Tuesday, November 26, 2024
HomeComputer SecurityMoscow's Cable Car System Hacked Within Two Hours After it Opened

Moscow’s Cable Car System Hacked Within Two Hours After it Opened

Published on

Moscow’s first ever cable car system was forced to shut down within two hours after the launch. Cybercriminals hacked into the cable car system and infected with ransomware.

The cyber attack forced all the passengers to leave the cable car and the police reported that the cable car will no longer work.

An unknown person sent a message to the head of the Moscow Cable Cars operating company and asked to pay the ransom in bitcoins for decrypting the files that required for cable operators.

- Advertisement - SIEM as a Service

According to the letter sent, the ransom payment will vary based on how fast the car operating company respond to the letter sent by the attacker, reported Russian media.

Ransomware is one of the fast Growing threat in the worldwide and its considered as a leader of the Global cyber attack in recent days which cause some dangerous issues and loss in many organizations and individuals.

“A video on the Rossiiskaya Gazeta government daily’s website showed a police officer telling people waiting in line that the cable car would not reopen “for technical reasons.”

The cable car system not yet resumed the operations, operators did not provide any estimated time when the issue will be resolved.

Related Read

Ransomware Attack Response and Mitigation Checklist

Arran Brewery Hits Massive Ransomware Attack – Warned Other Companies to Stay Safe

Two Iranian Men charges for Deploying SamSam Ransomware on Hospitals & Public Sectors that Caused $30 M in Losses

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...