Kansas Public Transportation Authority Hit By Ransomware

Kansas bus

The Kansas City Area Transportation Authority (KCATA) announced it was targeted by a ransomware attack on Tuesday, January 23.

KCATA is a bi-state public transit agency serving seven counties of Missouri and Kansas, operating 78 bus routes and 6 MetroFlex routes using a fleet of 300 buses. The company reports that 10.5 million people use their services in a year.

On Wednesday, the organization announced that it suffered a ransomware attack that impacted all its communication systems.

“A ransom cyber-attack hit the KCATA early Tuesday, January 23. We have contacted all appropriate authorities, including the FBI,” reads the announcement.

“The primary customer impact is that regional RideKC call centers cannot receive calls, nor can any KCATA landline.”

The announcement provides alternative phone numbers for Freedom and Freedom-On-Demand Paratransit customers who need to schedule a trip.

Despite the disruption in call centers, KCATA routes are still working as usual, so passenger transit operations haven’t been impacted.

“All service is operating, including fixed-route buses, Freedom and Freedom-On-Demand paratransit service,” explained KCATA.

Logging in to ridekc.org and using the transit app to receive bus schedule information also work normally.

“KCATA is working around the clock with our outside cyber professionals and will have systems back up and running as soon as possible,” concludes the announcement.

A significant concern in ransomware incidents is the possibility of data theft, including personal and payment details of customers, which in this case would expose many people using KCATA services.

The agency has not elaborated on the possibility of registered members and pass holders having had their sensitive information exposed to cybercriminals.

Update 1/27 – Medusa ransomware claimed responsibility for the attack on KCATA, and posted data samples allegedly belonging to the organization on their extortion portal on the dark web.

Medusa

The threat actors have given KCATA 10 days to negotiate a resolution, and their financial demands were set to a payment of $2,000,000.

Also, Medusa offers the option to extend the deadline for making the stolen data available to the public, for $100,000/day.

 


Original Source


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.