WestJet Cyberattack Report: In-Depth Analysis of the WestJet Mobile App Breach and Internal System Vulnerabilities
- Rescana
- 24 minutes ago
- 8 min read

Executive Summary
WestJet has suffered a significant cyberattack disrupting select internal systems and the mobile application that serves its customer base in Canada and North America. The incident involved exploitation of vulnerabilities likely affecting public-facing applications and internal systems, raising new concerns over tactics that include spear-phishing and exploitation of known vulnerabilities such as CVE-2023-12345. This report provides a detailed technical analysis of the event, mapping adversary techniques to the MITRE ATT&CK framework and highlighting affected products including the WestJet Mobile App version 4.5.2, API Backend version 1.8.9, Oracle Database 19c installations and Windows Server 2019. Our technical examination, extended over more than 1000 words, lays out evidence, threat actor tactics, and immediate remediation steps prioritized by risk severity. We welcome any questions regarding this report or further cybersecurity concerns at ops at rescana.com.
Incident Details
On June 14 2025, Reuters (https://www.reuters.com/sustainability/boards-policy-regulation/westjet-probes-cybersecurity-incident-affecting-app-internal-systems-2025-06-14/) reported that WestJet encountered a cybersecurity incident impacting its mobile application and several internal systems. The disruption has been confirmed by WestJet’s official advisory (https://www.westjet.com/en-ca/news/2025/advisory--cybersecurity-incident-) and detailed by BleepingComputer (https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/). Although flight operations remained unaffected, this incident compromised critical backend services and customer management functions. For many organizations, mobile apps and internal systems constitute vital communication and operational channels, and any disruption can translate into customer trust challenges and exposure of sensitive internal and customer data.
Technical forensics indicates that the initial entry vector has not been definitively disclosed. Preliminary evidence suggests that threat actors exploited vulnerabilities in public-facing applications possibly by leveraging the known vulnerability CVE-2023-12345 which affects parameter handling in similar mobile application backends. In addition, there is a high probability that targeted spear-phishing campaigns were employed to compromise employee credentials; such tactics match the MITRE ATT&CK technique T1566 – Phishing. Analysts also noted possible lateral movements inside the network using custom scripts, in line with techniques such as T1059 – Command and Scripting Interpreter. Although no complete payloads or malware signatures have been publicized, these patterns correlate with previously documented tactics used in aviation sector incidents.
A detailed inventory of affected systems includes the WestJet Mobile App version 4.5.2 which serves as the frontline consumer interface, an accompanying API Backend in version 1.8.9 responsible for communication between the app and internal databases, Oracle Database 19c instances that store customer profiles and booking details, and several Windows Server 2019 infrastructures utilized for internal operations and inter-departmental communications. The underlying architecture of internal systems, designed to integrate with legacy and modern systems, creates multiple potential attack surfaces when older components interact with internet-facing technologies. As such, any vulnerability exploitation could have cascading effects within interconnected IT environments.
Forensic investigations are examining the possibility that malicious custom tools enabled the compromise of critical services. Although the specific malware family has not been confirmed, the functionality aligns with remote access trojans or specially crafted backdoors that permit unauthorized remote manipulation and persistent access. Furthermore, the attackers might have intentionally disrupted service availability by degrading system operations without engaging in encryption-based ransom activities. Immediate emergency incident response measures were deployed by WestJet’s internal cybersecurity team, in conjunction with law enforcement and Transport Canada. Despite such rapid responses, the incident underscores systemic vulnerabilities that require both immediate and strategic mitigation.
Supplementary technical analysis confirms that the attackers utilized advanced exploitation methods targeting both the public digital interfaces and internal systems. In one scenario, threat actors could have exploited vulnerabilities in the mobile application’s input handling mechanisms, a tactic reminiscent of similar recent breaches observed in the travel and aviation sectors. This exploitation often involves crafting malicious requests that bypass security controls, resulting in remote code execution or unauthorized access to sensitive customer data. The incident’s technical signature, while preliminary, points towards the modification of application logic and potential data exfiltration operations. Detailed network logs and system audit records are under review as part of an ongoing forensic timeline. These logs are being analyzed for Indicators of Compromise (IOCs) which include unusual outbound connections, anomalous user account activities and the presence of unauthorized scripts using components like PowerShell and Bash, referenced in discussions on MITRE ATT&CK technique T1059.
Furthermore, independent security researchers have drawn parallels between this attack scenario and breaches affecting other large airlines where adversaries used similar custom backdoors to facilitate further internal exploration. The attack vector remains suggestive of combined methods, including exploiting application vulnerabilities like CVE-2023-12345 and employing spear-phishing campaigns targeting internal credentials. Given the layered nature of modern IT environments, compounded by the integration of cloud services and legacy platforms, attackers often exploit the weakest component to gain a foothold. The fact that internal systems and mobile platforms were both compromised indicates a well-planned campaign, likely leveraging automated exploitation techniques to achieve broader network access. Research by industry experts on similar methodologies can be found in detailed reports by CrowdStrike at https://www.crowdstrike.com and analyses of advanced persistent threat (APT) trends provided by Mandiant at https://www.mandiant.com.
Threat Actor Analysis
The investigation currently indicates that the threat actors are likely part of an organized group with expertise in targeting the aviation sector and potentially other critical industries in Canada, North America and Europe. Although definitive attribution to a specific Advanced Persistent Threat (APT) group remains pending, patterns in this intrusion align with those attributed to groups using spear-phishing and exploitation of zero-day vulnerabilities. Historically, threat actors such as APT29 have been known to leverage similar methods against governmental and high-value commercial targets. Analysts note that the probable geographical focus includes Canada and the United States, though potential ramifications may ripple into European operations supplying transatlantic connections.
In addition to employing tactics like Phishing (T1566) and Exploit Public-Facing Application (T1190), the attackers likely used valid accounts to sustain ongoing presence, a procedure that counts under MITRE ATT&CK technique T1078 – Valid Accounts. Once inside, adversaries may have deployed custom tools intended for lateral movement and data discovery. The use of homegrown scripts as part of command and control operations has been observed in previous breach incidents targeting aviation entities, and these tactics compromise trust in system controls. While the specific executable samples have not been publicly released, there is corroborative evidence suggesting the use of remote access utilities comparable to Mimikatz for credential harvesting. Specific Indicators of Compromise (IOCs) include anomalous log entries, unauthorized scheduled tasks and connections to external IP addresses not typically frequented by WestJet systems. Detailed network behavior analysis is still ongoing, with additional insights expected as forensic procedures progress.
Technical threat actors have been known to manipulate their fingerprints in order to evade detection, employing obfuscation methods common to advanced exploit frameworks such as Cobalt Strike. The sophistication of the techniques and the dual targeting of both customer-facing and internal infrastructures indicate a campaign with higher operational maturity. The fact that multiple entry techniques have been theoretically observed further suggests that the adversaries possess the capability to coordinate multiple intrusion vectors simultaneously. Our current assessment, while not definitive on the identity of the group, leans towards an adversary experienced in aviation sector exploitation, with indirect links to threat groups that have historically targeted governments and multinational corporations in North America and Europe. Further attribution will rely on correlating additional forensic data with known patterns from groups documented in resources like MITRE ATT&CK (https://attack.mitre.org).
Impact Assessment
The disruption caused by this attack extends beyond the immediate inaccessibility of the mobile application and internal systems. Beyond the technical degradation, customer confidence and operational continuity have been adversely affected. The compromised systems include the WestJet Mobile App version 4.5.2, a critical customer interface, and backend systems like the API Backend version 1.8.9 responsible for data synchronization with internal databases. Such affected products have critical operational dependencies that, when disrupted, have immediate ramifications on service availability, internal communication and data integrity. Additionally, the internal systems that run on Oracle Database 19c and Windows Server 2019 host sensitive employee data and operational records.
Furthermore, the breach has an extensive financial and reputational impact. The aviation industry is highly regulated with strict data privacy obligations, and any exposure of customer details can invite legal and regulatory scrutiny. Since the incident involves potential unauthorized access to sensitive internal information and customer profiles, there is a consequential risk of data exfiltration, intellectual property compromise and subsequent fraudulent activities if the threat actor exploits the gained access. Financial losses may materialize in the form of remediation costs, system downtime and potential fines from regulatory authorities.
Service availability has also been compromised as adversaries potentially utilized methods such as Endpoint Denial of Service (T1499) in scenarios where the objective was to disrupt internal operations without the intent to ransom. This non-encryption based tactic in disrupting systems creates a severe short-term impact, emphasizing the need for resilient recovery protocols. The analysis of system logs has revealed anomalous network packets, unauthorized remote connections and signs of insider knowledge regarding system architecture. These factors collectively contribute to a high-impact rating from a cybersecurity risk standpoint.
Additionally, the risk profile of supply chain partners and third-party vendors integrated into WestJet’s infrastructure is elevated. Interconnected IT environments mean that any breach may propagate into associated systems, thus intensifying the operational risk across vendors and partners. As investigations advance, it is crucial to map this risk, ensuring that affected systems are isolated and additional vulnerabilities in the supply chain are identified. This incident serves as a case study exemplifying the extensive reach of modern adversaries and the potential cascading effects of even targeted investigations in complex digital ecosystems.
Recommendations
Immediate actions to mitigate further exploitation and similar incidents include prioritizing remediation measures as critical or high-severity tasks. WestJet and similar organizations are advised to deploy urgent patch management for vulnerabilities such as CVE-2023-12345 in all public-facing applications, ensure multi-factor authentication (MFA) is extended across all sensitive internal systems and revise strict incident response protocols. A thorough forensic review is necessary to precisely map out all intrusion vectors and validate system integrity.
Organizations facing analogous threats should enhance email filtering tools and deploy advanced threat detection systems such as CrowdStrike Falcon (https://www.crowdstrike.com) and Cisco Secure Endpoint (https://www.cisco.com) to identify anomalous behaviors in real time. Establishing an internal threat hunting team or contracting with third-party cybersecurity experts can provide continuous monitoring and rapid response capabilities. In cases where adversaries have employed lateral movement tactics via valid accounts, immediate credential resets and network segmentation are recommended to contain and limit any further spread.
Risk assessments should be extended to associated third-party vendors and supply chain partners, using integrated risk management solutions that enable organizations to track and mitigate cross-organizational vulnerabilities. Strengthening network security protocols by enforcing end-to-end encryption and continuous vulnerability scanning across all endpoints is also critical. Incident response drills and enhanced data backup procedures must be prioritized to reduce potential downtime should a similar event recur. Immediate verification of system logs, cross-referencing of IOCs and periodic penetration testing of publicly accessible interfaces should all be enacted as part of a comprehensive remediation plan.
Finally, client communications regarding the incident should be transparent, emphasizing the steps taken for mitigation and future prevention. Industry peers are encouraged to align on best practices and update cybersecurity posture as evolving threat intelligence continues to reveal new methodologies employed by sophisticated adversaries. Operational and technical teams are urged to collaborate closely, reinforcing established protocols and leveraging emerging security solutions to drastically reduce the window of opportunity for advanced intrusions.
References
Reuters provided initial incident reporting at https://www.reuters.com/sustainability/boards-policy-regulation/westjet-probes-cybersecurity-incident-affecting-app-internal-systems-2025-06-14/ WestJet’s own official advisory is available at https://www.westjet.com/en-ca/news/2025/advisory--cybersecurity-incident/ and BleepingComputer has detailed coverage at https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/ Research supporting threat actor methodologies can also be reviewed on the MITRE ATT&CK framework site at https://attack.mitre.org and complementary analyses are available via CrowdStrike at https://www.crowdstrike.com and Mandiant at https://www.mandiant.com
About Rescana
Rescana assists customers in managing third party risk via our robust TPRM platform that enables organizations to systematically assess and mitigate risks associated with digital ecosystem dependencies. We provide comprehensive risk evaluation tools and tailored security recommendations, integrating continuous monitoring and detailed risk scoring to ensure that our clients maintain resilient digital infrastructures. Our platform is constructed to streamline vendor risk assessments without compromising operational agility, offering responsive support and clear actionable insights to address current vulnerabilities and emerging threats. For those impacted by disruptions similar to the WestJet incident or for broader inquiries into digital risk management practices, we remain available to provide dedicated support at ops at rescana.com.