<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>San Francisco light-rail hacked &#8211; CalWatchdog.com</title>
	<atom:link href="https://calwatchdog.com/tag/san-francisco-light-rail-hacked/feed/" rel="self" type="application/rss+xml" />
	<link>https://calwatchdog.com</link>
	<description></description>
	<lastBuildDate>Mon, 09 Jan 2017 01:54:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">43098748</site>	<item>
		<title>Concerns remain after hack of San Francisco rail system</title>
		<link>https://calwatchdog.com/2017/01/09/concerns-remain-hack-san-francisco-rail-system/</link>
		
		<dc:creator><![CDATA[Chris Reed]]></dc:creator>
		<pubDate>Mon, 09 Jan 2017 11:33:55 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Muni hacked]]></category>
		<category><![CDATA[cyber vulnerabilities]]></category>
		<category><![CDATA[hacker got hacked]]></category>
		<category><![CDATA[Krebs on Security]]></category>
		<category><![CDATA[Primavera subject to hacking]]></category>
		<category><![CDATA[Chris Reed]]></category>
		<category><![CDATA[San Francisco light-rail hacked]]></category>
		<category><![CDATA[Oracle software hacked]]></category>
		<category><![CDATA[Brian Krebs]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=92631</guid>

					<description><![CDATA[Six weeks after some 900 computers used by the San Francisco Municipal Railroad were hacked with ransomware, many concerns remain about the incident &#8212; especially as coverage of U.S. cyber]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-92634" src="http://calwatchdog.com/wp-content/uploads/2017/01/Sf_muni_logo.jpg" alt="" width="325" height="322" align="right" hspace="20" srcset="https://calwatchdog.com/wp-content/uploads/2017/01/Sf_muni_logo.jpg 325w, https://calwatchdog.com/wp-content/uploads/2017/01/Sf_muni_logo-222x220.jpg 222w" sizes="(max-width: 325px) 100vw, 325px" />Six weeks after some 900 computers used by the San Francisco Municipal Railroad were </span><a href="http://www.popularmechanics.com/technology/infrastructure/a24066/hacked-san-francisco-fare-systems/" target="_blank" rel="noopener"><span style="font-weight: 400;">hacked </span></a><span style="font-weight: 400;">with ransomware, many concerns remain about the incident &#8212; especially as coverage of U.S. cyber vulnerabilities has become <a href="http://www.information-age.com/concerns-cyber-security-time-high-123461891/" target="_blank" rel="noopener">more extensive</a> than ever.</span></p>
<p><span style="font-weight: 400;">San Francisco’s light-rail system, known as Muni, faced an emailed demand from an unknown hacker that he be paid about $73,000 in bitcoins if it wanted to regain control of the computers. Apparently in fear that more computers had been hacked than the ones displaying a message, “You Hacked, ALL Data Encrypted,” the transit agency shut off ticket machines and fare gates at rail stations from the morning of Friday, Nov. 25, through Sunday, Nov. 27, allowing passengers free rides that weekend.</span></p>
<p><span style="font-weight: 400;">The following Monday, Muni officials announced that not only had they not paid the ransom, they never even considered paying it, confident in their tech prowess. Many targeted companies and organizations feel they have no choice. Last April, the Hollywood Presbyterian Medical Center in Los Angeles paid nearly $17,000 in bitcoins to recover access to data that had been encrypted by hackers.</span></p>
<h4>What was found after ‘hacker got hacked’</h4>
<p><span style="font-weight: 400;">Federal and state security officials have kept mum about the attack since it happened. Conventional news accounts accepted the simple narrative of a hacker being bested by Muni information technology experts.</span></p>
<p><span style="font-weight: 400;">But niche media specializing in tech issues had a less reassuring point of view. The Krebs On Security tech website, run by former Washington Post national security reporter <a href="https://krebsonsecurity.com/about/" target="_blank" rel="noopener">Brian Krebs</a>, offered an </span><span style="font-weight: 400;"><a href="https://krebsonsecurity.com/2016/11/san-francisco-rail-system-hacker-hacked/" target="_blank" rel="noopener"> in-depth analysis</a> with an unusual advantage: Krebs</span><span style="font-weight: 400;"> worked with an unnamed security expert who </span><a href="http://www.popularmechanics.com/technology/infrastructure/a24066/hacked-san-francisco-fare-systems/" target="_blank" rel="noopener"><span style="font-weight: 400;">“hacked the hacker”</span></a><span style="font-weight: 400;"> by cracking one of his email accounts. Krebs made two points of particular note.</span></p>
<p><span style="font-weight: 400;">The first point suggests that San Francisco Municipal Railroad officials shouldn’t be too quick to crow about fighting off the attack. Initial attacks are often </span><a href="http://searchsecurity.techtarget.com/tip/Hacker-techniques-and-exploits-Prevent-system-fingerprinting-probing" target="_blank" rel="noopener"><span style="font-weight: 400;">probes </span></a><span style="font-weight: 400;">meant to find out the sophistication of cyber defenses. Kreb reported security expert Alex Holden believed that &#8220;the attack server [used by the Muni hacker] appears to have been used as a staging ground to compromise new systems.” Presumably, the transit agency is aware of this possibility and has brought in experts to look for other malware on all its computer systems.</span></p>
<p><span style="font-weight: 400;">The second point is that some of the most popular software made by one of California’s richest, most high-profile companies &#8212; Redwood Shores-based Oracle Corp. &#8212; seems very vulnerable to hacker attacks of the type faced by Muni. The worst problems appear to be with Oracle’s Primavera project portfolio management software, which Muni uses.</span></p>
<p><span style="font-weight: 400;">Krebs followed the visible online tracks of the hacker and concluded he was operating from somewhere where Farsi or Persian were regularly used, perhaps Iran. He said evidence indicated the hacker had in recent months extorted at least $140,000 in Bitcoin, with the primary target being U.S. manufacturing and construction firms that used Oracle software. The week before the hacking in San Francisco, the hacker was paid $45,000 in a ransom by a U.S. manufacturer.</span></p>
<h4>Is criticism of CA tech giant&#8217;s software fair?</h4>
<p><span style="font-weight: 400;">Oracle says the problems it faces with cybersecurity and vulnerable software are no different that those faced by rival high-profile software companies in an era in which cybercriminals harvest billions of dollars. Krebs’ reporting suggested that it was users’ failure to keep software updated that made them vulnerable, not Oracle’s flawed programs.</span></p>
<p><span style="font-weight: 400;">The hacker’s negotiations with targeted companies often included an offer to provide tips on how to avoid new attacks in return for a few more bitcoins, Krebs wrote. </span></p>
<p><span style="font-weight: 400;">The main tip? A link to an Oracle </span><a href="https://blogs.oracle.com/security/entry/security_alert_cve_2015_4852" target="_blank" rel="noopener"><span style="font-weight: 400;">security patch </span></a><span style="font-weight: 400;">released in November 2015.</span></p>
<p><span style="font-weight: 400;">“Read this and install patch before you connect your server to internet again,” the attacker wrote in an email that Krebs obtained.</span></p>
<p><span style="font-weight: 400;">Nevertheless, the company has found itself open to criticism for its security lapses and policies. In October 2015, Business Insider </span><a href="http://www.businessinsider.com/oracle-erp-hacked-by-interns-in-an-hour-2015-10" target="_blank" rel="noopener"><span style="font-weight: 400;">reported </span></a><span style="font-weight: 400;">that six interns working for a cybersecurity firm were able to quickly hack a version of Oracle&#8217;s E-Business Suite that had just been upgraded. That came after an Oracle security official had </span><a href="http://www.businessinsider.com/oracle-cso-goes-against-bug-bounties-and-security-researchers-2015-8" target="_blank" rel="noopener"><span style="font-weight: 400;">ridiculed </span></a><span style="font-weight: 400;">such cybersecurity bug hunting, leading founder Larry Ellison to do damage control in a </span><a href="http://www.businessinsider.com/ellison-explains-the-future-of-hackers-2015-10" target="_blank" rel="noopener"><span style="font-weight: 400;">speech </span></a><span style="font-weight: 400;">in which he suggested everyone should work together to keep the internet safe.</span></p>
<p><span style="font-weight: 400;">Oracle, which employs more than 136,000 people around the world, had revenue of $37 billion and net income of $8.9 billion in its last fiscal year.</span></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">92631</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: calwatchdog.com @ 2026-04-17 16:25:15 by W3 Total Cache
-->