Security

Cyber-crime

Cyberattackers stole Microlise staff data following DHL, Serco disruption

Experts say incident has 'all the hallmarks of ransomware'


Telematics tech biz Microlise says an attack that hit its network likely did not expose customer data, although staff aren't so lucky.

"Some limited employee data" was compromised in the incident, Microlise told the London Stock Exhchange today, without going into any great detail about the nature of the data or how many staff members were affected.

Microlise initially disclosed the break-in on October 31, after which time the AIM-listed company's share price dropped 16 percent and has still not fully recovered.

The latest update stated that Microlise expects a full return to service by the end of the week. Work to understand the full extent of the attack, which hasn't been attributed to or claimed by any specific cybercrime group, is ongoing.

"The Company is pleased to say that it is making substantial progress in containing and clearing the threat from its network," it said in the update.

"The Company has been bringing services back online and currently expects this to continue over the coming days with the services essentially back to normal by the end of next week.

"Investigations into the incident are continuing, however, the Company is confident that no customer systems data has been compromised. The investigations to date have identified that some limited employee data has been impacted by the incident. Those individuals that may have been impacted will be notified in line with the Company's regulatory obligations and the relevant authorities are being made aware including the Information Commissioner's Office in the UK."

Microlise told The Register earlier this week that it was working closely with third-party cybersecurity experts to investigate the crime and was fully focused on minimizing disruption for customers.

"The safety and security of customer data and business operations is always our top priority, and we are taking this matter very seriously. We'd like to thank our customers for their patience and understanding during this time."

However, despite efforts to minimize disruption, major customers of Microlise confirmed they were affected to some degree.

Delivery giant DHL, for example, told Better Retailing on the day of Microlise's initial disclosure last week that its delivery tracking capability was unavailable, affecting Nisa Group stores.

The Financial Times also reported this week that British security company Serco, which has myriad public sector contracts, was also hit.

Serco said that panic alarms and tracking systems fitted to prisoner transport vans - as part of its contract wiuth the Ministry of Justice - were disabled for a short time, but its services weren't interrupted.

Drivers were also reportedly unaware of the issues for three days, using the vans without tracking capabilities regardless.

The Register contacted a large number of Microlise's other customers but none responded to requests regarding their exposure to the incident other than Tesco, which said it wasn't prepared to comment on the matter.

"This is a worrying incident against Microlise, which is not only impacting logistics firms but also one of the biggest contractors to the Ministry of Justice," said Elaine McKechnie, head of cybersecurity consultancy i-confidential.

"The company has not revealed what type of attack it is suffering from, but given threat trend activity and the information available, the incident bears all the hallmarks of ransomware.

"This is a timely reminder that the consequences of supply chain attacks can be just as devastating as those targeting an organization's own infrastructure, so they must take steps to improve third-party resilience as part of their cybersecurity strategies." ®

Send us news
5 Comments

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

We told Post Office about system problems at the highest level, Fujitsu tells Horizon Inquiry

State-owned retail company was not subordinate to Japanese multinational in technical matters, legal rep says