• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechSan Francisco

San Francisco Railway ‘Never Considered Paying the Ransom’ To Hackers

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
November 29, 2016, 3:27 PM ET
San Francisco Hosts Cable Car Bell Ringing Contest
SAN FRANCISCO - JUNE 9: San Francisco Municipal Railway (MUNI) cable car operator Frank Ware competes during the 47th annual Cable Car Bell Ringing contest June 9, 2009 in San Francisco, California. San Francisco Municipal Railway cable car operator Leonard Oats won the annual bell ringing contest for the second year in a row. (Photo by Justin Sullivan/Getty Images)Justin Sullivan—Getty Images

The agency that operates San Francisco’s municipal railway has all but recovered from a crippling ransomware attack that struck its computer network over Thanksgiving weekend, the agency said.

Hackers had infected the municipal transportation agency’s systems with malicious software that locked employees out of their digital files on Friday. The cybercriminal group demanded a ransom of 100 Bitcoins, or about $73,000, for the agency to regain access.

When the attackers did not receive the payment, they additionally threatened to dump 30 gigabytes of the agency’s employee and customer data that they claimed to have stolen. That ultimatum appears, however, to have been a bogus scare tactic to extort its prospective victim.

Get Data Sheet, Coins2Day ’s technology newsletter.

Paul Rose, a spokesman for the San Francisco Municipal Transportation Agency, emailed Coins2Day on Monday evening to say that the agency had called the attackers’ bluff. “Based on the information we have, and in conference with DHS,” he said, referring to the Department of Homeland Security, with whom the agency is cooperating in an ongoing investigation, “we believe they do not have access to critical data files.”

Further, Rose added, the agency “never considered paying the ransom.” Instead, the agency restored the majority of its roughly 900 affected office computers through data backups. (Previous reports suggested that the malware had impacted more than 2,000 of the agency’s computers.)

“Existing backup systems allowed us to get most affected computers up and running this morning,” Kristen Holland, another agency spokeswoman, said in a blog post on Monday evening. She said the agency’s IT team expects that the rest will be restored “in the next day or two.”

For more on ransomware, watch:

“Muni operations and safety were not affected. Our customer payment systems were not hacked,” Holland wrote, noting that the attack had affected access to email and, vaguely, “various systems.” Station ticketing kiosks had been unplugged as a “precaution” between Friday and Sunday morning, she said.

“No data was accessed from any of our servers,” she added.

In a surprising turn of events (and, perhaps, a bit of satisfying poetic justice), two reports soon surfaced suggesting that the ransomware peddlers themselves had been hacked over the weekend. Anonymous security researchers contacted two reporters with evidence reportedly stolen from the attackers.

The first story, by Brian Krebs, an independent cybersecurity researcher, reported that that the attackers appeared to have exploited vulnerabilities in unpatched Oracle software to gain entry to the agency’s computer network. Previous targets by the San Francisco railway hacker appeared to include a number of U.S.-based construction and manufacturing firms.

Krebs also hypothesized, based on the provenance of Internet addresses used to administer a computer server associated with the attacks as well as some language analysis, that the attackers may be based in Iran.

Shortly thereafter, Thomas Fox-Brewster, a security reporter at Forbes, reported having made contact with another person who allegedly hacked the same email account implicated in the attack. Adding up the value of Bitcoins stored in Bitcoin addresses linked to the hackers’ accounts, he estimated that the operation had raked in “well above $100,000 in less than four months.”

The source also disputed the idea that people responsible for the hacking were in Iran, but that person provided no evidence or reasoning to support the claim.

The lesson? Use data backups, because the ransomware scourge shows no signs of abating.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.