Security

Cyber-crime

Cyberattackers stole Microlise staff data following DHL, Serco disruption

Experts say incident has 'all the hallmarks of ransomware'


Telematics tech biz Microlise says an attack that hit its network likely did not expose customer data, although staff aren't so lucky.

"Some limited employee data" was compromised in the incident, Microlise told the London Stock Exhchange today, without going into any great detail about the nature of the data or how many staff members were affected.

Microlise initially disclosed the break-in on October 31, after which time the AIM-listed company's share price dropped 16 percent and has still not fully recovered.

The latest update stated that Microlise expects a full return to service by the end of the week. Work to understand the full extent of the attack, which hasn't been attributed to or claimed by any specific cybercrime group, is ongoing.

"The Company is pleased to say that it is making substantial progress in containing and clearing the threat from its network," it said in the update.

"The Company has been bringing services back online and currently expects this to continue over the coming days with the services essentially back to normal by the end of next week.

"Investigations into the incident are continuing, however, the Company is confident that no customer systems data has been compromised. The investigations to date have identified that some limited employee data has been impacted by the incident. Those individuals that may have been impacted will be notified in line with the Company's regulatory obligations and the relevant authorities are being made aware including the Information Commissioner's Office in the UK."

Microlise told The Register earlier this week that it was working closely with third-party cybersecurity experts to investigate the crime and was fully focused on minimizing disruption for customers.

"The safety and security of customer data and business operations is always our top priority, and we are taking this matter very seriously. We'd like to thank our customers for their patience and understanding during this time."

However, despite efforts to minimize disruption, major customers of Microlise confirmed they were affected to some degree.

Delivery giant DHL, for example, told Better Retailing on the day of Microlise's initial disclosure last week that its delivery tracking capability was unavailable, affecting Nisa Group stores.

The Financial Times also reported this week that British security company Serco, which has myriad public sector contracts, was also hit.

Serco said that panic alarms and tracking systems fitted to prisoner transport vans - as part of its contract wiuth the Ministry of Justice - were disabled for a short time, but its services weren't interrupted.

Drivers were also reportedly unaware of the issues for three days, using the vans without tracking capabilities regardless.

The Register contacted a large number of Microlise's other customers but none responded to requests regarding their exposure to the incident other than Tesco, which said it wasn't prepared to comment on the matter.

"This is a worrying incident against Microlise, which is not only impacting logistics firms but also one of the biggest contractors to the Ministry of Justice," said Elaine McKechnie, head of cybersecurity consultancy i-confidential.

"The company has not revealed what type of attack it is suffering from, but given threat trend activity and the information available, the incident bears all the hallmarks of ransomware.

"This is a timely reminder that the consequences of supply chain attacks can be just as devastating as those targeting an organization's own infrastructure, so they must take steps to improve third-party resilience as part of their cybersecurity strategies." ®

Send us news
5 Comments

Medusa ransomware group claims attack on UK's Gateshead Council

Pastes allegedly stolen documents on leak site with £600K demand

I tried hard, but didn't fix all of cybersecurity, admits outgoing US National Cyber Director

In colossal surprise, ONCD boss Harry Coker says more work is needed

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

Infoseccer: Private security biz let guard down, exposed 120K+ files

Assist Security’s client list includes fashion icons, critical infrastructure orgs

Europe coughs up €400 to punter after breaking its own GDPR data protection rules

PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more

Drug addiction treatment service admits attackers stole sensitive patient data

Details of afflictions and care plastered online

Turbulence at UN aviation agency as probe into potential data theft begins

Crime forum-dweller claims to have leaked 42,000 documents packed with personal info

DEF CON's hacker-in-chief faces fortune in medical bills after paralyzing neck injury

Marc Rogers is 'lucky to be alive'

Crypto klepto North Korea stole $659M over just 5 heists last year

US, Japan, South Korea vow to intensify counter efforts

Telemetry data from 800K VW Group EVs exposed online

PLUS: DoJ bans data sale to enemy nations; Do Kwon extradited to US; Tenable CEO passes away; and more

Fortinet: FortiGate config leaks are genuine but misleading

Competition hots up with Ivanti over who can have the worst start to a year

DNA sequencers found running ancient BIOS, posing risk to clinical research

Devices on six-year-old firmware vulnerable to takeover and destruction