San Francisco rail network held to ransom in malware hack
Commuters were temporarily able to ride for free on the city's transport links

San Francisco's transport agency has been hit by a malware hack, which temporarily allowed commuters to travel for free on the network.
The malware targeted computer systems across the city's transport network, disabling them with a message that read: "You Hacked, ALL Data Encrypted. Contact For Key(cryptom27@yandex.com)ID:681 ,Enter".
The hackers have issued a ransom demand of 100 Bitcoin, which equates to around $70,000 (56,000), for the return of full access to the system. As a precaution, all ticket machines were turned off during the investigation, according to officials.
Over 2,000 computers belonging to the Municipal Transport Agency (SFMTA), around 25% of the entire network, were infected by the malware, according to San Francisco news site Hoodline. The severity of the attack is still unclear, although the hackers have released documents pointing to essential internal functions including payrolls, email and database servers, and personal computer files of hundreds of employees.
"The incident remains under investigation, so it wouldn't be appropriate to provide any additional details at this point," said agency spokesperson Paul Rose. "At this point, there are not any indications of any impacts to customers."
As the system was unable to process payments, customers were able to ride for free.
The hackers used the HDDCryptor ransomware, also known as 'Mamba', to hijack the Windows OS on the network, encrypting hard drives and locking employees out.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Operating under the pseudonym 'Andy Soalis', often used in HDDCryptor ransom attacks, the hackers gave the agency "one more day" to transfer funds into a provided Bitcoin wallet.
"The SF Muni breach reinforces the repeated concerns many cyber security professionals have over internet-connected systems and the IoT as a whole," said Javvad Malik, security advocate at AlienVault. "Whenever systems are wholly digitised and made accessible publicly, there is a risk that hackers will try to gain access."
"Segregating critical systems from public systems is of utmost importance. This also includes physical segregation, so as not to have access ports or systems in publicly accessible places," added Malik.
The Municipal Transport Agency could still avoid paying the ransom, as the system does have backups that appear to have avoided infection. However, disruption is still likely to affect employees, as one anonymous SFMTA source speaking to KPIX 5 claims: "workers are not sure if they will get paid this week".
ESET security specialist Mark James believes that although the result has been free travel, users should be concerned that transport services have failed to keep data secure.
"If the systems are infected with ransomware, then access to other systems where credit card data may be stored could also be at risk, not to mention the regular data that people often overlook, such as names, addresses, DoB, security questions and answers. All or any of this may be used at a later date to obtain more data or attempted identity theft," added James.
Fare machines are now back up after the outage, however, the agency has so far remained quiet about how they managed to restore access, or if the malware is still in control of parts of the network.
Dale Walker is a contributor specializing in cybersecurity, data protection, and IT regulations. He was the former managing editor at ITPro, as well as its sibling sites CloudPro and ChannelPro. He spent a number of years reporting for ITPro from numerous domestic and international events, including IBM, Red Hat, Google, and has been a regular reporter for Microsoft's various yearly showcases, including Ignite.
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz
-
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz
-
There’s a new ransomware player on the scene: the ‘BlackLock’ group has become one of the most prolific operators in the cyber crime industry – and researchers warn it’s only going to get worse for potential victims
News Security experts have warned the BlackLock group could become the most active ransomware operator in 2025
By Solomon Klappholz