Apparently Transport for London are dealing with a cyber security incident.
It’s buried on their website, not on the front page or news sections, and has no date on it. https://tfl.gov.uk/campaign/cyber-security-incident
HT @joshbal4
Apparently Transport for London are dealing with a cyber security incident.
It’s buried on their website, not on the front page or news sections, and has no date on it. https://tfl.gov.uk/campaign/cyber-security-incident
HT @joshbal4
Transport for London have shut down outbound internet access and restricted systems inbound, eg they have cut off some Netscaler VPNs but left up others for home users.
They appear to be doing a containment. Unclear if ransomware so far as haven’t had time to crawl network traffic.. but it’s the containment steps you take for ransomware and extortion groups.
Looked into this, the TfL API server for tube data is down (has been for about a day)
@[email protected] Citymapper is showing a message saying that due to the cyber incidents, live tube timetable is not available. Strangely enough, the bus timetable also provided by TFL are still available
The Transport for London cyber incident is still ongoing.
The attackers got onto the corporate network, which is currently contained for recovery.
The operational (ICS) network wasn’t reached so services to customers continue uninterrupted.
Boundary internet services often offline, VPN restricted to home users, ERP systems, API systems etc offline.
If anybody is interested, the Transport for London cyber incident is still ongoing 3 days later - systems remain contained.
Two of the systems shut down 😅 https://beta.shodan.io/host/195.40.85.10
If anybody is wondering, Transport for London are still in containment 5 days in.
APIs, ERP etc still offline.
Update on Transport for London incident.
I can see prior traffic from their network to a crimeware group. #tfl #threatintel
Transport for London are still in containment phase, 7 days into their cyber incident.
Hopefully it focuses minds on boards who believe large scale cyber incidents can be resolved in a day. #tfl #threatintel
Day 9 of the Transport for London cyber incident
Two updates
- I’ve confirmed they’re still in containment phase, and internal services and API remain down.
- @zackwhittaker has an excellent spot - they’ve removed the statement about no evidence of customer data exfiltration, and then not commented when asked about it. https://techcrunch.com/2024/09/10/londons-transit-agency-drops-claim-it-has-no-evidence-of-customer-data-theft-after-hack/
Transport for London tell me they have identified data exfiltration of customer names, contact details, email addresses, and - in a small number of cases - bank account numbers and sort codes.
They are still in containment phase. #tfl #threatintel
For any press covering the #TfL hack - the 5000 bank accounts is separate to the customer names, emails and home addresses bit.
TfL didn't say how many people's details overall were accessed.
One of the things TfL have done in their containment phase is locked their IT staff's accounts, who aren't working on recovery -- and they're working to manually reauthenticate who their staff are, i.e. check their identities.
In entirely unrelated (👀) news, teenagers in LAPSUS$ and Scattered Spider often obtain access by calling up the helpdesk and saying they've lost their phone for MFA and/or forgot their password. Your containment playbooks should include stripping MFA devices.
Btw, I think Transport for London have done a really good job containing this. It would have been much worse, one suspects, had they not.
It sucks for staff but they prioritised customer service (i.e. transport) and safety over short term recovery, and that is very likely the correct pivot. I've seen these things go the opposite direct when orgs under react and it often ends really poorly.
I wonder if the person arrested has indicated that staff accounts have been compromised, or exfiltrated en-mass? 🤔🤷♂️
@GossiTheDog am I reading the last bit right.. That they are not allowing people to work from tfl offices (but presumably able to wfh)?
Seems the opposite of what I expected.
@GossiTheDog #alt4you #london #LondonTube
The security of our systems and customer data is very important to us, and we have taken immediate action to prevent any further access to our systems. We are working closely with the relevant government agencies to respond to the incident. While the public transport network is operating as usual, our proactive efforts to protect our services and secure our systems and data mean that: (1/3)
• Live Tube arrival information is not available on some of our digital channels, including TfL Go and the TfL website. In-station and journey planning information is still available
• Applications for Oyster photocards, including Zip cards, have currently been suspended
• Pay as you go contactless customers are unable to access their online journey history… (2/3)
• We are currently unable to issue refunds for journeys made using contactless cards, and Oyster customers will have to self-serve online
• Many of our staff have limited access to systems and email and, as a result, we may be delayed or unable to respond to your query or any webforms previously submitted We will update you further when the incident has been resolved. (3/3)
@GossiTheDog
Citymapper is showing a message saying that due to the cyber incidents, live tube timetable is not available.
Strangely enough, the bus timetable also provided by TFL are still available
spins the wheel of incidents
Hmm. Ransomware.
camera cuts to wheel of incidents; it's mostly ransomware with a tiny sliver marked insider threat, a couple of sparkly "state actor" wedges and "vendor did a fucky wucky"