Ransomware attack on TTC shuts down vital communications systems – .

Ransomware attack on TTC shuts down vital communications systems – .

TTC claims to have been the victim of a ransomware attack that shut down vital communications systems across the organization.

In a press release Friday evening, the TTC said the incident did not cause “significant” service disruptions and “that there is no risk to employees or public safety.”

However, the attack appears to have been large-scale and to have affected several elements of the organization.

The agency said it could not provide any timeframe for resolving the outages.

On Friday night, the Vision system used to communicate with vehicle drivers was not functioning, forcing the agency to use a backup radio system instead.

Information about the next vehicle on platform screens, scheduling apps and on the TTC website was not available, as were Wheel-Trans reservations online.

Even the TTC’s internal messaging system was offline.

The agency said it is canceling the planned closure of part of Metro Line 1 scheduled for Saturday to ensure it has enough staff to provide normal service if communication issues are not resolved. .

“The full extent of the attack is under review and the TTC is working with law enforcement and cybersecurity experts on this issue,” the agency said in its press release.

Ransomware is a type of software that hackers use to encrypt an organization’s files. They then ask the organization to pay a ransom to unlock the files.

TTC spokesperson Stuart Green declined to answer questions about whether the agency had received a request for payment and whether it intended to pay.

“I cannot comment on the status of the ransom demand,” he said in a text.

According to the press release, the TTC detected unusual network activity on Thursday evening and began to investigate.

“The impact was minimal” until noon Friday, “when the hackers broadened their strike on network services.”

Ben Spurr is a Toronto-based reporter who covers transportation. Contact him by email at [email protected] or follow him on Twitter: @BenSpurr


Please enter your comment!
Please enter your name here