• ITVI.USA
    15,054.600
    -42.680
    -0.3%
  • OTLT.USA
    2.919
    0.024
    0.8%
  • OTRI.USA
    19.220
    0.070
    0.4%
  • OTVI.USA
    15,019.470
    -49.300
    -0.3%
  • TSTOPVRPM.ATLPHL
    2.910
    -0.050
    -1.7%
  • TSTOPVRPM.CHIATL
    3.790
    0.080
    2.2%
  • TSTOPVRPM.DALLAX
    1.460
    0.170
    13.2%
  • TSTOPVRPM.LAXDAL
    3.740
    0.020
    0.5%
  • TSTOPVRPM.PHLCHI
    2.270
    0.030
    1.3%
  • TSTOPVRPM.LAXSEA
    4.150
    -0.010
    -0.2%
  • WAIT.USA
    131.000
    -2.000
    -1.5%
  • ITVI.USA
    15,054.600
    -42.680
    -0.3%
  • OTLT.USA
    2.919
    0.024
    0.8%
  • OTRI.USA
    19.220
    0.070
    0.4%
  • OTVI.USA
    15,019.470
    -49.300
    -0.3%
  • TSTOPVRPM.ATLPHL
    2.910
    -0.050
    -1.7%
  • TSTOPVRPM.CHIATL
    3.790
    0.080
    2.2%
  • TSTOPVRPM.DALLAX
    1.460
    0.170
    13.2%
  • TSTOPVRPM.LAXDAL
    3.740
    0.020
    0.5%
  • TSTOPVRPM.PHLCHI
    2.270
    0.030
    1.3%
  • TSTOPVRPM.LAXSEA
    4.150
    -0.010
    -0.2%
  • WAIT.USA
    131.000
    -2.000
    -1.5%
BusinessCybersecurityNewsRail

Ransomware attack hits short line rail operator OmniTRAX

Hackers post short line company’s data after targeting parent company

Colorado-based short line rail operator and logistics provider OmniTRAX was hit by a recent ransomware attack and data theft that targeted its corporate parent, Broe Group.

OmniTRAX confirmed to FreightWaves that the cyberattack had occurred after the Conti ransomware gang posted stolen data from a leak site. The company, however, provided no details about the incident and whether it impacted any operations.

“We are fully aware of the situation, but company policy requires we do not comment on security protocols,” John Spiegleman, OmniTRAX’s chief legal officer and general counsel, said in a statement. “OmniTRAX continues to operate, business as usual.”

OmniTRAX, headquartered in Denver, operates 21 short line railroads in the U.S. and one in Canada. While there was no indication of operational impacts, the short line railroads play an essential role in the North American supply chain by linking shippers with the larger rail networks. 

The attack occurred sometime before Dec. 24, based on the timing of the ransomware gang’s post. The leak itself suggests that the Broe Group, which owns OmniTRAX as part of a multibillion dollar portfolio and is headquartered at the same location, refused to pay the hackers’ ransom demands.

A sample of the 70 gigabytes leaked files viewed by FreightWaves include internal OmniTRAX documents, including the apparent contents of individual employee work computers. It was not clear if it included data pertaining to OmniTRAX’s rail operations or its customers.

First publicly known cyberattack of its kind in the U.S. freight rail sector

It represents the first publicly known case of a so-called double-exhortation ransomware attack against a U.S. freight rail operator. Numerous trucking and logistics companies including Forward Air have been targeted by an array of ransomware groups using the tactic of stealing and then encrypting data and demanding payments in exchange for unlocking systems and a promise to never release that data publicly. 

A cybersecurity expert familiar with the rail industry told FreightWaves that the likely attack caused little to no disruption to OmniTRAX’s rail operations. But the expert said the public disclosure of employee data is troubling. 

Concerns have grown in recent years about cyberattacks on railroads, with the increasing digitization of the industry but the absence of appropriate cybersecurity. Fears have largely focused on the prospects of a large-scale disruption to the supply chain, or hackers compromising the systems of rolling stock, potentially stopping trains or disabling safety systems. 

Ransomware attacks generally are a blunter instrument designed for the purpose of making the hacking groups money. But as evidenced by the recent Forward Air attack, the locking of data can impact transportation operations. 

The CEO of railcar manufacturer Greenbrier, Bill Furman, told financial analysts on Wednesday that the company is stepping up its cybersecurity efforts in response to high threat levels.

“This is a growing risk to all companies we operate, where we have some vulnerabilities if we were penetrated, we’ve all watched those headlines,” Furman said. “So our board is concerned about that. We’re concerned about it. We’re investing to protect ourselves.”

FreightWaves Senior Staff Reporter Joanna Marsh contributed to this report.

Click for more FreightWaves articles by Nate Tabak.

As ransomware attacks hit trucking, victims face costly dilemma

5 defining cyberattacks on trucking and logistics in 2020

Forward Air reveals ransomware attack, warns of revenue hit

Nate Tabak, Border and North America Correspondent

Nate Tabak is a Toronto-based journalist and producer who covers cybersecurity and cross-border trucking and logistics for FreightWaves. He spent seven years reporting stories in the Balkans and Eastern Europe as a reporter, producer and editor based in Kosovo. He previously worked at newspapers in the San Francisco Bay Area, including the San Jose Mercury News. He graduated from UC Berkeley, where he studied the history of American policing. Contact Nate at ntabak@freightwaves.com.

One Comment

  1. The more digitalized gets everything, the easier will be for cybercriminals to spread their malwares around. With this in mind, companies must invest in security teams that allow to keep information safe, and with a lot of ransomware attacks happening lately, prevention and detection are key to protect any data. Thanks for sharing this info!

We are glad you’re enjoying the content

Sign up for a free FreightWaves account today for unlimited access to all of our latest content

By signing in for the first time, I give consent for FreightWaves to send me event updates and news. I can unsubscribe from these emails at any time. For more information please see our Privacy Policy.