2 min read

One month after ransomware attack, Metro Vancouver's transit system still not up to speed

Graham CLULEY

January 05, 2021

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
One month after ransomware attack, Metro Vancouver's transit system still not up to speed
  • TransLink confirms attack saw hackers access staff payroll details
  • Egregor ransomware spat ransom demands out of hijacked printers

According to media reports, TransLink, Metro Vancouver’s public transportation agency, has warned its staff that hackers accessed their personal bank account details and other information.

The warning came in an internal email to workers approximately one month after Translink was struck by the Egregor ransomware and passengers had their journeys disrupted.

The email, seen by Global News advised staff that the hackers had “accessed and may have copied files from a restricted network drive” containing payroll information including banking details and social security numbers.

Workers were strongly advised to sign up for two-year credit monitoring at no cost.

The good news for passengers of Translink services is that the company does not store or have access to travellers’ payment information, and so it is only the firm’s employees that have been put at risk by the attack.

The attack, at the beginning of December 2020, saw hackers access company databases, plant the Egregor ransomware which locked down systems by encrypting data files, and even churn out a ransom note on hijacked printers.

Although passenger data was not apparently exposed, the attack on the TransLink service prevented travellers from being able to use their credit and debit cards for ticket payments.

Now, a month since the initial attack, Metro Vancouver’s public transport system has not fully recovered.

In a tweet, the company acknowledged that most of its systems “remain unavailable after cyberattack.”

From the sound of things, TransLink was unwilling to pay a ransom to the extortionists who attacked its systems with the Egregor ransomware. That’s an admirable stance to take, as paying ransoms undoubtedly encourages others to launch similar attacks in the future.

But it also means that, if you do not have a disaster recovery plan in place which can get systems up-and-running again from secure backups in a prompt fashion, that you could be left waiting an awfully long time before normal service is resumed.

Other recent victims of the Egregor ransomware include recruitment giant Randstad, video game maker Ubisoft, and South American retail giant Cencosud.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read