• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cyber Attacks

How a supply-chain cyberattack paralyzed the Danish Railway ?

This is the first time in history that a ransomware cyber attack has blocked all railways travel nationwide.

Gert Van de VenbyGert Van de Ven
December 6, 2022
in Cyber Attacks, Cybercrime, Malware, News
1
How a supply-chain cyberattack paralyzed the Danish Railway ?

A ransomware hack has blocked a critical logistics tool for Denmark’s largest railway company. DSB is  the leading Danish railway operating company. The company was the victim of an impressive cyber attack on October 29, 2022. It  cripple the country’s entire railway network for several hours. This is the first time a hack has blocked all travel nationwide.

No known cyber criminal groups have come forward, so it is not known who was responsible for the attack. The Danish company confirmed that it was a criminal attack. The railway network resumed its rhythm at the end of the day. But the flaw is now clearly visible to all hackers.

Railways on cybercrime’s radar

The consequences of this attack in Denmark are still unprecedented. But this is not the first time a railway company has fallen victim to a cyber attack. Train display systems were hacked in Italy last March, while the ticketing system in the UK was crippled by ransomware a year ago. Belarusian hacktivists also blocked the national rail network earlier this year, when the Minsk regime was transporting weapons to help Russia attack the Ukrainian capital Kiev.

Hundreds of thousands of impacted users and high media visibility are two arguments that make railroad companies a prime target for hackers. The United States has taken the lead this month. The Transportation Security Administration (TSA), the authority in charge of transportation security, has issued a new directive to strengthen the cyber protection of the railway network.

A Software Supply Chain intrusion

A security incident at Supeo, a Danish firm that provides enterprise asset management solutions to railroads, infrastructure operators, and public transportation agencies, resulted in the incident. The company chose to shut down its systems as a result of the ransomware incident, which led to train delays. As a result, train drivers’ software stopped working.

Supeo provides a smartphone application. It gives train drivers critical operational information. Speed limits and railroad maintenance details for example. Carsten Dam Sonderbo-Jacobsen, DSB’s chief of security, declared that “We were contacted by our subcontractor who told us that their testing environment had been compromised by criminal hackers.”

The cyber attack did not target DSB computer network, but they in fine suffered from the consequences of it with the supply chain infection. Supply chain software vulnerabilities are more and more targeted by cybercriminal and state-sponsored adversaries. Software suppliers must implement supply-chain cybersecurity best practices to ensure the resilience of their product and their own customer.

Tags: Business RiskDenmarkRailwayransomwareSupply ChainSystemic Risk

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}