{"id":14304,"date":"2019-01-11T11:10:02","date_gmt":"2019-01-11T19:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/01\/11\/news-8056\/"},"modified":"2019-01-11T11:10:02","modified_gmt":"2019-01-11T19:10:02","slug":"news-8056","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/01\/11\/news-8056\/","title":{"rendered":"Luas data ransom: the hacker who cried wolf?"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 11 Jan 2019 18:00:00 +0000<\/strong><\/p>\n<p>In a terrible start to the year for Irish tram firm Luas, their <a href=\"https:\/\/www.buzz.ie\/news\/luas-website-hacked-with-company-held-to-ransom-for-one-bitcoin-312157\" target=\"_blank\" rel=\"noopener\">site was compromised<\/a>\u00a0a week ago and adorned with a stark ransom warning:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/hacked-site.jpg\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26822\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/luas-data-ransom-the-hacker-who-cried-wolf\/attachment\/hacked-site\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/hacked-site.jpg\" data-orig-size=\"1347,447\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"hacked site\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/hacked-site-300x100.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/hacked-site-600x199.jpg\" class=\"aligncenter size-medium wp-image-26822\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/hacked-site-300x100.jpg\" alt=\"hacked site\" width=\"300\" height=\"100\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/hacked-site-300x100.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/hacked-site-600x199.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/hacked-site.jpg 1347w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Click to enlarge<\/p>\n<blockquote>\n<p><em>You are hacked. Some time ago I wrote that you have serious security holes.<\/em><\/p>\n<p><em>You didn\u2019t reply.<\/em><\/p>\n<p><em>The next time someone talks to you, press the reply button.<\/em><\/p>\n<p><em>You must pay one bitcoin in five days. Otherwise I will publish all data and send emails to your users.<\/em><\/p>\n<\/blockquote>\n<p>The message came with a Bitcoin address, and the defacement was quickly taken down.<\/p>\n<h3>Real threat or a blast of bluster?<\/h3>\n<p>Many observers questioned the legitimacy of this ransom threat.<span class=\"Apple-converted-space\">\u00a0<\/span>One Bitcoin is currently around 3,100 Euros. Luas aren\u2019t exactly <a href=\"https:\/\/twitter.com\/gavreilly\/status\/1080778352993148928\" target=\"_blank\" rel=\"noopener\">short of cash<\/a>, so it wouldn\u2019t be an issue for them to pay (not that we\u2019d advise it). The general feeling was that either 3,100 Euros was a large sum of money to the attacker, or they just wanted the company to address the problem facing them without fuss.<\/p>\n<p>As soon as the hack was announced, nervous customers wondered exactly what might be dumped into the ether should the ransom go unpaid. Names and addresses? Emails? Perhaps even payment data? However, this is where the hacker\u2019s version of events starts to unravel. I\u2019m not personally familiar with the website in question, and it\u2019s currently still down, so I looked on Internet Archive.<\/p>\n<h3>A trip down memory lane<\/h3>\n<p>The site doesn\u2019t appear to have any form of registration or login; it seems to be <a href=\"https:\/\/web.archive.org\/web\/20181127011542\/https:\/luas.ie\/\" target=\"_blank\" rel=\"noopener\">more of an information portal<\/a>. Additionally, the one section that references payment\u2014\u201cPay your standard fare notice\u201d\u2014leads to the <a href=\"https:\/\/web.archive.org\/web\/20180619165923\/https:\/payments.luas.ie\/default.aspx\" target=\"_blank\" rel=\"noopener\">payments site<\/a>, which Luas pointed out <a href=\"https:\/\/web.archive.org\/web\/20190103231742\/https:\/www.luas.ie\/\" target=\"_blank\" rel=\"noopener\">hadn\u2019t been compromised<\/a>. The site read as follows:<\/p>\n<blockquote>\n<p><em>The Luas website is undergoing restoration following a cyber-attack.<\/em><\/p>\n<p><em>We wish to advise customers that the Tax Saver and Standard Fare Notice sites have NOT been compromised.<\/em><\/p>\n<\/blockquote>\n<p>It\u2019s worth noting the payments section hasn\u2019t been taken offline, either.<\/p>\n<h3>The hacker who cried wolf?<\/h3>\n<p>We waited with baited breath as the ransom timer ticked down. Would we see a large blast of customer data popping up online? Or would the whole thing fall flat? If essential information such as logins and payment data hadn\u2019t been grabbed, what exactly were we talking about here? Basic website metrics such as visitor stats or website referrers? What could this attacker possibly have grabbed while achieving what appears to have been a perfectly standard webpage defacement in all other respects?<\/p>\n<p>The answer is, of course, \u201cNobody knows.\u201d<\/p>\n<p>The deadline has come, gone, and is now on vacation somewhere. Occasionally, it lets you know the weather is lovely and reminds you to put the bins out.<\/p>\n<p>Absolutely none of which helps anybody who suspects they may have been caught up in this. Even more slightly surreal is the fact Luas said they\u2019d <a href=\"https:\/\/web.archive.org\/web\/20190105075749\/https:\/www.luas.ie\/\" target=\"_blank\" rel=\"noopener\">contact anyone<\/a> they thought may be affected, but there\u2019s zero example of said contact on social media that I can find.<\/p>\n<blockquote>\n<p><em>Customers: An update on the Luas cyberattack.<\/em><\/p>\n<p><em>Luas technicians are still investigating it and are working to restore the site.<\/em><\/p>\n<p><em>Luas has contacted the Commissioner for Data Protection and we have in accordance with best practice contacted everyone whose information may have been compromised.<\/em><\/p>\n<\/blockquote>\n<p>This is absolutely not what normally happens, and at this point I\u2019d usually be linking to a deluge of \u201cyou got me\u201d posts. That\u2019s the theory. The reality, currently, is nothing but a wave of silence.<\/p>\n<h3>This number is no longer available<\/h3>\n<p>Our suspicion here is that nothing customer related was taken and it was all a ransom-themed bluff to either grab some Bitcoin cash or attention, or perhaps both. If you\u2019ve used any Luas site for any type of registration or payment, you\u2019re probably fine.<\/p>\n<p>Unless the site compromiser had a sudden change of heart, they were going to dump the data in public fashion instead of some hidden underground forum, but it hasn\u2019t happened. People may call them \u201cunderground,\u201d but the reality is data dumps don\u2019t remain private for long.<\/p>\n<p>No further updates are forthcoming from Luas, so it doesn\u2019t appear they\u2019ve been told their number is up either. All in all, we\u2019d say cross some fingers and hope everything is coming up Milhouse.<\/p>\n<p>While I try to remember if things coming up Milhouse is good or bad, here\u2019s what you can do if you\u2019re still worried you may be affected.<\/p>\n<h3>Data dump fallout tips<\/h3>\n<p>This isn\u2019t just good advice for the Luas attack, but for any potential breach situation.<\/p>\n<p>If you\u2019re on Twitter, simply follow <a href=\"https:\/\/twitter.com\/haveibeenpwned\" target=\"_blank\" rel=\"noopener\">haveibeenpwned<\/a>, a service maintained by security pro Troy Hunt. It will usually be one of the first places you\u2019ll hear about any breach where data has been taken. After that, head over to the <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">haveibeenpwned website<\/a> and check if your emails have been included in any attacks. If they have, you\u2019ll see a short summary of when it happened and what was taken. Note that you won\u2019t see the stolen data.<\/p>\n<p>Finally, you can register for alerts when any new breaches are added.<\/p>\n<p>There\u2019s really no need to go spelunking into the murky pools of hacker forums, looking in vain for a breach you may be on. Rest assured that if it\u2019s happened, you\u2019ll find out eventually\u2014one way or another. At that point, it\u2019s a case of changing your logins and applying whatever security steps are required to fix things up. Ransoms are always a major issue, whether from threats or <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/malware\/2019\/01\/ryuk-ransomware-attacks-businesses-over-the-holidays\/\" target=\"_blank\" rel=\"noopener\">infection files<\/a>. If this story has any additional developments, we will of course update this post as to what anyone affected should do next.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/luas-data-ransom-the-hacker-who-cried-wolf\/\">Luas data ransom: the hacker who cried wolf?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/luas-data-ransom-the-hacker-who-cried-wolf\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 11 Jan 2019 18:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/luas-data-ransom-the-hacker-who-cried-wolf\/' title='Luas data ransom: the hacker who cried wolf?'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/shutterstock_1089464849.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/hacking\/\" rel=\"category tag\">Hacking<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoin\/\" rel=\"tag\">bitcoin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach\/\" rel=\"tag\">data breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacked\/\" rel=\"tag\">hacked<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacking\/\" rel=\"tag\">hacking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/haveibeenpwned\/\" rel=\"tag\">haveibeenpwned<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/luas\/\" rel=\"tag\">luas<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransom\/\" rel=\"tag\">ransom<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/luas-data-ransom-the-hacker-who-cried-wolf\/' title='Luas data ransom: the hacker who cried wolf?'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/luas-data-ransom-the-hacker-who-cried-wolf\/\">Luas data ransom: the hacker who cried wolf?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10490,4503,11172,15234,3919,20657,20658,18276,3765],"class_list":["post-14304","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bitcoin","tag-cybercrime","tag-data-breach","tag-hacked","tag-hacking","tag-haveibeenpwned","tag-luas","tag-ransom","tag-ransomware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14304"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14304\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14304"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}