London Transport Hit By A Cyber Attack

Transport for London's (TfL) the local government body responsible for managing the transportation system in Greater London computer systems have been targeted in an on-going cyber attack and TfL has engaged with the UK government for a response.

According to TfL It said there was no evidence customer data had been compromised and there was currently no impact on TfL services and they are working with the National Crime Agency and the National Cyber Security Centre in response to the incident.

Employees have been asked to work at home, as the TfL IT systems at the corporate headquarters that are mainly affected. TfL’s chief technology officer Shashi Verma said: “We have introduced a number of measures to our internal systems to deal with an ongoing cyber security incident.... The security of our systems and customer data is very important to us and we will continue to assess the situation throughout and after the incident. 

The majority of cyber attacks typically involve hackers stealing sensitive data, and then either demanding a payment in exchange for deleting it, or selling it on the black market. So far, no evidence has emerged of TfL data being lost or stolen. "Although we’ll need to complete our full assessment, at present there is currently no evidence that any customer data has been compromised”, Verma said.

“The cyberattack on the Transport for London (TfL) marks a significant incident for an organization that millions of passengers rely on daily for its services. At this time, TfL does not believe its customer database has been compromised and says transport systems are not affected; however, the attack underscores the high-risk status of critical infrastructure in the UK, closely following this year’s cyberattack on the NHS which disrupted hospital operations and patient care.  
 
Threat actors can sit dormant in systems for extended periods of time and strategically plan to maximize the damage caused. While it’s not yet known when the TfL breach was initiated, the attack demonstrates the crucial need to detect and respond to unfolding cyberattacks as quickly as possible to minimize the impact of the incident. In this case, a successful attack on TfL has the potential to expose highly sensitive customer data as well as cause staffing shortages in critical industries, economic losses, and widespread commuter chaos. 
 
As cyberattacks on critical infrastructure increase in frequency and sophistication, it is vital that organizations make cybersecurity a top priority.

Kev Eley, Vice President UKI at Exabeam commented, "Critical infrastructure providers need to deploy a multifaceted cybersecurity strategy that prioritizes employee education and the continuous monitoring of anomalous behavior in both user and device activity. Organizations must build awareness around where their vulnerabilities lie, e.g. out of date patches or unsecure third-party suppliers, and ensure the basics of cybersecurity are being performed, including regular data-back-ups and following password hygiene best practice to form a well-rounded security foundation.”  

Joseph Carson, CISO at Delinea commented “While there have been no reported consequences to the public services and in an email to customers late Monday evening indicated that security is a top priority, so far no evidence of any customer data being compromised ... there is always the possibility of a more severe outcome once the incident response analyses the digital evidence...

"The reliability of public services is of the highest importance to the efficiency and productivity of our society and attacks like this can have far reaching consequences...

"The attempt is a reminder to consistently assess cyber risks with an aim to understand the IT ecosystem and lower the potential threat of cyber incidents. Visibility into who is accessing systems and the privileges they have can be make or break in critical systems and services” Carson said.

Right now, it is unclear who might be behind the attack, although TfL was previously targeted by Russian hackers last year as part of a wider attack that resulted personal information about employees being stolen.

TfL   |   BBC   |    Computer Weekly   |   Techradar   |   Chester Standard   |   ITPro   |   Computing   |   Standard

Image: @TfL 

You Might Also Read: 

London Hospitals Held To Ransom:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI & Biometrics In Cybersecurity
Bolster Security Using Dark Web Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

KPN

KPN

KPN is a leading supplier of ICT services including Cyber Security, Identity & Privacy, Secure Communications and Business Continuity.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

BlackBerry Security Services

BlackBerry Security Services

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Industrial Internet Consortium (IIC)

Industrial Internet Consortium (IIC)

The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Sigma IT

Sigma IT

SIGMA IT is one of the largest IT services organizations in EMEA region providing a full range of solutions and services including cybersecurity, data protection and business continuity.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

Insurica

Insurica

INSURICA is a full-service insurance agency built upon a tradition of integrity, industry leadership, and excellence.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.