Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Hacker Messed With the Wrong Transportation Agency

This Hacker Messed With the Wrong Transportation Agency

While San Francisco residents might not be happy that they’ll again have to pay fares to ride the city’s rail system, the reason they again have to do so is understandable. Plus, it provides an excellent example of the importance of maintaining a backup and using complex passwords.

A hacker or group of hackers, operating under the moniker Andy Saolis, managed to halt the collection of fares by the San Francisco Municipal Transportation Agency (or Muni) by hacking their station computer system and introducing a strain of ransomware into it. As a result, Muni employees were unable to access their workstations and some of the agency’s systems were disabled.

However, the hacker claimed to have accomplished more, as ticketing kiosks across the city would only display “you hacked. ALL data encrypted.” The ransom demand for the decryption key was approximately $73,000 in Bitcoin. Despite the hacker’s apparent confidence in their accomplishment, Muni elected to not pay the ransom, deciding instead to restore their systems from a backup and allowing cybersecurity experts to strike back against the hacker, not just once, but twice.

Two independent vigilante hackers managed to access the email account of “Andy Saolis” to collect information that helped to stop the attack, both by correctly guessing the answer to the account’s security question. It would seem that the hacker(s) known as Andy Saolis had been active for a while, but had never before targeted anything other than private companies, which very well may have led to their downfall.

Once the attack was thwarted it came to light that seemingly no data, including that from Muni’s customer payment systems, had been accessed, despite the attack affecting 25 percent of Muni’s network. Saolis, unsurprisingly, gave a considerably different account online.

Claiming to have stolen data from the payment kiosks, as well as 30 gigabytes of data from Muni’s system on their employees, customers, and technical matters, Saolis wasn’t shy about casting himself (or themselves) in the light of the vigilante against an unjust system.

According to an email sent through Russian service Yandex.com, “They give Your Money and everyday Rich more! But they don’t Pay for IT Security and using very old system’s !”

Shortly after the attack ended, security experts were also able to establish that the emailer was based in Iran, and had gained access to the hacker’s servers.

Though Muni never had to pay a ransom for their data, this attack wasn’t cheap, costing them the combined total of the free rides they granted to commuters as their systems were compromised. However, this total would certainly be less than the actual cost of the Bitcoin ransom, and so a good general rule to follow is to never give in to a hacker’s possibly insincere demands.

On the topic of the hacker, whose password was guessed by two separate strangers, how weak must this password have been? While nobody should ever complain about a hacker being foiled, it goes to show how a complete stranger could find their way into your accounts if you aren’t being careful..

This case is far from over, as the Federal Bureau of Investigation and the U.S. Department of Homeland Security are still investigating the matter, which provides proof that public systems are still unable to be fully trusted.

There is a lot for SMBs to learn from this story. How confident are you in your IT security? If you feel it’s time for a security audit in order to determine how protected your business is from all kinds of threats, reach out to Total Tech Care at 866-348-2602.

 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Communication Business Continuity IT Support Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Windows Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Passwords Windows 10 Chrome Virtualization Social Media Saving Money Holiday Gadgets Tech Term Automation Managed IT Services Managed Service Microsoft Office Facebook Computers Cybercrime Operating System Artificial Intelligence BYOD Health Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Remote Telephone Systems Information Technology Covid-19 Information Spam Alert Managed Service Provider Office 365 Recovery Employer-Employee Relationship Router BDR Bandwidth Social Engineering Mobility Money App History Encryption Mobile Computing Applications Human Resources Application Law Enforcement Remote Monitoring Big Data Password Data Breach Apps Office Tips Training VPN How To Government Blockchain Paperless Office Remote Computing Private Cloud Data Storage Mobile Office Patch Management Managed IT Servers Wireless Flexibility Marketing Gmail Data Security WiFi Google Drive IT solutions Entertainment Settings Website Budget Two-factor Authentication Avoiding Downtime Mouse HaaS Vulnerability Windows 7 Infrastructure Word Bring Your Own Device Voice over Internet Protocol Data Management Work/Life Balance Risk Management Hacker Vendor Management End of Support The Internet of Things Data Protection Education Physical Security Lithium-ion battery Vendor Safety Sports Managed Services HIPAA Display Redundancy Firewall Keyboard USB Employee/Employer Relationship Virtual Reality Apple Staff Software as a Service RMM Telephone System Machine Learning Social Connectivity Conferencing Remote Work User Error Save Time Meetings Scam Cleaning Net Neutrality Biometrics Workplace Strategy Fraud Virus Virtual Desktop Remote Worker Unsupported Software Help Desk Unified Threat Management Battery Printing Shadow IT Charger Computer Accessories DDoS Cryptocurrency Legal Compliance SharePoint OneNote Internet Exlporer Computer Care Managed Services Provider Current Events Comparison Database Telephony CES Samsung Printer Customer Service PDF Environment Bluetooth Remote Workers Fax Server Content Management Proactive IT Value Processor Business Technology Access Control Best Practice Electronic Medical Records Spam Blocking YouTube Hard Drive SaaS Virtual Assistant Authentication Black Market IT Consultant Hiring/Firing Humor Network Congestion Computing eWaste Document Management Solid State Drive Wireless Technology Update How to Downtime Business Intelligence Google Docs Digital Signage Data storage Identity Theft Audit Worker Wearable Technology Automobile Retail IT Management Hard Drives Instant Messaging Excel Botnet Robot Computing Infrastructure Augmented Reality IT Plan Going Green Procurement Benefits Search Engine Twitter Reputation Workers Streaming Media Social Network FENG Business Mangement Tech Support Investment Content NIST Windows Media Player Techology Smart Tech Laptop Employees IBM Trending User Employee/Employer Relationships PowerPoint Smart Technology ISP Flash Addiction Customers Windows 365 Amazon Recycling Science Video Conferencing ROI Audiobook Wiring Software Tips Practices Touchpad Sales Supercomputer Managing Stress Bitcoin Shortcuts Personal Cryptomining Sync Cache Point of Sale Emails Amazon Web Services Criminal Supply Chain Management Cameras Distributed Denial of Service Politics Safe Mode Customer Relationship Management Advertising GDPR Hosted Computing Analyitcs Monitoring Batteries Digitize Two Factor Authentication Wireless Internet Programming Windows 8.1 Netflix Online Shopping Notifications Root Cause Analysis Windows Server 2008 R2 File Sharing Camera HBO Inventory Customer relationships Knowledge Specifications Music IT Assessment Manufacturing Antivirus Skype Wire Relocation Email Best Practices Evernote Data loss Windows 8 Travel Printer Server Security Cameras Printers IT service Video Games Outlook Computer Tips Leadership Millennials Managed IT Service Troubleshooting OneDrive Biometric Security Worker Commute Start Menu Smart Office Virtual CIO Wireless Charging Screen Mirroring Tablet Peripheral Loyalty Experience Virtual Private Network Domains Scalability Frequently Asked Questions Digital Security Cameras Workforce Using Data Books Copiers 5G Business Owner Mobile Windows 10s Cables Maintenance Cast NarrowBand Quick Tip IaaS Smartwatch Project Management Search Tip of the week Nanotechnology Bloatware Ergonomics webinar Telecommuting Emergency Development Employer Employee Relationship OLED Professional Services iPhone Public Cloud Cortana Digital Signature Tablets PCI DSS Assessment Virtual Machine Employee Warranty Windows Server 2008 Entrepreneur 2FA Fiber Optics Google Apps Messaging Consultant Cabling Tools HVAC Files Shortcut Analysis Chromecast Policy Television Hypervisor Analytics Administrator Devices Cost Management Dark mode Trend Micro Uninterrupted Power Supply SMS Best Available Default App Enterprise Content Management Social Networking Colocation MSP Accountants Procedure Public Computer WIndows 7 Saving Time Transportation Google Search Microchip Regulations Thought Leadership Monitor dark theme Credit Cards Shopping Computer Fan Password Manager AI Rootkit IT Infrastructure Running Cable Password Management Memory FinTech Multi-Factor Security Bing

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code