News

San Francisco Transit Hacker Hacked

Over the weekend, it emerged that the San Francisco Municipal Rail system (SFMTA) had been hacked, with employees greeted by ransomware on their computer terminals. In a delicious twist, an interested party who read about the San Francisco transit ransomware – in an article which listed the attacker’s e-mail address – decided to hack the hacker back. KrebsOnSecurity was contacted yesterday by an anonymous security researcher who had compromised cryptom2016@yandex.com, which sent ransomware demands requesting 100 Bitcoins (approximately $73,000).

“On Monday, KrebsOnSecurity was contacted by a security researcher who said he hacked this very same cryptom27@yandex.com inbox after reading a news article about the SFMTA incident,” the report reads. “The researcher, who has asked to remain anonymous, said he compromised the extortionist’s inbox by guessing the answer to his secret question, which then allowed him to reset the attacker’s email password. A screen shot of the user profile page for cryptom27@yandex.com shows that it was tied to a backup email address, cryptom2016@yandex.com, which also was protected by the same secret question and answer.”

KrebsOnSecurity enlisted the help of a number of experts to interpret the data purloined from the malicious e-mail account and found that the hacker had been scanning the internet for vulnerabilities they could exploit.

“It appears our attacker has been using a number of tools which enabled the scanning of large portions of the Internet and several specific targets for vulnerabilities,” Alex Holden, chief information security officer at Hold Security Inc., said. “The most common vulnerability used ‘weblogic unserialize exploit’ and especially targeted Oracle Corp. server products, including Primavera project portfolio management software.”

SFMTA was able to restore its systems without ceding to the hacker’s demands, with KrebsOnSecurity applauding the organisation for keeping extensive data backups for its systems. The hackers use of security questions, meanwhile, has been used as an example of what not to do when securing your accounts.

“As the SFMTA’s experience illustrates, having proper and regular backups of your data can save you bundles. But unsecured backups can also be encrypted by ransomware, so it’s important to ensure that backups are not connected to the computers and networks they are backing up,” KrebsOnSecurity says. “Finally, as I hope this story shows, truthfully answering secret questions is a surefire way to get your online account hacked.”

Ashley Allen

Disqus Comments Loading...

Recent Posts

Nintendo Switch Sales Surpass PlayStation 2 in the United States

In recent months, gamers have been closely monitoring Nintendo Switch sales as the console edges…

44 mins ago

Helldivers II Adds Killzone 2 Collaboration

Despite Helldivers II's popularity, fans have long felt the game lacked collaborations. Nearly a year…

8 hours ago

Call of Duty: Black Ops 6 Anti-Cheat System Didn’t Perform Well, TeamRICOCHET Admits

The anti-cheat system in Call of Duty: Black Ops 6 and Warzone has not met…

8 hours ago

NVIDIA’s New App Causes Game Slowdowns: Here’s How to Fix

The NVIDIA app, which recently replaced GeForce Experience, has gained popularity for its revamped interface…

8 hours ago

AMD May Launch Ryzen 5 9600 Non-X Variant in Late January 2025

AMD is gearing up to expand its CPU lineup in early 2025, with recent leaks…

8 hours ago

AMD Ryzen AI 7 350 from Upcoming Kraken Point Series Spotted on PassMark

Following the leak of AMD's flagship laptop CPU, another processor from the AMD Kraken Point…

8 hours ago