Advertisement

Hackers access hundreds of Metro Vancouver Transit Police files

Metro Vancouver transit police say hackers were able to access nearly 200 files through a vulnerability in a piece of third-party software. Getty Images

Metro Vancouver Transit Police say the agency was targeted by hackers who accessed almost 200 of its files as part of a global wave of attacks that U.S. officials have blamed on a Russian cyber-extortion gang.

The police service said in a news release that a thorough review is underway to determine what information was contained in the 186 files that were accessed in the attack on a third-party file transfer system called MOVEit.

Click to play video: 'Consumer Matters: Instagram hacker targets small businesses for ransom'
Consumer Matters: Instagram hacker targets small businesses for ransom

It says the hackers did not gain access to the Transit Police network, and the software vulnerability has been patched and repaired.

Story continues below advertisement

The agency says it’s not expected the incident will have any impact on investigations or prosecutions.

Breaking news from Canada and around the world sent to your email, as it happens.

It says an investigation is being conducted by the RCMP’s cybercrime investigative teams in Montreal and Vancouver.

MOVEit, which is widely used by businesses and government agencies to share files, was hit recently by an extortion syndicate that last week gave its victims a deadline to negotiate a ransom or risk having sensitive data dumped online.

The Cl0p gang, among the world’s most prolific cybercrime syndicates, also claimed it would delete any data stolen from governments, cities and police departments.

Click to play video: 'Pro-Russian hackers allegedly target Canadian energy firm'
Pro-Russian hackers allegedly target Canadian energy firm

Other known victims include the Nova Scotia provincial government, Louisiana’s Office of Motor Vehicles, Oregon’s Department of Transportation, British Airways, the British Broadcasting Company and the British drugstore chain Boots.

Story continues below advertisement

The parent company of MOVIEit’s U.S. maker, Progress Software, alerted customers to the breach on May 31 and issued a patch. But cybersecurity researchers say scores if not hundreds of companies could by then have had sensitive data quietly taken.

Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Security Agency, told reporters last week that the Cl0p campaign was short, relatively superficial and caught quickly.

A senior official in the security agency said the U.S. has “no evidence to suggest co-ordination between Cl0p and the Russian government.”

Sponsored content

AdChoices