The Government of India has confirmed that cyberattacks involving GPS spoofing have targeted seven of its major airports. The incidents affected aircraft navigation systems during landing procedures at key hubs such as Delhi, Mumbai, Kolkata, and Bengaluru. GPS spoofing attacks involve broadcasting fake, powerful GPS signals to trick receivers into calculating an incorrect position or time. While the attacks caused disruptions to GPS-based navigation, authorities stated that there was no significant operational impact, with no flights being diverted or canceled. This was due to pilots and Air Traffic Control (ATC) successfully reverting to contingency procedures and using alternative navigation systems, such as the Instrument Landing System (ILS). The incidents serve as a stark warning about the vulnerability of modern aviation's reliance on GPS and the critical importance of resilient backup systems.
GPS spoofing is a type of radio-frequency (RF) interference attack where a threat actor broadcasts counterfeit GPS signals that are stronger than the legitimate satellite signals. This causes GPS receivers on aircraft to compute and display a false position, velocity, or time. In the context of an airport, this is extremely dangerous as it can mislead pilots during the critical approach and landing phases, which increasingly rely on GPS-based procedures like Required Navigation Performance (RNP).
The source and motive of the attacks have not been disclosed, but they could range from nation-state actors testing capabilities to malicious hobbyists. Regardless of the source, the ability to disrupt aviation at multiple major airports simultaneously represents a significant threat to national security and public safety.
T1601 - Interfere with Radio Frequency).While in this case there was no operational impact like diversions, the potential impact of a successful, undetected GPS spoofing attack is catastrophic. It could lead to a controlled flight into terrain (CFIT) accident, a runway excursion, or a mid-air collision if aircraft are given false separation data. The incidents demonstrate a credible threat to the safety and reliability of air travel. Economically, widespread GPS disruption could ground flights, causing massive financial losses for airlines and chaos for travelers. These events will likely spur increased investment in anti-spoofing technologies and further emphasis on training for operations in GPS-denied environments.
This type of attack does not generate traditional digital IOCs like IP addresses or file hashes. The indicators are anomalies in the radio frequency spectrum and navigation system behavior.
| Type | Value | Description |
|---|---|---|
| other | Sudden jump in reported GPS position | An aircraft's reported position suddenly moving to a new, physically impossible location is a key indicator of a spoofing attack. |
| other | Discrepancy between GPS and Inertial Navigation System (INS) | A growing difference between the position calculated by GPS and the position calculated by the onboard INS. |
| other | High received signal strength on GPS receiver | GPS signals from space are extremely weak. An unusually strong signal indicates a nearby terrestrial source, likely a spoofer. |
| log_source | Aircraft Integrated Modular Avionics (IMA) logs | Post-flight analysis of avionics data can reveal anomalies in the GPS signal that were recorded during the flight. |
Detection of GPS spoofing relies on detecting anomalies in the received signal or cross-validating position with other, independent systems.
The response, as demonstrated in these incidents, is to revert to established contingency procedures, declare the GPS as unreliable, and navigate using alternative means (ILS, VOR/DME, INS, and ATC radar vectoring).
Use encrypted and authenticated GPS signals (like military M-code) to prevent spoofing.
Maintain redundant, independent navigation systems (e.g., INS, ILS, VOR) that can be used when GPS is unavailable or unreliable.
Train pilots and ATC to recognize the signs of GPS spoofing and to execute contingency procedures for navigating in a GPS-denied environment.
The successful handling of the GPS spoofing incidents at Indian airports demonstrates the power of Redundant Data Array as a defensive concept. In this context, it means not relying on a single source (GPS) for critical position, navigation, and timing (PNT) data. Aircraft and Air Traffic Control must use a fused picture of navigation created from multiple, independent sources. This includes the aircraft's Inertial Reference System (IRS), which is immune to external RF interference, and ground-based radio navigation aids like Instrument Landing Systems (ILS) and VOR/DME. When the GPS data begins to diverge from the data provided by these other systems, it is a clear indication of a fault or attack. This redundancy and cross-checking is the most effective, currently available defense against GPS spoofing in civilian aviation.
To detect GPS spoofing in real-time, avionics systems and ground monitoring stations must perform Dynamic Analysis of the incoming GPS signals. This goes beyond simply decoding the position. The system should analyze the signal's characteristics, such as the received power level. A legitimate signal from an orbiting satellite is incredibly faint; a sudden, strong signal indicates a terrestrial spoofer. The system should also analyze the physics of the reported positions. If the GPS position 'jumps' instantaneously to a location miles away, or reports a velocity that is physically impossible for the aircraft to achieve, the system should flag the data as invalid. Implementing these real-time sanity checks within the GPS receiver's software can provide an automated, early warning of a spoofing attack.
In the context of aviation, User Behavior Analysis applies to the pilots and air traffic controllers. The fact that no accidents occurred during the spoofing attacks is a testament to their training and procedures. This is the human element of the defense. Pilots are trained to maintain a high degree of suspicion and to constantly cross-check their instruments. When the GPS-derived track on their navigation display does not match the expected track from the published approach chart or the heading given by their magnetic compass, their training prompts them to investigate and revert to backup systems. This 'human firewall' is a critical layer of defense. Continued, rigorous simulator training that includes various GPS failure and spoofing scenarios is the most important mitigation to ensure this human element remains robust.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats