China-linked hacking group targeted New York MTA

New York transit agency says the breach had no impact on customers

Hackers with suspected ties to the Chinese government breached systems belonging to New York's Metropolitan Transportation Authority (MTA).

According to the New York Times, the attacks took place in April but have only now come to light. Hackers didn't breach any systems used to control train cars or access any employee or passenger data, but researchers believe they might have implanted a backdoor to allow future access.

Federal authorities, including the FBI, alerted the MTA, which is responsible for transportation in the Big Apple, on April 20. It's the largest network in the US, with over 15.3 million users around New York City. It also runs the MTA New York City Transit, MTA Bus, Long Island Railroad, Metro-North Railroad, and MTA Bridges and Tunnels.

"The MTA's existing multilayered security systems worked as designed, preventing spread of the attack," the agency's chief technology officer Rafail Portnoy told the Times. "We continue to strengthen these comprehensive systems and remain vigilant as cyber attacks are a growing global threat."

"The MTA quickly and aggressively responded to this attack, bringing on Mandiant, a leading cyber security firm, whose forensic audit found no evidence operational systems were impacted, no employee or customer information breached, no data loss, and no changes to our vital systems," he added.

Related Resource

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

cost of a data breach report 2020 - whitepaper from IBMDownload now

The leaked MTA document outlined the breach, which was one of many incidents carried out by hacking groups tied to Beijing that targeted federal agencies, defense contractors, and financial institutions.

Over two days in the second week of April, two hacking groups, one said to be working on behalf of China, gained access via a flaw in Pulse Connect Secure, a legitimate remote access tool.

The hackers held access until April 20, when MTA discovered the attack. By then, hackers had compromised three of the MTA's 18 computer systems. It was then the MTA alerted federal authorities.

It is not known why hackers targeted the MTA. Those investigating the case said that China may be trying to obtain data on the transit network to gain an advantage in the international rail car market.

 As a precaution, the MTA has made the 3,700 users on its systems change their passwords.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Russia's "politically motivated" REvil raid could be used as leverage, experts warn
ransomware

Russia's "politically motivated" REvil raid could be used as leverage, experts warn

17 Jan 2022
Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp
phishing

Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

21 Dec 2021
Five things to consider before choosing an MFA solution
Security

Five things to consider before choosing an MFA solution

17 Dec 2021
Australia and US sign CLOUD Act data-sharing deal to support criminal investigations
cyber crime

Australia and US sign CLOUD Act data-sharing deal to support criminal investigations

16 Dec 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022