Connect with us

Malware

Transport for London Reveals Alarming Cyberattack: Customer Data Compromised

Transport for London (TfL) has confirmed customer data was stolen in a cyber attack. TfL’s Oyster card and contactless payment systems were targeted, resulting in a partial shutdown of online services. The transport operator urges users to change their passwords and remain vigilant for potential phishing emails or fraudulent activity.

Published

on

A red double-decker bus, marked with advertising, is parked on a street in front of a large building exhibiting vertical lines on its facade. This scene is emblematic of Transport for London’s iconic transport system.

Did you know that on September 1st, the urban transportation agency, Transport for London (TfL), was hit by a cyberattack? Initially, they assured customers that there was no evidence of data being compromised. However, after further investigation, it turns out that some customer data was indeed impacted, including names, contact details, email addresses, and home addresses.

A Quick Recap of the Cyberattack

The attack was first made public on September 2nd, and since then, TfL staff has been dealing with system outages and disruptions. This includes the inability to respond to customer requests submitted via online forms, issue refunds for journeys paid with contactless methods, and more.

As we now know, the impact on customer data was not as minimal as initially thought. According to TfL’s status page, the investigation revealed that certain customer data had been accessed during the cyberattack.

Moreover, the agency discovered that the hackers may have accessed some Oyster card refund data and bank account number and sort codes for approximately 5,000 customers.

Worried about being affected? We can confirm that affected customers are receiving personalized notifications informing them of the data breach, so be sure to check your email to see if you’re among those impacted.

What Does This Mean for TfL Customers?

As TfL continues to work on remediation efforts, some services remain unavailable. Here’s a quick rundown of what you should be aware of as a customer:

  • Live Tube arrival info is unavailable on some digital channels, but in-station and journey planning info is still accessible.
  • Applications for new Oyster photocards, including Zip cards, are temporarily suspended. If you need to replace a lost card, call 0343 222 1234 (option 1).
  • If you can’t apply for a photocard, keep records of your fares; you might be able to get a refund once the cyber incident is resolved.
  • Contactless users can’t access their online journey history.
  • Refunds for incomplete journeys using contactless payment methods are unavailable. Remember to always touch in/out. Oyster users can manage refunds online.
  • Staff has limited system access, causing delays in online responses.

As of now, no ransomware gang has claimed responsibility for the cyberattack on TfL.

A Wake-Up Call for Better Cybersecurity

This incident serves as a reminder that we must be vigilant when it comes to cybersecurity. Businesses and individuals alike should take the necessary steps to protect their data and systems from cyber threats.

As an IT Services expert in cybersecurity, we’re here to help you stay informed and ensure you’re taking the right precautions to protect yourself from cyberattacks. So, don’t hesitate to reach out to us for advice or assistance. And keep coming back to learn more about how you can stay one step ahead of cyber threats.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Malware

Schneider Electric Confirms Dev Platform Breach: Hacker Seizes Sensitive Data in Bold Cyberattack

Schneider Electric has confirmed that its developer platform suffered a data breach, resulting in unauthorized access to product security vulnerability details. The breach was discovered on 10 August, after a hacker claimed to have stolen the data. Schneider Electric is working with security researchers to identify the individual responsible and the extent of the breach.

Published

on

A green sign featuring the Schneider Electric logo and "Life Is On" slogan stands prominently against a blurred green background, subtly reminding viewers of their resilience even amidst challenges like a cyberattack.

Imagine waking up one morning to find out that your entire database has been hacked, and critical information is now held hostage by a group of cybercriminals. That’s precisely what happened to Schneider Electric, a French multinational corporation known for its energy and automation products.

Unauthorized access to Schneider Electric’s data

A threat actor, who goes by the name “Grep,” recently taunted Schneider Electric on X, indicating they had breached the company’s systems. They claimed to have accessed Schneider Electric’s JIRA server using exposed credentials and scraped 400k rows of user data, including 75,000 unique email addresses and full names of the company’s employees and customers.

Schneider Electric confirmed the breach, stating that they were investigating a cybersecurity incident involving unauthorized access to one of their internal project execution tracking platforms. The company assured that its products and services remain unaffected by the breach.

A new hacking group emerges

Grep revealed to us that they had recently formed a new hacking group called the International Contract Agency (ICA), named after the game Hitman: Codename 47. Initially, the group didn’t extort companies they breached. However, upon discovering that the “ICA” name was associated with a group of Islamic terrorists, the threat actors rebranded themselves as the Hellcat ransomware gang and began developing an encryptor for future extortion attacks.

Extortion demands and a history of breaches

Grep is now extorting Schneider Electric, demanding $125,000 not to leak the stolen data and half of that amount if the company releases an official statement. This isn’t the first time Schneider Electric has faced a cybersecurity breach. Earlier this year, its “Sustainability Business” division fell victim to a Cactus ransomware attack, where the threat actors claimed to have stolen terabytes of data.

Don’t let this happen to you

As technology advances, so do the methods and tactics employed by cybercriminals. It’s essential to take cybersecurity seriously and invest in the right tools and strategies to protect your valuable data. Don’t wait until you become the next Schneider Electric. Instead, take action now to secure your digital assets and prevent a potential breach.

Keep coming back to learn more about the latest cybersecurity trends, tips, and best practices. We’re here to help you stay informed and protect your business from the ever-evolving world of cyber threats.

Continue Reading

Malware

Cisco Ensures DevHub Site Leak Won’t Empower Future Breaches

Cisco has assured customers that a recent data leak from its DevHub site will not enable future cyber breaches. The leak exposed sensitive information, including users’ API keys, but Cisco has taken the necessary steps to mitigate the potential risks and protect its users’ security.

Published

on

The Cisco logo gleams against a vibrant backdrop, with diagonal pink and blue streaks and small white dots, evoking a sense of innovative flair, reminiscent of the dynamic energy at DevHub.

Recently, a threat actor managed to download non-public files from a misconfigured public-facing DevHub portal. Although this sounds alarming, we want to reassure you that the exposed documents do not contain information that could be exploited in future breaches of our systems.

What exactly was exposed?

Upon analyzing the exposed documents, we found that their contents include data that we publish for customers and other DevHub users. However, files that shouldn’t have been made public were also available, some belonging to CX Professional Services customers.

“So far, in our research, we’ve determined that a limited set of CX Professional Services customers had files included and we notified them directly,” we said.

Our teams have worked diligently to assess the content of those files. We want to emphasize that we have not identified any information in the content that an actor could have used to access any of our production or enterprise environments.

What actions have we taken?

We have since corrected the configuration and restored public access to the DevHub site. Additionally, we’ve confirmed that web search engines did not index the exposed documents.

This update comes after we confirmed last month that we took our public DevHub site offline (a resource center for customers where we publish software code, templates, and scripts) after a threat actor leaked what we described at the time as “non-public” data.

It’s important to note that we found no evidence that any financial data or personal information had been exposed or stolen from the public DevHub portal before it was taken offline.

What about the alleged access to a developer environment?

The threat actor behind the leak, IntelBroker, claimed that they also gained access to a Cisco JFrog developer environment through an exposed API token. While we maintain that our systems haven’t been breached, information shared by the threat actor indicates that they also breached a third-party development environment, allowing them to steal data.

We’ve been contacted with further questions about IntelBroker’s claims, but we have not replied as of yet.

What’s the takeaway from all of this?

While the exposure of non-public files is a concern, we want to reiterate that the information contained within those files does not put our systems at risk for future breaches. We have taken the necessary steps to correct the configuration issues and restore access to our DevHub site, ensuring that such an incident doesn’t occur again.

As always, your security is our top priority. We encourage you to reach out to us with any questions or concerns, and keep coming back to learn more about how we’re working to protect your data and keep you safe.

Continue Reading

Malware

Interbank Admits to Data Breach After Unsuccessful Extortion Attempt and Massive Information Leak

Peruvian Interbank confirms a data breach after refusing to pay extortion demands. The hackers leaked customer information, but the bank assures no financial data was compromised. Interbank warns clients of potential phishing attacks and urges them to be cautious when providing personal information.

Published

on

A modern, glass-walled building with the Interbank logo at the top stands resilient against a blue sky background, despite recent buzz around a potential data breach.

Imagine waking up one day to find your personal and financial information plastered all over the internet. It’s a nightmare scenario, isn’t it? Well, that’s precisely what happened to a group of customers at Interbank, one of Peru’s leading financial institutions, which serves over 2 million people.

Interbank confirms data breach

Interbank recently confirmed that a data breach occurred, with a hacker gaining unauthorized access to its systems and leaking stolen data online. The bank immediately deployed additional security measures to protect its clients’ operations and information. While their online platforms and mobile app experienced temporary outages, Interbank has assured customers that their deposits are safe and that most of their operations are back online.

Stolen data for sale on hacking forums

As if the breach wasn’t bad enough, a threat actor with the handle “kzoldyck” has been spotted by Dark Web Informer selling the stolen data on several hacking forums. The data in question includes customers’ full names, account IDs, birth dates, addresses, phone numbers, email addresses, IP addresses, and sensitive financial information like credit card numbers, CVV codes, and even plaintext credentials.

The hacker claims to have information on more than 3 million customers, with a total data cache of over 3.7 terabytes. They also mention possessing internal API credentials, LDAP, and Azure credentials. It’s worth noting that the hacker reportedly attempted to extort Interbank’s management two weeks prior, but the bank refused to pay.

So, what can you learn from this?

As a U.S. reader, you might be thinking, “That’s terrible, but it’s in Peru, so it doesn’t affect me.” Unfortunately, that’s not the case. Cybersecurity threats know no borders, and hackers are constantly seeking out new targets. In fact, data breaches have become increasingly common in recent years, with a 2021 report from the Identity Theft Resource Center showing a 17% increase in publicly reported data breaches in the U.S. compared to 2020.

This case serves as a stark reminder that no one is immune to the dangers of cyber threats. It’s essential to stay vigilant and educate yourself on how to protect your personal and financial information. Consider working with IT Services who can provide you with guidance and resources to stay one step ahead of the hackers.

Don’t let this happen to you

Be proactive in safeguarding your data and take the necessary steps now to protect your information. Reach out to us at IT Services to learn more about how we can help you and your business stay safe in this digital age. Remember, the best defense is a good offense, so don’t wait for a data breach to happen before taking action.

Continue Reading

Trending

Copyright © 2023 IT Services Network.