Categories: CyberCrimeSecurity

Transport For London Dealing With ‘Ongoing’ Cyber-Attack

Transport for London (TfL) said it has taken action to deal with an “ongoing” cyber-attack, but that the incident has not affected transport services and does not appear to have involved any compromise of customer data.

The organisation, which operates most of the capital’s transport services, said it was working closely with relevant government agencies including the National Crime Agency and the National Cyber Security Centre to assess and respond to the incident.

“We have introduced a number of measures to our internal systems to deal with an ongoing cybersecurity incident,” said TfL chief technology officer Shashi Verma in a statement.

“The security of our systems and customer data is very important to us and we will continue to assess the situation throughout and after the incident.

Back-end systems

“Although we’ll need to complete our full assessment, at present there is currently no evidence that any customer data has been compromised.

“There is currently no impact to TfL services and we are working closely with the National Crime Agency and the National Cyber Security Centre to respond to the incident.”

Verma did not specify the nature of the attack.

“We are working with Transport for London, alongside law enforcement partners, to fully understand the impact of an incident,” an NCSC spokesperson said.

The NCA said it was “aware” of a cyber incident involving TfL and was working closely with the NCSC and TfL to respond.

“The investigation is ongoing, and we are unable to comment further,” the NCA said.

The BBC reported that staff had been asked to work from home if possible, and said the incident had mainly affected TfL’s back-end systems at its corporate headquarters.

Andrew Lintell, general manager EMEA of cybersecurity firm Claroty, said that TfL’s size invites scrutiny from potential attackers and that such organisations operate cyber-physical systems that must be continuously monitored.

“Like any large, complex organisation, TfL must be mindful of the gap in its cyber hygiene standards,” Lintell said.

NHS attack

The event follows a ransomware attack in June on private pathology and diagnostic services provider Synnovis that affected NHS hospitals’ ability to match blood.

As a result, multiple London hospitals declared a critical incident, cancelled more than 10,000 operations and tests and were unable to carry out blood transfusions.

Russian criminal gang Qilin was behind the attack, former National Cyber Security Centre (NCSC) chief Ciaran Martin said.

Synnovis said at the time it had to cancel testing for 20,000 blood samples across 13,500 patients.

Qilin later shared nearly 400GB of data, including patient names, dates of birth, NHS numbers and descriptions of blood tests, on its dark web presence and Telegram channel.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Spyware Maker NSO Group Found Liable In US Court

Landmark ruling finds NSO Group liable on hacking charges in US federal court, after Pegasus…

9 hours ago

Microsoft Diversifying 365 Copilot Away From OpenAI

Microsoft reportedly adding internal and third-party AI models to enterprise 365 Copilot offering as it…

9 hours ago

Albania Bans TikTok For One Year After Stabbing

Albania to ban access to TikTok for one year after schoolboy stabbed to death, as…

10 hours ago

Foldable Shipments Slow In China Amidst Global Growth Pains

Shipments of foldable smartphones show dramatic slowdown in world's biggest smartphone market amidst broader growth…

10 hours ago

Google Proposes Remedies After Antitrust Defeat

Google proposes modest remedies to restore search competition, while decrying government overreach and planning appeal

11 hours ago

Sega Considers Starting Own Game Subscription Service

Sega 'evaluating' starting its own game subscription service, as on-demand business model makes headway in…

11 hours ago