Aeronautical Radio Incorporated (ARINC) of India has
been managing the check-in counters, transfers counters and boarding
gates at the IGI by using the Common Use Passengers Processing System
(CUPPS). About a year ago, the CUPPS
was infected with a malware and it caused great annoyance
to the passengers.
The central bureau of investigation (CBI) was called
in to investigate the issue. Now after a year CBI has come out with
the cause and reason for the abnormal use of CUPPS. According to CBI,
a disgruntled employee of Delhi airport’s service provider company
was responsible for disrupting the check-in, boarding and baggage
handling systems at Terminal 3.
It is claimed that the accused planted a malicious
script ‘kill.cmd’ at the servers. The accused worked with ARINC
as the system personnel. He was dissatisfied with his employment
growth and wanted to prove his caliber to the company. He was
expecting that by disrupting the system the company would call him to
seek his services.
The initial investigation focused on the insider’s
involvement as the system required multiple access with administrator
rights. Planting of the malware in such scenario was difficult except
for an insider. Further, the system was accessed multiple times from
remote locations in Bangalore. Let us see how this case would proceed
further.