Security

San Francisco Public Transport Hit By Ransomware Attack

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Follow on: Google +

Passengers ride for free after ransomware shuts down Muni staff computers in San Francisco

San Francisco’s public transportation authority, Muni, allowed city centre passengers to travel for free over the weekend after its systems were allegedly reportedly by ransomware.

Muni left turnstiles to its city centre light rail system open on Friday night and all day on Saturday and ticketing systems were halted as a result of the incident, which caused a ransom message to display on employees’ computer screens, according to local reports.

 

Ransomware

Americas Cup 2Turnstiles returned to operation on Sunday.

Muni declined to confirm that a ransomware attack had caused the problem.

“The incident remains under investigation, so it wouldn’t be appropriate to provide any additional details at this point,” the organisation said in a statement.

Local television station KPIX, however, published an image of an employee computer screen displaying what appeared to be a demand generated by ransomware, reading: “You Hacked, ALL Data Encrypted.”

The attacker claimed to have encrypted 2,112 systems out of 8,656 on the network of the San Francisco Municipal Transportation Agency (SFMTA), according to a report by local news website Hoodline, which contacted the individual using the email provided in the message.

Automatic infection

The hacker claimed to have encrypted systems handling functins including payroll, email servers, Quickbooks, NextBus operations, MySQL databases, staff training and staff PCs, and demanded 100 Bitcoin – currently worth about £59,000 – to unlock them.

250px-San_Francisco_Bay_Trail_in_Hayward_Regional_ShorelineThe attacker provided the pseudonym “Andy Saolis”, which computer security researchers say is frequently used in connection with the HDDCryptor ransomware, and said they would give Muni until Monday to pay.

The attackers responded using broken English via an email address hosted on Russia’s Yandex Internet service.

They indicated SFMTA had been infected “automatically” rather than by a “targeted attack”. Most ransomware infections occur after an employee accidentally opens a malicious email attachment, according to researchers.

SFMTA’s backup servers weren’t affected, according to the list of systems provided by the attackers, meaning the agency might be able to restore the systems manually.

Ransomware attacks have increased dramatically in recent months, with those affected including hospitals and public authorities as well as banks and private individuals.

Do you know all about security in 2016? Try our quiz!