Monday, March 3, 2025
HomeComputer SecurityMoscow's Cable Car System Hacked Within Two Hours After it Opened

Moscow’s Cable Car System Hacked Within Two Hours After it Opened

Published on

SIEM as a Service

Follow Us on Google News

Moscow’s first ever cable car system was forced to shut down within two hours after the launch. Cybercriminals hacked into the cable car system and infected with ransomware.

The cyber attack forced all the passengers to leave the cable car and the police reported that the cable car will no longer work.

An unknown person sent a message to the head of the Moscow Cable Cars operating company and asked to pay the ransom in bitcoins for decrypting the files that required for cable operators.

According to the letter sent, the ransom payment will vary based on how fast the car operating company respond to the letter sent by the attacker, reported Russian media.

Ransomware is one of the fast Growing threat in the worldwide and its considered as a leader of the Global cyber attack in recent days which cause some dangerous issues and loss in many organizations and individuals.

“A video on the Rossiiskaya Gazeta government daily’s website showed a police officer telling people waiting in line that the cable car would not reopen “for technical reasons.”

The cable car system not yet resumed the operations, operators did not provide any estimated time when the issue will be resolved.

Related Read

Ransomware Attack Response and Mitigation Checklist

Arran Brewery Hits Massive Ransomware Attack – Warned Other Companies to Stay Safe

Two Iranian Men charges for Deploying SamSam Ransomware on Hospitals & Public Sectors that Caused $30 M in Losses

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT)...

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT)...