Security

Cyber-crime

The fingerpointing starts as cyber incident at London transport body continues

Network admins take a ride on the Fright Bus


The Transport for London (TfL) "cyber incident" is heading into its third day amid claims that a popular appliance might have been the gateway for criminals to gain access to the organization's network.

TfL remains tightlipped over the nature of the incident and its broader impact, sticking instead to the line that there is currently no evidence of customer data being compromised or impact to TfL services. However, claims have emerged regarding how criminals got a foothold.

One source close to the matter told us, "The TfL hack was their Cisco VPN getting popped." Other reports noted that pretty much all outbound internet has been cut and inbound restricted, presumably to permit all the employees who found themselves suddenly needing to work from home to get online.

We put the suggestion to TfL that attackers may have gained access through a Cisco or Netscaler appliance, but the organization told us it would be inappropriate to comment while the incident was ongoing. The alarm was raised when TfL spotted some suspicious activity during routine monitoring. Access was subsequently limited.

Other reports say that an abrupt termination of Wi-Fi was the first indicator that all was not well on the network.

The contactless and Oyster account login page remains offline for the time being, while TfL does "maintenance for contactless." Other TfL functions, such as APIs used for live Tube times, are also currently offline, judging by sites such as Citymapper.

It is not unknown for researchers to point to vulnerabilities in Cisco hardware and software as handy access points for criminals. Deploying patches and keeping an eye on CVEs is an unpleasant game of whac-a-mole for administrators, but not keeping on top of things can have even more unpleasant consequences.

We asked Cisco if it wish to make a comment regarding the incident, but the the US company has yet to reply.

While TfL has remained silent during the incident, its containment steps – abruptly cutting off access – bear all the hallmarks of a reaction to a ransomware attack or exfiltration attempt. Its internal measures remain in place while the investigation takes place.

Depending on the nature of the breach, the UK's Information Commissioner's Office (ICO) should be notified within 72 hours. The Register asked the regulator if it had received a notification from TfL.

An ICO spokesperson wrote in an email, "Transport for London has made us aware of an incident and we are assessing the information provided." ®

Send us news
48 Comments

Ransomware's ripple effect felt across ERs as patient care suffers

389 US healthcare orgs infected this year alone

Would banning ransomware insurance stop the scourge?

White House official makes case for ending extortion reimbursements

Akira ransomware is encrypting victims again following pure extortion fling

Crooks revert to old ways for greater efficiency

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Veeam tests support for another VMware alternative: XCP-NG

As Gartner rates the contenders for those contemplating a move off Virtzilla, with Nutanix on top of the list

Microsoft says more ransomware stopped before reaching encryption

Volume of attacks still surging though, according to Digital Defense Report

VMware by Broadcom lifts storage allowances and prices for vSphere Foundation

This will both ease and exacerbate price concerns and competitive sniping

Volkswagen monitoring data dump threat from 8Base ransomware crew

The German car giant appears to be unconcerned

INC ransomware rebrands to Lynx – same code, new name, still up to no good

Researchers point to evidence that scumbags visited the strategy boutique

AMD downplays risk of growing blast radius, licensing fees from manycore chips

House of Zen says it's done the analysis, and concerns are a 'little bit' unfounded

AT&T and Broadcom may settle VMware support case

Fresh filing sees Broadcom admit it discounts deeply – music to the ears of all Virtzilla users coming off contract

Ransomware gang Trinity joins pile of scumbags targeting healthcare

As if hospitals and clinics didn't have enough to worry about