Transport for London (TfL) said it has taken action to deal with an “ongoing” cyber-attack, but that the incident has not affected transport services and does not appear to have involved any compromise of customer data.
The organisation, which operates most of the capital’s transport services, said it was working closely with relevant government agencies including the National Crime Agency and the National Cyber Security Centre to assess and respond to the incident.
“We have introduced a number of measures to our internal systems to deal with an ongoing cybersecurity incident,” said TfL chief technology officer Shashi Verma in a statement.
“The security of our systems and customer data is very important to us and we will continue to assess the situation throughout and after the incident.
“Although we’ll need to complete our full assessment, at present there is currently no evidence that any customer data has been compromised.
“There is currently no impact to TfL services and we are working closely with the National Crime Agency and the National Cyber Security Centre to respond to the incident.”
Verma did not specify the nature of the attack.
“We are working with Transport for London, alongside law enforcement partners, to fully understand the impact of an incident,” an NCSC spokesperson said.
The NCA said it was “aware” of a cyber incident involving TfL and was working closely with the NCSC and TfL to respond.
“The investigation is ongoing, and we are unable to comment further,” the NCA said.
The BBC reported that staff had been asked to work from home if possible, and said the incident had mainly affected TfL’s back-end systems at its corporate headquarters.
Andrew Lintell, general manager EMEA of cybersecurity firm Claroty, said that TfL’s size invites scrutiny from potential attackers and that such organisations operate cyber-physical systems that must be continuously monitored.
“Like any large, complex organisation, TfL must be mindful of the gap in its cyber hygiene standards,” Lintell said.
The event follows a ransomware attack in June on private pathology and diagnostic services provider Synnovis that affected NHS hospitals’ ability to match blood.
As a result, multiple London hospitals declared a critical incident, cancelled more than 10,000 operations and tests and were unable to carry out blood transfusions.
Russian criminal gang Qilin was behind the attack, former National Cyber Security Centre (NCSC) chief Ciaran Martin said.
Synnovis said at the time it had to cancel testing for 20,000 blood samples across 13,500 patients.
Qilin later shared nearly 400GB of data, including patient names, dates of birth, NHS numbers and descriptions of blood tests, on its dark web presence and Telegram channel.
Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…
Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…
Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…
Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…
Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…
Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…