ctpaep - stock.adobe.com
Racist Network Rail Wi-Fi hack was work of malicious insider
Police have revealed that this week’s racist cyber attack on public Wi-Fi networks at stations across the UK appears to have been the work of a malicious insider, after arresting an employee of one of the service providers
The British Transport Police (BTP) have made an arrest in an ongoing investigation into a cyber attack on public Wi-Fi services provided at mainline UK railway stations on the evening of Wednesday 25 September.
The incident saw passengers at 19 rail stations across the country unable to access Network Rail’s Wi-Fi network, which are provided by communications services provider Telent, receiving instead racist and Islamophobic messages on their devices.
Earlier on Thursday 26 September, Telent said it had worked out that the incident was the result of an unauthorised change made to its landing page, and was working with Global Reach, the provider of this service, to investigate.
As a result of the investigation, the BTP have now taken an unnamed man into custody on suspicion of conducting the attack. A spokesperson for the force said the cyber attack appeared to have been the work of a malicious insider.
“The man is an employee of Global Reach Technology, who provide some Wi-Fi services to Network Rail,” they said. “He has been arrested on suspicion of offences under the Computer Misuse Act 1990 and offences under the Malicious Communications Act 1988.
“Officers received reports just after 5pm yesterday (25 September) of a breach of some Network Rail Wi-Fi services at railway stations which were displaying Islamophobic messaging. The abuse of access was restricted to the defacement of the splash pages, and no personal data is known to have been affected.”
In an update to its earlier statement, Telent said: “Telent can confirm that the incident was an act of cyber vandalism which originated from within the Global Reach network and was not a result of a network security breach or a technical failure. The aim is to restore public Wi-Fi services by the weekend. Telent are continuing to work with Network Rail, Global Reach and the British Transport Police.”
Insider threat
The cyber attack had earlier prompted hasty speculation among armchair security experts that Network Rail was the victim of a supply chain attack, possibly by a nation state, against the UK’s critical rail infrastructure.
Although this appears not to have been the case, the fact that an insider may have been responsible will be of grave concern to Global Reach, Telent and their downstream customers, such as Network Rail.
A great many insider threat actors turn out to be current or former employees bearing a grudge, although they can on occasion also be moles conducting industrial or state-backed espionage. Many are also accidental threat actors who make a simple mistake, or are negligent and fail to comply with internal security measures, opening the door to external cyber criminals.
The threats such people present are difficult to detect and wide in their scope. The consequences of their attacks can be serious, including data breaches, fraud, theft of intellectual property, and sabotage or destruction of IT systems. They can also, as is the case with the Network Rail incident, lead to great embarrassment and offence.
Read more about insider threats
- Although insider threat breach rates were on the decline in past years, Verizon has recently observed a resurgence in the healthcare sector.
- Stopping malicious insider threats is just as important as preventing external ones. Uncover what to look for and strategies to prevent insider threats before they cause damage.
- From disgruntled employees to compromised users to third-party vendors, here are six types of insider threats and best practices to mitigate the issues.