London Transport Hit By A Cyber Attack

Transport for London's (TfL) the local government body responsible for managing the transportation system in Greater London computer systems have been targeted in an on-going cyber attack and TfL has engaged with the UK government for a response.

According to TfL It said there was no evidence customer data had been compromised and there was currently no impact on TfL services and they are working with the National Crime Agency and the National Cyber Security Centre in response to the incident.

Employees have been asked to work at home, as the TfL IT systems at the corporate headquarters that are mainly affected. TfL’s chief technology officer Shashi Verma said: “We have introduced a number of measures to our internal systems to deal with an ongoing cyber security incident.... The security of our systems and customer data is very important to us and we will continue to assess the situation throughout and after the incident. 

The majority of cyber attacks typically involve hackers stealing sensitive data, and then either demanding a payment in exchange for deleting it, or selling it on the black market. So far, no evidence has emerged of TfL data being lost or stolen. "Although we’ll need to complete our full assessment, at present there is currently no evidence that any customer data has been compromised”, Verma said.

“The cyberattack on the Transport for London (TfL) marks a significant incident for an organization that millions of passengers rely on daily for its services. At this time, TfL does not believe its customer database has been compromised and says transport systems are not affected; however, the attack underscores the high-risk status of critical infrastructure in the UK, closely following this year’s cyberattack on the NHS which disrupted hospital operations and patient care.  
 
Threat actors can sit dormant in systems for extended periods of time and strategically plan to maximize the damage caused. While it’s not yet known when the TfL breach was initiated, the attack demonstrates the crucial need to detect and respond to unfolding cyberattacks as quickly as possible to minimize the impact of the incident. In this case, a successful attack on TfL has the potential to expose highly sensitive customer data as well as cause staffing shortages in critical industries, economic losses, and widespread commuter chaos. 
 
As cyberattacks on critical infrastructure increase in frequency and sophistication, it is vital that organizations make cybersecurity a top priority.

Kev Eley, Vice President UKI at Exabeam commented, "Critical infrastructure providers need to deploy a multifaceted cybersecurity strategy that prioritizes employee education and the continuous monitoring of anomalous behavior in both user and device activity. Organizations must build awareness around where their vulnerabilities lie, e.g. out of date patches or unsecure third-party suppliers, and ensure the basics of cybersecurity are being performed, including regular data-back-ups and following password hygiene best practice to form a well-rounded security foundation.”  

Joseph Carson, CISO at Delinea commented “While there have been no reported consequences to the public services and in an email to customers late Monday evening indicated that security is a top priority, so far no evidence of any customer data being compromised ... there is always the possibility of a more severe outcome once the incident response analyses the digital evidence...

"The reliability of public services is of the highest importance to the efficiency and productivity of our society and attacks like this can have far reaching consequences...

"The attempt is a reminder to consistently assess cyber risks with an aim to understand the IT ecosystem and lower the potential threat of cyber incidents. Visibility into who is accessing systems and the privileges they have can be make or break in critical systems and services” Carson said.

Right now, it is unclear who might be behind the attack, although TfL was previously targeted by Russian hackers last year as part of a wider attack that resulted personal information about employees being stolen.

TfL   |   BBC   |    Computer Weekly   |   Techradar   |   Chester Standard   |   ITPro   |   Computing   |   Standard

Image: @TfL 

You Might Also Read: 

London Hospitals Held To Ransom:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI & Biometrics In Cybersecurity
Bolster Security Using Dark Web Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

Desec Security

Desec Security

Desec's training platform allows professionals around of the world to acquire knowledge and practical experience in Information Security.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.