• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Ransomware Attacks Double in Europe’s Transport Sector

You are here: Home / Cyber Security News / Ransomware Attacks Double in Europe’s Transport Sector

Ransomware and details breaches ended up the most notable cyber-threats impacting Europe’s transportation sector previous 12 months, with incidents of the previous virtually doubling in quantity, according to ENISA.

The EU security agency’s to start with ever threat landscape report for the vertical addresses the period January 2021 to Oct 2022.

It claimed that ransomware incident reviews improved from 13% of the total in 2021 to 25% in 2022, though malware stories declined from 11% to 6% and info breaches and leaks slumped from 21% to 9%.

Having said that, that continue to can make facts-related threats the 2nd most prolific classification about the interval right after ransomware, with attackers concentrating on qualifications, personnel and consumer personalized info, and intellectual home.

Read through a lot more on transportation cyber-threats: US Transport Huge Loses $7.5m in Ransomware Attack.

More than 50 percent (55%) of incidents tracked by ENISA around the period of time had been traced to cyber-criminals, this means they were possible to be economically motivated. Hacktivists accounted for an additional quarter (23%), which partly explains the 6-fold surge in DDoS attacks, from 2% to 13% concerning 2021 and 2022.

European airports, railways and transportation authorities were being amongst the victims of all those attacks, ENISA said.

Condition-backed attacks accounted for one more 15% of the total and had been mostly aimed at the maritime sector and govt transportation authorities, according to the report.

“Transport is a key sector of our economic climate that we count on in each our own and qualified lives,” argued ENISA executive director, Juhan Lepassaar.

“Understanding the distribution of cyber-threats, motivations, trends and patterns, as well as their likely affect, is important if we want to make improvements to the cybersecurity of the critical infrastructures involved.”

Even so, the agency acknowledged that its visibility into the menace landscape is restricted to publicly described incidents.

“Such disclosed incidents on which ENISA dependent its assessment and conclusions even so are probably to less than-symbolize truth if non-disclosed ones outweigh individuals built public,” it cautioned.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Rogue NuGet Packages Infect .NET Developers with Crypto-Stealing Malware
Next Post: Preventing Insider Threats in Your Active Directory »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.