Transport for London (TfL) recently experienced a cyber-attack that disrupted its digital operations. Fortunately, initial assessments indicate that no data breaches occurred, and the system is expected to recover using backup resources.
Both the National Crime Agency and the National Cyber Security Centre have been notified of the incident, and an investigation is currently underway to address the situation.
TfL’s Chief Technology Officer, Shashi Verma, has confirmed the cyber-security breach and has promised to provide more details as the investigation progresses.
Cybercriminals often launch attacks to either disrupt services or gain unauthorized access to sensitive information stored on servers. In this case, the attack seems aimed at halting network services to create concern and potentially incite political turmoil in the UK.
Earlier this year, in June, another major incident involved the NHS, which faced a cyber-attack resulting in the cancellation of thousands of appointments and the rerouting of emergency services to other facilities. This breach was linked to the Qilin Ransomware gang, which targeted Synnovis, a software-based pathology services provider. The attack led to significant disruptions within the NHS.
When the NHS refused to comply with the hackers’ demands, the Qilin group responded by leaking 400GB of stolen data on the dark web through a Telegram channel. This compromised information included patient names, dates of birth, blood test results, and diagnostic details.
In today’s landscape, many cybercriminals are turning to ransomware attacks, often facilitated by ransomware-as-a-service companies or by purchasing malware online. These attacks not only compromise sensitive information but also leverage extortion tactics to force victims into paying substantial ransoms.