Central Virginia transit system affected by cyber incident

Avatar

The organization that runs the transit system for central Virginia dealt with a computer network disruption due to a cyberattack around the Thanksgiving holiday.

The Greater Richmond Transit Company (GRTC) provides bus and specialized transportation services for millions of people across Richmond, Chesterfield and Henrico Counties.

A spokesperson told Recorded Future News that around Thanksgiving they experienced a network disruption that “temporarily impacted certain applications and parts of the GRTC network.”

“In response, our IT staff quickly discovered and restored our computer network. GRTC has also engaged third-party computer specialists to investigate the nature and scope of the incident,” the spokesperson said.

“All services are currently running as scheduled and GRTC does not expect any additional disruptions for riders at this time.”

The spokesperson declined to answer further questions about whether it was a ransomware attack or whether data was stolen during the incident.

The service — which is owned jointly by the city of Richmond and neighboring Chesterfield County — conducted more than 8.7 million rides in 2022 and last year served about 31,200 riders per weekday.

The Play ransomware gang took credit for the attack, posting the organization on its leak site on Thursday. The group gave GRTC until December 13 to pay an undisclosed ransom.

The ransomware gang has made a point of going after municipal services in 2023, launching devastating attacks on the city of Oakland, Dallas County and the Massachusetts city of Lowell.

Multiple public transit systems have faced attack over the last two years as they increasingly automate their services and systems. The St. Louis region’s Metro Call-A-Ride service for people with disabilities was attacked by ransomware actors in October, and a public transportation system for the state of Washington faced attack by a notorious ransomware gang in March.

The San Francisco Bay Area Rapid Transit (BART) was hit with ransomware in January, its second incident in recent years. Similar victims include the Silicon Valley-area Santa Clara Valley Transportation Authority in 2021 and the Philadelphia-area Southeastern Pennsylvania Transportation Authority in 2020.

The transit bureau for Cape Cod, Massachusetts, took weeks to recover last year after a Memorial Day weekend ransomware attack, and the Toronto Transit Commission (TTC) reported an attack in November 2021. Vancouver, Montreal, Sacramento, Fort Worth, Philadelphia and Ann Arbor have all seen ransomware attacks on their transportation systems over the last five years.

New York City’s Metropolitan Transportation Authority — one of the largest transportation systems in the world — was also hacked by a group based in China. While the attack did not involve ransomware and did not cause any damage, city officials raised alarms in a report because the attackers could have reached critical systems and may have left backdoors inside the network.

NewsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

FBI explains how companies can delay SEC cyber incident disclosures

Next Post

As Meta rolls out end-to-end encryption, police warn keeping children safe ‘no longer possible’

Related Posts

Microsoft Issues Patches for 51 Flaws, Including Critical MSMQ Vulnerability

Microsoft has released security updates to address 51 flaws as part of its Patch Tuesday updates for June 2024. Of the 51 vulnerabilities, one is rated Critical and 50 are rated Important. This is in addition to 17 vulnerabilities resolved in the Chromium-based Edge browser over the past month. None of the security flaws have been actively exploited in the wild, with one of them listed as
Avatar
Read More

10 Critical Endpoint Security Tips You Should Know

In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a business’s digital kingdom. And because of this, endpoints are one of hackers' favorite targets.  According to the IDC, 70% of successful breaches start at the endpoint. Unprotected endpoints provide vulnerable entry points to launch devastating cyberattacks. With IT
Avatar
Read More

Google to Block Entrust Certificates in Chrome Starting November 2024

Google has announced that it's going to start blocking websites that use certificates from Entrust starting around November 1, 2024, in its Chrome browser, citing compliance failures and the certificate authority's inability to address security issues in a timely manner. "Over the past several years, publicly disclosed incident reports highlighted a pattern of concerning behaviors by Entrust
Avatar
Read More