• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Ransomware Crooks Demand $70,000 After Hacking San Francisco Transport System

November 28, 2016 by Jason A Lindsley 4 Comments

Hackers successfully encrypted over 2,000 servers and PCs that are used to run San Francisco’s Light Rail Transit system.  The hackers demanded 100 bitcoin (~ $73,000 USD) for the key to decrypt the data.  The attack mainly impacted e-mail and payroll systems, but agency shutdown their ticket vending machine as a precaution and allowed traveler to ride for free on the light rail system for most of the day Friday and all day Saturday.  This was one of the biggest travel days of the season.

The attack was conducted using malware called HDDCryptor.  It does not appear the the attackers were targeting the agency.  They cast a wide net and found success in the vulnerable environment.

Although it may have taken the agency more time to get the systems back up and running and they probably lost more than $73,000 in ticket sales, I think it was the right move to resolve the issue without paying the ransom.  They probably learned a lot about weaknesses in their environment and sent a strong message that they will not submit to the demands of these criminals.

 

link – http://www.forbes.com/sites/thomasbrewster/2016/11/28/san-francisco-muni-hacked-ransomware/#158b80fe54dd

http://www.wsj.com/articles/after-ransomware-san-francisco-offers-free-light-rail-rides-1480366454

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Marcus A. Wilson says

    November 29, 2016 at 9:18 am

    I was just reading about this on Gizmodo. Seems like an expensive and risky way to determine where your flaws are in your environment. I thought it was really interesting that it seems like the FBI usually recommends for the companies to just pay the ransom to get their data back. Definitely a good thing that MUNI was able to do it without giving in.

    Log in to Reply
    • Marcus A. Wilson says

      November 29, 2016 at 9:19 am

      link to the Gizmodo article: http://gizmodo.com/it-looks-like-the-san-fransisco-muni-hack-was-worse-tha-1789443579

      Log in to Reply
  2. Vaibhav Shukla says

    November 29, 2016 at 12:45 pm

    As mentioned the ransom malware HDD Cryptor was used I think this will be first very large scale disruption caused by this malware as this malware was more focused on personal PC where they easily trick people to pay bit coin .HDDCryptor, also identified as Mamba rewrites a computer’s MBR (Master Boot Record) boot sectors and locks users out of their PCs .
    I feel despite the fact the authorities didnt surrender to the ransomware they have incurred the loss through loss of money by sale of tickets

    Log in to Reply
  3. Ahmed A. Alkaysi says

    November 29, 2016 at 4:10 pm

    I agree. I liked that they continued the services without shutting everything down. Sometimes organization hit the panic button and unplug everything, that is not always the best way to respond. The most important thing is to make sure customers are impacted the least.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in