The Qilin ransomware gang has claimed responsibility for a cyberattack on Tulsa International Airport (TUL) in Oklahoma, marking the aviation sector’s first reported ransomware incident of 2026. The Russian-speaking group posted 18 sample documents to its dark web leak site, including financial records, employee identification, and executive communications.

Incident overview

AttributeDetails
VictimTulsa International Airport (TUL)
LocationTulsa, Oklahoma, USA
Threat actorQilin ransomware gang
Discovery dateJanuary 30, 2026
Attack typeRansomware / Data extortion
Operations impactNone reported
Passenger securityNot compromised (per airport)
Data samples leaked18 documents

Timeline

DateEvent
UnknownInitial compromise (suspected weeks prior)
January 30, 2026Qilin lists Tulsa Airport on leak site
January 31, 2026Airport confirms cyberattack
February 1, 2026Sample documents analyzed by researchers
OngoingInvestigation continues

Data leaked

Executive communications

Document typeContents
CFO emailsContact details, correspondence with banking officials
Executive correspondenceHigh-level financial discussions
Banking communicationsRelationship details with financial institutions

Employee data

Document typeRisk
Employee ID copiesIdentity theft, physical access fraud
Personnel recordsSocial engineering enablement
Contact informationTargeted phishing

Financial documents

Document typeSensitivity
Yearly budget spreadsheetsOperational insight
Revenue spreadsheetsFinancial intelligence
Vendor revenue sheetsThird-party relationships
Insurance filesCoverage details
Document typeContents
Confidentiality agreementsNDA terms
Non-disclosure agreementsPartner relationships
Court case filesLegal proceedings
Governance minutesBoard decisions

Operational data

Document typeRisk
Tenant databasesBusiness relationships
Telehealth reportsHealth information
Operational recordsInternal processes

Airport response

Tulsa International Airport officials confirmed the attack but provided limited details:

“The attack has not compromised airport operations or passenger security.” — Airport spokesperson

What the airport has confirmed

StatementStatus
Cyberattack occurredConfirmed
Operations unaffectedConfirmed
Passenger security intactConfirmed
Full breach scopeNot disclosed
Ransom demandNot disclosed
Payment statusNot disclosed

What remains unknown

QuestionStatus
Initial access vectorUnder investigation
Dwell timeUnknown
Systems affectedNot disclosed
Total data exfiltratedUnknown
Ransom amount demandedNot disclosed

Expert analysis

Cybersecurity expert Tyler Moore commented on the attack credibility:

“These gangs… they need to be credible, that is why they post this information, and 99 times out of 100 at least, it is in fact” legitimate. “They will have compromised this data and then they will look for the stuff that is the most likely to get a response from the victim to pay a ransom.”

About Qilin ransomware

Group profile

AttributeDetails
First observedJuly 2022
LanguageGolang
ModelRansomware-as-a-Service (RaaS)
TacticsDouble extortion
OriginRussian-speaking

2025-2026 activity

MetricValue
2025 victims1,000+ organizations
January 2026 victims~48 organizations
2026 pace55+ victims by mid-January
Projected 2026On track to exceed 2025

Target sectors

SectorNotable victims
HealthcareCovenant Health (478K patients), UK NHS provider
AviationTulsa International Airport
GovernmentMultiple municipalities
EducationVarious institutions
ManufacturingIndustrial targets

Qilin notably does not self-restrict from targeting healthcare, critical infrastructure, or public services—making it one of the more reckless ransomware operations.

Aviation sector context

Critical infrastructure targeting

FactorRisk level
Operational disruption potentialHigh
Public safety implicationsSignificant
National security concernsPresent
Regulatory scrutinyIntense

Previous aviation incidents

TargetYearImpact
San Francisco International (attempt)2020Contained
European airports (various)2022-2023Data theft
Tulsa International2026Data exfiltration confirmed

The Tulsa attack marks the first confirmed aviation ransomware incident of 2026.

Tulsa International Airport profile

AttributeDetails
IATA codeTUL
TypeMulti-use (civilian and military)
Annual passengers~3 million
LocationTulsa, Oklahoma
OperatorTulsa Airports Improvement Trust

The airport’s dual civilian-military role potentially increases the sensitivity of any compromised data.

Potential regulatory implications

FAA and TSA considerations

RegulationPotential applicability
TSA cybersecurity directivesAirport systems requirements
FAA regulationsAviation safety systems
CISA guidanceCritical infrastructure

Reporting requirements

RequirementTimeline
CISA incident reporting72 hours (critical infrastructure)
State breach notificationVaries by affected individuals
TSA notificationAs applicable

Recommendations

For airport operators

PriorityAction
CriticalSegment IT from operational technology
CriticalImplement offline backup for critical systems
HighDeploy EDR across all endpoints
HighRestrict internet access for sensitive systems
MediumConduct tabletop exercises for ransomware

For affected individuals

If your data may be exposedAction
Airport employeesMonitor for identity theft, phishing
Vendors/partnersReview communications for fraud
ExecutivesEnhanced vigilance for BEC attacks

For aviation sector

PriorityAction
HighReview Qilin TTPs and IOCs
HighAudit vendor access and connections
MediumShare threat intelligence via ISACs
OngoingMonitor leak sites for industry targeting

Context

The Tulsa International Airport attack demonstrates that no sector is off-limits for ransomware groups like Qilin. While airport officials emphasize that operations and passenger security were not affected, the exfiltration of executive communications, financial documents, and employee data creates significant risks:

  • Business email compromise: Attackers can use executive email patterns for future fraud
  • Vendor targeting: Leaked relationships enable supply chain attacks
  • Employee targeting: ID copies and contact details enable identity theft and phishing
  • Competitive intelligence: Financial and operational data valuable to adversaries

The aviation sector should expect continued targeting given the high-value data airports maintain and the pressure critical infrastructure operators face to restore operations quickly.

Qilin’s January 2026 pace—approximately 48 victims in the first month alone—indicates the group’s operations are accelerating, not slowing. Organizations should ensure defenses are prepared for increasingly aggressive ransomware campaigns.