HomeCII/OTNoName Ransomware Group Targets Transport Firms in the UK

NoName Ransomware Group Targets Transport Firms in the UK

Published on

spot_img

A recent cyber attack carried out by the NoName ransomware group has targeted various websites across the UK. The group, known for its indiscriminate cyber assaults, has a history of attacking its targets without clear motives. This latest attack has affected numerous organizations in the UK, including Transport for Edinburgh, Nexus, Brighton & Hove Buses, West Yorkshire Metro, Oxford Bus Company, Travel South Yorkshire, Edinburgh Trams, Swiftcard, and MERSEY FERRIES LIMITED.

The NoName ransomware group has launched a new cyber attack campaign, solidifying its reputation as a rapidly emerging threat actor in the dark web world. This campaign specifically targets high-profile organizations, showcasing the group’s ability to outpace other cyber adversaries.

To prove their claims, the group released a message containing multiple check-host links for verification. The post highlights specific targets for their attacks, focusing on critical public transportation infrastructure across various regions in the UK, including Edinburgh, Newcastle, Sunderland, Brighton, Hove, West Yorkshire, and South Yorkshire. Additionally, the group revealed a Russian version and a DDoS (distributed denial-of-service) project, demonstrating their sophisticated and multi-pronged approach to cyber warfare. The announcement was made on September 28th.

Over the past few months, the NoName ransomware group has been responsible for a series of cyber attacks, establishing itself as one of the fastest-growing threats on the dark web. Their relentless focus on high-profile targets sets them apart from their competitors and underscores their audacity and expertise.

As this cyber attack spree continues, the cybersecurity community must remain vigilant in safeguarding critical infrastructure and countering the tactics employed by groups like NoName057. Proactive measures are essential in the ongoing battle against cyber threats.

Attempts were made to reach out to the affected organizations for official statements or responses, but as of the time of writing, no verifiable information has been received regarding the NoName cyber attack claims.

Nevertheless, the claims of a cyber attack by the NoName ransomware group should be taken seriously. Researchers have identified the group as a lone-wolf DDoS group known for launching denial-of-service attacks on European financial institutions, government websites, and transportation services on a regular basis.

NoName057(16), the Pro-Russian hacker group, emerged in March 2022, claiming responsibility for cyber attacks on government agencies, media, and private company websites in Ukraine, the United States, and Europe. This unstructured pro-Russian activist group seeks attention in Western nations.

Operating through Telegram channels, NoName057(16) has claimed responsibility for attacks, taunted targets, issued threats, and disseminated educational content. They have also utilized GitHub to host their DDoS tool website and related repositories. Their DDoS tool, named DDOSIA, carries out denial-of-service attacks by bombarding target sites with network requests.

Media personnel in Ukraine have received threatening messages from the NoName057(16) group, a fact confirmed by former Ukrainian Ombudsman Lyudmila Denisova. OSINT researcher Cyberknow20 has included the NoName ransomware group in his comprehensive list of hacker groups.

It is important to note that this report is based on internal and external research and all information provided is for reference purposes only. Users bear full responsibility for relying on this information, and The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Overall, the NoName ransomware group’s cyber attacks in the UK highlight the need for heightened cybersecurity measures and proactive defense strategies to protect critical infrastructure from evolving cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...