
Dublin Airport’s Terminal 2 is still running on manual backup procedures four days after a ransomware assault crippled the Common Use Terminal Equipment (CUTE) platform used by dozens of European airports. The daa, which operates the airport, said today it has “no definitive timeline” for a full restoration but confirmed that flights are operating on schedule with longer-than-normal queues at airline bag-drop desks.
The malware struck in the early hours of Saturday, 5 January, encrypting servers that host shared airline applications for check-in, boarding-pass printing and baggage reconciliation. Heathrow, Berlin and Brussels reported identical outages, pointing to a coordinated attack on the pan-European CUTE infrastructure managed by SITA. Ireland’s National Cyber Security Centre (NCSC) says investigators have isolated the exploit’s code signature but have not yet attributed the attack to a known threat actor.
Airlines at T2—including Aer Lingus, Delta and Emirates—have switched to resilience playbooks: agents hand-write bag tags, call passengers forward by loudspeaker and reconcile loads via standalone tablets. While departure punctuality has held up, average check-in processing times have doubled to 45 minutes in the morning wave, according to daa data.
If you’re double-checking entry rules before heading to the airport, VisaHQ’s Ireland portal (https://www.visahq.com/ireland/) lets you confirm visa requirements, apply online and even renew passports without another queue. Having the right documents sorted in advance removes one variable while T2 works through its technical woes.
For corporate mobility teams the incident is a reminder to factor cyber resilience into travel risk assessments. Travellers departing through T2 this weekend should arrive at least three hours before flight time and consider online check-in plus cabin-bag travel where possible. The daa says passengers who miss flights because of the cyber disruption will receive a written confirmation letter to support insurance claims. ([theliberal.ie](https://theliberal.ie/theres-no-timeline-to-resolve-check-in-and-baggage-issues-at-t2-after-cyber-attack-says-dublin-airport-authority/?utm_source=openai))
The malware struck in the early hours of Saturday, 5 January, encrypting servers that host shared airline applications for check-in, boarding-pass printing and baggage reconciliation. Heathrow, Berlin and Brussels reported identical outages, pointing to a coordinated attack on the pan-European CUTE infrastructure managed by SITA. Ireland’s National Cyber Security Centre (NCSC) says investigators have isolated the exploit’s code signature but have not yet attributed the attack to a known threat actor.
Airlines at T2—including Aer Lingus, Delta and Emirates—have switched to resilience playbooks: agents hand-write bag tags, call passengers forward by loudspeaker and reconcile loads via standalone tablets. While departure punctuality has held up, average check-in processing times have doubled to 45 minutes in the morning wave, according to daa data.
If you’re double-checking entry rules before heading to the airport, VisaHQ’s Ireland portal (https://www.visahq.com/ireland/) lets you confirm visa requirements, apply online and even renew passports without another queue. Having the right documents sorted in advance removes one variable while T2 works through its technical woes.
For corporate mobility teams the incident is a reminder to factor cyber resilience into travel risk assessments. Travellers departing through T2 this weekend should arrive at least three hours before flight time and consider online check-in plus cabin-bag travel where possible. The daa says passengers who miss flights because of the cyber disruption will receive a written confirmation letter to support insurance claims. ([theliberal.ie](https://theliberal.ie/theres-no-timeline-to-resolve-check-in-and-baggage-issues-at-t2-after-cyber-attack-says-dublin-airport-authority/?utm_source=openai))








