San Francisco rail network held to ransom in malware hack
Commuters were temporarily able to ride for free on the city's transport links

San Francisco's transport agency has been hit by a malware hack, which temporarily allowed commuters to travel for free on the network.
The malware targeted computer systems across the city's transport network, disabling them with a message that read: "You Hacked, ALL Data Encrypted. Contact For Key(cryptom27@yandex.com)ID:681 ,Enter".
The hackers have issued a ransom demand of 100 Bitcoin, which equates to around $70,000 (56,000), for the return of full access to the system. As a precaution, all ticket machines were turned off during the investigation, according to officials.
Over 2,000 computers belonging to the Municipal Transport Agency (SFMTA), around 25% of the entire network, were infected by the malware, according to San Francisco news site Hoodline. The severity of the attack is still unclear, although the hackers have released documents pointing to essential internal functions including payrolls, email and database servers, and personal computer files of hundreds of employees.
"The incident remains under investigation, so it wouldn't be appropriate to provide any additional details at this point," said agency spokesperson Paul Rose. "At this point, there are not any indications of any impacts to customers."
As the system was unable to process payments, customers were able to ride for free.
The hackers used the HDDCryptor ransomware, also known as 'Mamba', to hijack the Windows OS on the network, encrypting hard drives and locking employees out.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Operating under the pseudonym 'Andy Soalis', often used in HDDCryptor ransom attacks, the hackers gave the agency "one more day" to transfer funds into a provided Bitcoin wallet.
"The SF Muni breach reinforces the repeated concerns many cyber security professionals have over internet-connected systems and the IoT as a whole," said Javvad Malik, security advocate at AlienVault. "Whenever systems are wholly digitised and made accessible publicly, there is a risk that hackers will try to gain access."
"Segregating critical systems from public systems is of utmost importance. This also includes physical segregation, so as not to have access ports or systems in publicly accessible places," added Malik.
The Municipal Transport Agency could still avoid paying the ransom, as the system does have backups that appear to have avoided infection. However, disruption is still likely to affect employees, as one anonymous SFMTA source speaking to KPIX 5 claims: "workers are not sure if they will get paid this week".
ESET security specialist Mark James believes that although the result has been free travel, users should be concerned that transport services have failed to keep data secure.
"If the systems are infected with ransomware, then access to other systems where credit card data may be stored could also be at risk, not to mention the regular data that people often overlook, such as names, addresses, DoB, security questions and answers. All or any of this may be used at a later date to obtain more data or attempted identity theft," added James.
Fare machines are now back up after the outage, however, the agency has so far remained quiet about how they managed to restore access, or if the malware is still in control of parts of the network.
Dale Walker is a contributor specializing in cybersecurity, data protection, and IT regulations. He was the former managing editor at ITPro, as well as its sibling sites CloudPro and ChannelPro. He spent a number of years reporting for ITPro from numerous domestic and international events, including IBM, Red Hat, Google, and has been a regular reporter for Microsoft's various yearly showcases, including Ignite.
-
Bridging the data disconnect
Sponsored Podcast How can businesses make the most of their data for customer success?
-
Lenovo Chromebook Plus 14 (Gen 10) review
Reviews The Lenovo Chromebook Plus 14 is a beautifully put-together, AI-ready Chromebook with excellent performance, good battery life, and a fantastic OLED screen
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward
News The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack
News The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities
News The attack on IT systems supplier Miljödata has impacted public sector services across the country
-
A notorious hacker group is ramping up cloud-based ransomware attacks
News The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware.
-
Security researchers have just identified what could be the first ‘AI-powered’ ransomware strain – and it uses OpenAI’s gpt-oss-20b model
News Using OpenAI's gpt-oss:20b model, ‘PromptLock’ generates malicious Lua scripts via the Ollama API.
-
Data I/O shuts down systems in wake of ransomware attack
News Regulatory filings by Data I/O suggest the costs of dealing with the attack could be significant
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos