avoid it re-occurring. However, it is important to recognize that security measures already in place ensured minimum disruption to passenger journeys.As is always the case in cyber attacks that result in computers being replaced by manually writing things down, people took to social media to complain about delays. At roughly 4:30 a.m. local time on Sunday, Bristol Airport tweeted a photo of the restored live flight information on the digital screens. Those restored screens were working in “key locations.”The airport followed that up with the following announcement:We are grateful to passengers for their patience while we have been working to resolve issues with flight information this weekend. Digital screens are now live in arrivals and departures. Work will continue to restore complete site-wide coverage as soon as possible.— Bristol Airport (@BristolAirport) September 16, 2018 Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe