Ransomware Victim Travelex Folds

Ransomware victim Travelex has been forced into administration with the loss of more than 1,300 jobs in the UK.  The accounting firm PwC has announced that it had been appointed join administrators of the currency exchange business and has said a cyber-attack followed by the Covid-19 crisis had "acutely" hit the firm. Travelex was held to ransom by hackers in January after the cyber-attack forced it to turn off its systems.

The Travelex Group was the global market leader in cash foreign exchange services. It traded in over 80 currencies and operates in more than 50 countries, both online and through a network of over 1,000 stores including major airports, with more than 1,000 ATMs around the world. 

The impact of a cyber-attack and the ongoing Covid-19 pandemic this year has acutely impacted the business. Despite operating over 1000 ATMs and 1000+ stores globally, and providing services for banks, supermarkets and travel agencies in over 60 countries, the firm was forced to cut over 1300 jobs as part of the restructuring.

It is unclear exactly how much these mistakes ended up costing the firm although reports suggested that the criminal REvil gang was demanding a $6m (£4.6m) ransom in return for the decryption key and deletion of stolen customer data. ​When the attacks happened hackers were holding Travelex to ransom after the cyber attack forced the firm to turn off all computer systems and resort to manual systems using pen and paper.

Parent company Finablr has said that a combination of the cyber-attack and the hit to business from COVID-19 was predicted to cost the firm £25m in Q1 2020, although it also claimed that cyber-insurance would cover a large part of its outgoings. PwC remained upbeat about the future of the company, following its £84 million restructuring. The administrators will be writing to creditors in the next few weeks to provide further information on the restructuring and the impact on creditors

PWC:      Infosecurity Magazine:     BBC:      BBC

You Might Also Read:

Companies Are Coughing Up Ransom To Recover Their Data:

 

« Ransomware Criminals Arrested In Ukraine
Boards Should Insist On A Cyber Audit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Thoma Bravo

Thoma Bravo

Thoma Bravo is a leading private equity firm with a 40+ year history and a focus on investing in software and technology companies.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.