Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Hacker Messed With the Wrong Transportation Agency

This Hacker Messed With the Wrong Transportation Agency

While San Francisco residents might not be happy that they’ll again have to pay fares to ride the city’s rail system, the reason they again have to do so is understandable. Plus, it provides an excellent example of the importance of maintaining a backup and using complex passwords.

A hacker or group of hackers, operating under the moniker Andy Saolis, managed to halt the collection of fares by the San Francisco Municipal Transportation Agency (or Muni) by hacking their station computer system and introducing a strain of ransomware into it. As a result, Muni employees were unable to access their workstations and some of the agency’s systems were disabled.

However, the hacker claimed to have accomplished more, as ticketing kiosks across the city would only display “you hacked. ALL data encrypted.” The ransom demand for the decryption key was approximately $73,000 in Bitcoin. Despite the hacker’s apparent confidence in their accomplishment, Muni elected to not pay the ransom, deciding instead to restore their systems from a backup and allowing cybersecurity experts to strike back against the hacker, not just once, but twice.

Two independent vigilante hackers managed to access the email account of “Andy Saolis” to collect information that helped to stop the attack, both by correctly guessing the answer to the account’s security question. It would seem that the hacker(s) known as Andy Saolis had been active for a while, but had never before targeted anything other than private companies, which very well may have led to their downfall.

Once the attack was thwarted it came to light that seemingly no data, including that from Muni’s customer payment systems, had been accessed, despite the attack affecting 25 percent of Muni’s network. Saolis, unsurprisingly, gave a considerably different account online.

Claiming to have stolen data from the payment kiosks, as well as 30 gigabytes of data from Muni’s system on their employees, customers, and technical matters, Saolis wasn’t shy about casting himself (or themselves) in the light of the vigilante against an unjust system.

According to an email sent through Russian service Yandex.com, “They give Your Money and everyday Rich more! But they don’t Pay for IT Security and using very old system’s !”

Shortly after the attack ended, security experts were also able to establish that the emailer was based in Iran, and had gained access to the hacker’s servers.

Though Muni never had to pay a ransom for their data, this attack wasn’t cheap, costing them the combined total of the free rides they granted to commuters as their systems were compromised. However, this total would certainly be less than the actual cost of the Bitcoin ransom, and so a good general rule to follow is to never give in to a hacker’s possibly insincere demands.

On the topic of the hacker, whose password was guessed by two separate strangers, how weak must this password have been? While nobody should ever complain about a hacker being foiled, it goes to show how a complete stranger could find their way into your accounts if you aren’t being careful..

This case is far from over, as the Federal Bureau of Investigation and the U.S. Department of Homeland Security are still investigating the matter, which provides proof that public systems are still unable to be fully trusted.

There is a lot for SMBs to learn from this story. How confident are you in your IT security? If you feel it’s time for a security audit in order to determine how protected your business is from all kinds of threats, reach out to Total Tech Care at 866-348-2602.

 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Business Management Users Managed IT Services Windows Phishing Upgrade Data Backup Outsourced IT Ransomware Windows 10 Office Cloud Computing Server Save Money Data Recovery Windows 10 Passwords Chrome Social Media Gadgets Virtualization Tech Term Saving Money Holiday Managed Service Automation Managed IT Services Microsoft Office Cybercrime Artificial Intelligence Computers Operating System Facebook Internet of Things Health Wi-Fi BYOD Mobile Device Management Networking IT Support Hacking Information Alert Covid-19 Spam Office 365 Telephone Systems Managed Service Provider Remote Information Technology Employer-Employee Relationship Recovery Bandwidth Router Social Engineering BDR Mobility Data Breach Human Resources Mobile Computing Password Money Application Remote Monitoring Encryption Applications App History Big Data Law Enforcement Private Cloud VPN Managed IT Remote Computing Apps Mobile Office How To Office Tips Data Storage Blockchain Patch Management Government Training Paperless Office Gmail Settings Servers Flexibility Infrastructure Marketing Voice over Internet Protocol WiFi Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance IT solutions Entertainment Data Security Website Mouse Budget HaaS Google Drive Wireless Avoiding Downtime Vulnerability Windows 7 Word Remote Work Connectivity Vendor Save Time Managed Services Vendor Management Display Firewall Virtual Reality Cleaning Apple Employee/Employer Relationship Social RMM USB Data Protection End of Support User Error Education Meetings Physical Security Safety Sports HIPAA Redundancy Risk Management Hacker Keyboard Conferencing Telephone System The Internet of Things Staff Software as a Service Lithium-ion battery Scam Machine Learning IT Management Update Managed Services Provider Document Management Virus Solid State Drive Customer Service Wireless Technology Botnet How to IT Plan Downtime Environment Unified Threat Management Database Google Docs Computer Accessories Identity Theft Fax Server Remote Workers Unsupported Software Data storage Processor Automobile Charger SaaS Augmented Reality Printer Hard Drive Fraud Compliance Computing Infrastructure Bluetooth OneNote Going Green Computer Care Network Congestion Remote Worker Current Events eWaste Telephony Cryptocurrency Computing Samsung Battery Shadow IT IT Consultant Legal Value Comparison Spam Blocking Internet Exlporer Electronic Medical Records Wearable Technology Retail Humor Hard Drives CES Digital Signage Instant Messaging PDF Robot Excel Hiring/Firing Business Technology Content Management Biometrics Access Control Virtual Desktop Procurement Proactive IT Workplace Strategy Virtual Assistant Net Neutrality Best Practice Authentication YouTube Help Desk DDoS Business Intelligence Printing Black Market SharePoint Audit Worker Point of Sale Search Personal Analyitcs Digital Signature Public Computer Cryptomining Transportation Warranty Regulations Supply Chain Management iPhone Programming User Monitoring HVAC Computer Fan PowerPoint Batteries Google Apps Rootkit Windows Media Player Windows 8.1 Digitize Analysis Windows Server 2008 R2 Benefits Antivirus Administrator Files Devices Workers Managing Stress Customer relationships Enterprise Content Management FENG Chromecast Windows 8 Email Best Practices IT service MSP IT Assessment Accountants IBM Manufacturing Thought Leadership Cameras Uninterrupted Power Supply Credit Cards Smart Technology Microchip Flash Colocation Computer Tips Password Management Managed IT Service Tablet Password Manager Security Cameras Multi-Factor Security Virtual CIO Domains Software Tips OneDrive Monitor Supercomputer Biometric Security Twitter Emails Search Engine Sync Peripheral IaaS Digital Security Cameras Maintenance NIST Using Data Business Mangement Trending Copiers Reputation Bloatware Smart Tech 5G Streaming Media Addiction Netflix Printer Server Tech Support Amazon Two Factor Authentication Content Quick Tip Ergonomics Techology Root Cause Analysis Laptop Tablets Recycling Smartwatch Music Wiring HBO Development Customers Entrepreneur Practices Knowledge OLED PCI DSS Cache Virtual Machine Amazon Web Services Audiobook Skype 2FA Shortcut Safe Mode Data loss Fiber Optics Touchpad Criminal Employee Cabling Troubleshooting GDPR Outlook Messaging Cost Management Hosted Computing Leadership Policy Advertising Social Networking Wireless Internet Hypervisor Online Shopping Politics Start Menu Dark mode File Sharing Screen Mirroring Trend Micro Loyalty Default App Notifications Specifications Books Camera Frequently Asked Questions SMS Inventory Procedure Wire Windows 10s Saving Time Evernote Running Cable Mobile dark theme Cast Shopping Memory Google Search Travel IT Infrastructure Millennials Emergency Printers Tip of the week Consultant AI Relocation webinar FinTech Smart Office Public Cloud Analytics Wireless Charging Employer Employee Relationship Bing Professional Services Video Games Social Network Assessment Investment Workforce Worker Commute Virtual Private Network Windows Server 2008 Best Available Employees Employee/Employer Relationships Science Cables Experience Tools WIndows 7 Windows 365 Scalability Television ISP ROI Telecommuting Business Owner Project Management Video Conferencing Nanotechnology Sales Customer Relationship Management Bitcoin NarrowBand Cortana Shortcuts Distributed Denial of Service

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code