Categories: CyberCrimeSecurity

Transport For London Dealing With ‘Ongoing’ Cyber-Attack

Transport for London (TfL) said it has taken action to deal with an “ongoing” cyber-attack, but that the incident has not affected transport services and does not appear to have involved any compromise of customer data.

The organisation, which operates most of the capital’s transport services, said it was working closely with relevant government agencies including the National Crime Agency and the National Cyber Security Centre to assess and respond to the incident.

“We have introduced a number of measures to our internal systems to deal with an ongoing cybersecurity incident,” said TfL chief technology officer Shashi Verma in a statement.

“The security of our systems and customer data is very important to us and we will continue to assess the situation throughout and after the incident.

Back-end systems

“Although we’ll need to complete our full assessment, at present there is currently no evidence that any customer data has been compromised.

“There is currently no impact to TfL services and we are working closely with the National Crime Agency and the National Cyber Security Centre to respond to the incident.”

Verma did not specify the nature of the attack.

“We are working with Transport for London, alongside law enforcement partners, to fully understand the impact of an incident,” an NCSC spokesperson said.

The NCA said it was “aware” of a cyber incident involving TfL and was working closely with the NCSC and TfL to respond.

“The investigation is ongoing, and we are unable to comment further,” the NCA said.

The BBC reported that staff had been asked to work from home if possible, and said the incident had mainly affected TfL’s back-end systems at its corporate headquarters.

Andrew Lintell, general manager EMEA of cybersecurity firm Claroty, said that TfL’s size invites scrutiny from potential attackers and that such organisations operate cyber-physical systems that must be continuously monitored.

“Like any large, complex organisation, TfL must be mindful of the gap in its cyber hygiene standards,” Lintell said.

NHS attack

The event follows a ransomware attack in June on private pathology and diagnostic services provider Synnovis that affected NHS hospitals’ ability to match blood.

As a result, multiple London hospitals declared a critical incident, cancelled more than 10,000 operations and tests and were unable to carry out blood transfusions.

Russian criminal gang Qilin was behind the attack, former National Cyber Security Centre (NCSC) chief Ciaran Martin said.

Synnovis said at the time it had to cancel testing for 20,000 blood samples across 13,500 patients.

Qilin later shared nearly 400GB of data, including patient names, dates of birth, NHS numbers and descriptions of blood tests, on its dark web presence and Telegram channel.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Meta Shows Sound-Capable AI Video Generation Tool

Facebook parent Meta shows AI video generation tool Movie Gen that can create 16-second clips…

14 hours ago

US Think Tank Probes NASA Staff Over Trump, Musk Criticism

Conservative think tank requests NASA employee communications discussing Donald Trump, Elon Musk as it compiles…

14 hours ago

EU States Approve China EV Tariffs In Split Vote

EU member states approve hefty tariffs on China-made EVs in spite of opposition from Hungary…

15 hours ago

Google Threatens New Zealand News Ban Over Law

Google says it would stop linking to news in New Zealand if country passes law…

15 hours ago

The Age of Virtual Assistants

Discover how virtual assistants, powered by AI and innovative technology, are transforming industries and personal…

15 hours ago

Google Brings Ads To AI Search Summaries

Google begins broad roll-out of ads for AI Overviews in search results, adds AI-organised results,…

16 hours ago