Monday, February 10, 2025
HomeComputer SecurityMoscow's Cable Car System Hacked Within Two Hours After it Opened

Moscow’s Cable Car System Hacked Within Two Hours After it Opened

Published on

SIEM as a Service

Follow Us on Google News

Moscow’s first ever cable car system was forced to shut down within two hours after the launch. Cybercriminals hacked into the cable car system and infected with ransomware.

The cyber attack forced all the passengers to leave the cable car and the police reported that the cable car will no longer work.

An unknown person sent a message to the head of the Moscow Cable Cars operating company and asked to pay the ransom in bitcoins for decrypting the files that required for cable operators.

According to the letter sent, the ransom payment will vary based on how fast the car operating company respond to the letter sent by the attacker, reported Russian media.

Ransomware is one of the fast Growing threat in the worldwide and its considered as a leader of the Global cyber attack in recent days which cause some dangerous issues and loss in many organizations and individuals.

“A video on the Rossiiskaya Gazeta government daily’s website showed a police officer telling people waiting in line that the cable car would not reopen “for technical reasons.”

The cable car system not yet resumed the operations, operators did not provide any estimated time when the issue will be resolved.

Related Read

Ransomware Attack Response and Mitigation Checklist

Arran Brewery Hits Massive Ransomware Attack – Warned Other Companies to Stay Safe

Two Iranian Men charges for Deploying SamSam Ransomware on Hospitals & Public Sectors that Caused $30 M in Losses

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially unveiled Tor Browser 14.0.6, now accessible for download from the...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious...

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially unveiled Tor Browser 14.0.6, now accessible for download from the...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious...

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...