Diamond Member Pelican Press 0 Posted September 26, 2024 Diamond Member Share Posted September 26, 2024 This is the hidden content, please Sign In or Sign Up ******* Network Rail Wi-Fi hack was work of malicious insider The This is the hidden content, please Sign In or Sign Up (BTP) have made an arrest in an ongoing investigation into a cyber ******* on public Wi-Fi services provided at mainline *** railway stations on the evening of Wednesday 25 September. The incident saw passengers at 19 rail stations across the country unable to access This is the hidden content, please Sign In or Sign Up Wi-Fi network, which are provided by communications services provider This is the hidden content, please Sign In or Sign Up , receiving instead *******, Islamophobic messages on their devices. Earlier on Thursday 26 September, Telent said that it had worked out that the incident was the result of an unauthorised change made to its landing page, and was working with This is the hidden content, please Sign In or Sign Up , the provider of this service, to investigate. As a result of the investigation, the BTP have now taken an unnamed man into custody on suspicion of conducting the *******. A spokesperson for the force said that the cyber ******* appeared to have been the work of a malicious insider. “The man is an employee of Global Reach Technology who provide some Wi-Fi services to Network Rail. He has been arrested on suspicion of offences under the Computer Misuse Act 1990 and offences under the Malicious Communications Act 1988,” they said. “Officers received reports just after 5pm yesterday (25 September) of a breach of some Network Rail Wi-Fi services at railway stations which were displaying Islamophobic messaging. The ****** of access was restricted to the defacement of the splash pages, and no personal data is known to have been affected.” In an update to its earlier statement, Telent said: “Telent can confirm that the incident was an act of cyber vandalism which originated from within the Global Reach network and was not a result of a network security breach or a technical ********. The aim is to restore public Wi-Fi services by the weekend. Telent are continuing to work with Network Rail, Global Reach and the British Transport Police.” Insider threat The cyber ******* had earlier prompted hasty speculation among armchair security experts that Network Rail was the victim of a supply chain *******, possibly by a nation state, against the ***’s critical rail infrastructure. Although this appears not to have been the case, the fact that an insider may have been responsible will be of grave concern to Global Reach, Telent, and their downstream customers such as Network Rail. A great many This is the hidden content, please Sign In or Sign Up actors turn out to be current or former employees bearing a grudge, although they can on occasion also be ****** conducting industrial or state-backed espionage. Many are also accidental threat actors who make a simple mistake, or are negligent and fail to comply with internal security measures, opening the door to external cyber **********. The threats such people present are difficult to detect and wide in their scope. The consequences of their attacks can be serious, including data breaches, ******, theft of intellectual property, and sabotage or destruction of IT systems. They can also, as is the case with the Network Rail incident, lead to great embarrassment and offence. This is the hidden content, please Sign In or Sign Up #******* #Network #Rail #WiFi #hack #work #malicious #insider This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/136026-racist-network-rail-wi-fi-hack-was-work-of-malicious-insider/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now