Monday, May 5, 2025
HomeCyber AttackRail Operator website Hacked and Hackers asked to Pay Ransom in Bitcoins

Rail Operator website Hacked and Hackers asked to Pay Ransom in Bitcoins

Published on

SIEM as a Service

Follow Us on Google News

Irsh rail operator website has been compromised and the attackers replaces the original websites files with a ransom note demanding to pay 1 bitcoin with 5 days.

Users who tried reaching the tram operator website last Tuesday saw a message claiming the website has been hacked and the company has taken the website down. Users are advised not to reach the website.

It appears more than 3,226 user records has been compromised in the cyber attack. The records are associated with the users who signed up to a Luas newsletter.

- Advertisement - Google News

The ransom note displayed as follows

You are hacked
some time ago i wrote that you have serious security holes
you didn't reply
the next time someone talks to you, press the reply button
you must pay 1 bitcoin in 5 days
otherwise I will publish all data and send emails to your users
btc address: 3FsR4CTUmumBJK12Zk8QRwdpPTJEY11aSX

Luas confirmed no financial information has been compromised, and the company to contact the affected users within 24 hours.

Luas announced that website has been compromised and the malicious message added to the homepage of the website. We currently have technicians working on the issue.

The site is being analyzed to identify how the attack occurred and technicians are working to restore the service for the customer. Luas transportation was not affected by the attack.

The Attacker said he reported to tram operator about the security holes in the website, and the attack appears to be a defacement attack.

Luas said that they will update customers via twitter, Facebook, AA Roadwatch and the media if there are any changes to services.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

15,779 Indian Websites Hacked During This Year (Jan – Nov) – CERT-India

3000 Hacked Websites Access comes to Sale in Russian Underground Dark Web Marketplace

Indian Hackers Group Hacked & Encrypt Pakistan Website Files Using KCW Ransomware

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site...

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed...

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain,"...

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft's WinDbg, dramatically...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site...

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed...

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain,"...