[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fDvhLokA5VCZaPhMmw2gRjgLm7XPGsX9mz776nJx_aY4":3},{"article":4,"iocs":46},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":26,"category":27,"article_tags":30},"2ee6dee1-a789-4b3b-ad65-5fc92e2104ec","Cyber Espionage Group Targets Aviation Firms to Steal Map Data","cyber-espionage-group-targets-aviation-firms-to-steal-map-data-833eb0","The campaign quietly compromises aerospace and drone operators to exfiltrate GIS files, terrain models, and GPS data and gain a clear picture of adversaries' world view.","A cyber espionage campaign is actively compromising aerospace and drone operators to exfiltrate GIS files, terrain models, and GPS data. The attackers are gathering geospatial intelligence to develop operational awareness of adversary capabilities and geography. The campaign appears designed to support intelligence gathering or military planning.","Cyber espionage group targets aviation firms to steal geospatial and GPS data.",null,"https:\u002F\u002Fwww.darkreading.com\u002Fvulnerabilities-threats\u002Fcyber-espionage-group-aviation-firms-steal-map-data","https:\u002F\u002Feu-images.contentstack.com\u002Fv3\u002Fassets\u002Fblt6d90778a997de1cd\u002Fbltcdb68c050b92d44f\u002F69fe24d5757b4d3f64b57d8a\u002Fdrone-mapping-system-DC_Studio-shutterstock.jpg?width=1280&auto=webp&quality=80&disable=upscale","2026-05-11T12:00:00+00:00","2026-05-11T14:00:13.353269+00:00",7,[18,21,24],{"name":19,"type":20},"Aviation GIS data exfiltration campaign","campaign",{"name":22,"type":23},"GIS (Geographic Information Systems)","technology",{"name":25,"type":23},"GPS\u002FGNSS systems","6cbdd207-aaa1-4176-9534-e156b125e917",{"id":26,"icon":11,"name":28,"slug":29},"Nation-state","nation-state",[31,36,41],{"category":32},{"id":33,"icon":11,"name":34,"slug":35},"26b0b636-0e31-4db1-bffb-61bdf9f20a58","Supply Chain","supply-chain",{"category":37},{"id":38,"icon":11,"name":39,"slug":40},"d6f63bb8-0801-486a-be7f-171400700454","IoT\u002FOT","iot-ot",{"category":42},{"id":43,"icon":11,"name":44,"slug":45},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]