CyberSecurity SEE

NoName Ransomware Group Targets Transport Firms in the UK

NoName Ransomware Group Targets Transport Firms in the UK

A recent cyber attack carried out by the NoName ransomware group has targeted various websites across the UK. The group, known for its indiscriminate cyber assaults, has a history of attacking its targets without clear motives. This latest attack has affected numerous organizations in the UK, including Transport for Edinburgh, Nexus, Brighton & Hove Buses, West Yorkshire Metro, Oxford Bus Company, Travel South Yorkshire, Edinburgh Trams, Swiftcard, and MERSEY FERRIES LIMITED.

The NoName ransomware group has launched a new cyber attack campaign, solidifying its reputation as a rapidly emerging threat actor in the dark web world. This campaign specifically targets high-profile organizations, showcasing the group’s ability to outpace other cyber adversaries.

To prove their claims, the group released a message containing multiple check-host links for verification. The post highlights specific targets for their attacks, focusing on critical public transportation infrastructure across various regions in the UK, including Edinburgh, Newcastle, Sunderland, Brighton, Hove, West Yorkshire, and South Yorkshire. Additionally, the group revealed a Russian version and a DDoS (distributed denial-of-service) project, demonstrating their sophisticated and multi-pronged approach to cyber warfare. The announcement was made on September 28th.

Over the past few months, the NoName ransomware group has been responsible for a series of cyber attacks, establishing itself as one of the fastest-growing threats on the dark web. Their relentless focus on high-profile targets sets them apart from their competitors and underscores their audacity and expertise.

As this cyber attack spree continues, the cybersecurity community must remain vigilant in safeguarding critical infrastructure and countering the tactics employed by groups like NoName057. Proactive measures are essential in the ongoing battle against cyber threats.

Attempts were made to reach out to the affected organizations for official statements or responses, but as of the time of writing, no verifiable information has been received regarding the NoName cyber attack claims.

Nevertheless, the claims of a cyber attack by the NoName ransomware group should be taken seriously. Researchers have identified the group as a lone-wolf DDoS group known for launching denial-of-service attacks on European financial institutions, government websites, and transportation services on a regular basis.

NoName057(16), the Pro-Russian hacker group, emerged in March 2022, claiming responsibility for cyber attacks on government agencies, media, and private company websites in Ukraine, the United States, and Europe. This unstructured pro-Russian activist group seeks attention in Western nations.

Operating through Telegram channels, NoName057(16) has claimed responsibility for attacks, taunted targets, issued threats, and disseminated educational content. They have also utilized GitHub to host their DDoS tool website and related repositories. Their DDoS tool, named DDOSIA, carries out denial-of-service attacks by bombarding target sites with network requests.

Media personnel in Ukraine have received threatening messages from the NoName057(16) group, a fact confirmed by former Ukrainian Ombudsman Lyudmila Denisova. OSINT researcher Cyberknow20 has included the NoName ransomware group in his comprehensive list of hacker groups.

It is important to note that this report is based on internal and external research and all information provided is for reference purposes only. Users bear full responsibility for relying on this information, and The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Overall, the NoName ransomware group’s cyber attacks in the UK highlight the need for heightened cybersecurity measures and proactive defense strategies to protect critical infrastructure from evolving cyber threats.

Source link

Exit mobile version