• Our booking engine at tickets.railforums.co.uk (powered by TrainSplit) helps support the running of the forum with every ticket purchase! Find out more and ask any questions/give us feedback in this thread!

All Northern self-service ticket machines off line 13/7/2021

Status
Not open for further replies.

Bletchleyite

Veteran Member
Joined
20 Oct 2014
Messages
97,823
Location
"Marston Vale mafia"
I'm going to take an educated guess that if ransomware recovery is taking this long, the backup servers (and authentication needed to access them, either via the 'host' system or directly) were identifiable once the attackers were in the network, and these were also affected.

My personal stuff is backed up in two places - MS OneDrive, but also (less frequently) a physical disk which is in my home safe, with several backup sets on it (I typically rotate three sets).

If any business isn't doing that, they deserve all they get. It's basics.

I agree entirely. But if this was a 'professional business' then it would probably be up and running again by now.

There is that.

Even if the backups were dead, surely running up an entirely new server would just be a matter of installing the base product and applying the separately backed up Northern-specific configuration without any of the transactional data?
 
Sponsor Post - registered members do not see these adverts; click here to register, or click here to log in
R

RailUK Forums

Mike395

Forum Staff
Staff Member
Administrator
Joined
23 May 2009
Messages
2,906
Location
Bedford
I can't imagine that anyone who cared about security would keep all of their backups on networked servers, for precisely this reason. Surely they must have an offline backup somewhere?
You would have thought so. But assuming there's not more to it than we're being told (which is entirely possible) and this was a pure ransomware (extortion) attack with no data compromised and a good level of logging/access control management in place to the server, I struggle to see how it would take a security team at the TVM manufacturer this long to at least put a temporary patch in place to close the loophole for the attack and get the core services back online, particularly as this manufacturer seems to also have unaffected TVMs used by different TOCs, so in theory there should be images available from these that could be taken and rebranded back to Northern as a worst-case scenario..
 

ClagLover

On Moderation
Joined
14 Jun 2021
Messages
53
Location
Narnia
Ticket machines are still in situ at Leyland but the people in the ticket office have no idea what’s happened beyond “there was a big hoo ha (understatement) and some sort of cyber attack”
 

Ken H

On Moderation
Joined
11 Nov 2018
Messages
6,297
Location
N Yorks
A professional business doesn't just have one backup. It'll have them going back a fair bit, ideally "exponentially" i.e. a day ago, a week ago, a month ago and so on.
A colleague went to a business to install some software. He found they had one tape, and overwrote it every night. No-one had verified the backup routine was actually writing anything to the tape (It was) About 1996.
 

Wolfie

Established Member
Joined
17 Aug 2010
Messages
6,157
A professional business doesn't just have one backup. It'll have them going back a fair bit, ideally "exponentially" i.e. a day ago, a week ago, a month ago and so on.
Agreed. Just hope that they didn't, as they seem to have done for pretty much everything else that they have done, try to do it on the cheap and cut corners/remove safeguards.
 

Skie

Member
Joined
22 Dec 2008
Messages
1,085
Googling “flowbird problems” does reveal a number of previous balls ups.
 

skyhigh

Established Member
Joined
14 Sep 2014
Messages
5,311
Well apologies for being “incorrect” :rolleyes: The ones at Chorley and Manchester were certainly not working this morning.
You stated a blunt no, in reality it is much more nuanced than that.

6 stations came back online today. The rest will follow over the coming weeks. Despite what the supplier initially thought, investigation has shown that the malware has cause hardware damage to the machines, hence the delay in restoring the network.
 

domcoop7

Member
Joined
15 Mar 2021
Messages
247
Location
Wigan
You stated a blunt no, in reality it is much more nuanced than that.

6 stations came back online today. The rest will follow over the coming weeks. Despite what the supplier initially thought, investigation has shown that the malware has cause hardware damage to the machines, hence the delay in restoring the network.
That sounds a bit ... implausible. Not saying it's impossible, but malware causing hardware faults is exceedingly rare and really shouldn't be possible. If they got root / administrator access to each machine, and caused it to run kernel code that upped the clock frequency of a chip until it burnt out or repeatedly stored and deleted data to the SSD (assuming that's what they have) until they exceeded their fault tolerances I guess it could happen. But who or why would a malware attacker do that? It would take some effort and give no gain whatsoever.

Sounds more like a bit of backside covering by the supplier to justify why they haven't got a recovery plan in place.
 

Dai Corner

Established Member
Joined
20 Jul 2015
Messages
6,351
That sounds a bit ... implausible. Not saying it's impossible, but malware causing hardware faults is exceedingly rare and really shouldn't be possible. If they got root / administrator access to each machine, and caused it to run kernel code that upped the clock frequency of a chip until it burnt out or repeatedly stored and deleted data to the SSD (assuming that's what they have) until they exceeded their fault tolerances I guess it could happen. But who or why would a malware attacker do that? It would take some effort and give no gain whatsoever.

Sounds more like a bit of backside covering by the supplier to justify why they haven't got a recovery plan in place.
I won't quote the whole article due to the length, but for example

4.Make your hard drive permanently infected​

Here, I’m not talking about malware that corrupts some files you store on your hard drive, and that will go away as soon as you format it.

I’m talking about malware that stays forever in computer hardware, that doesn’t go away, not even after you’ve installed a new, clean OS version.

More details on whether a factory reset removes malware, you’ll find here.

For now, I’m going to detail the “achievements” of Equation Group, a sophisticated cyber-espionage team that the security researchers from Kaspersky Lab identified back in 2015. As it turns out, those hackers have tapped into hard drive firmware reprogramming.

How is hard drive firmware reprogramming possible?​

Whether it’s a traditional HDD or the newer SSD, any hard disk has several components. The most notable ones are the storage medium (magnetic disks for HDDs, flash memory chips for SSDs) and a microchip.

The microchip is this hardware part where software is embedded to include controls for reading and writing to the disk, along with multiple service procedures that help the hard drive detect and fix bugs.

You could call the hard drive’s microchip a small computer in itself because that’s what it is. It comes with its firmware, and this is the part that the hackers from Equation Group have managed to exploit.

By corrupting the firmware of the hard drive’s chip, they allow malware to read and write data on a particular subsection that can’t be touched even during disk formatting!

How does this make your hard drive useless?​

With the new firmware version, the hard drive’s malware can reinfect the HDD/SSD’s boot area. Consequently, the moment you have finished reinstalling the operating system, the malware is back up.

The remarkable thing about firmware is that the firmware itself is in charge of checking its status (the integrity of its code) and running the available updates. As you can imagine, once the firmware was compromised at this level, it can no longer be trusted to eliminate its infection.

This is why infected firmware is indestructible and why most specialists agree that it’s easier and cheaper to throw away a compromised hard drive than to try and get rid of infected firmware.

Before you freak out, you should note, though, that the process itself of corrupting the hard drive firmware is exceptionally complicated. Because each hard drive model is unique and developing alternative firmware for it is time, resource, and money consuming, hackers have a tough time pulling this off. And they’re not interested in doing it to the regular user, either.

 

XAM2175

Established Member
Joined
8 Jun 2016
Messages
3,469
Location
Glasgow
Well apologies for being “incorrect” :rolleyes: The ones at Chorley and Manchester were certainly not working this morning.
So you should have either 1) not posted at all, or 2) posted only that the ones that you looked at this morning in Chorley and Manchester were not working. You can roll your eyes at "incorrect" all you want, but your post was indisputably unhelpful.
 

domcoop7

Member
Joined
15 Mar 2021
Messages
247
Location
Wigan
I won't quote the whole article due to the length, but for example
[SNIP]
Before you freak out, you should note, though, that the process itself of corrupting the hard drive firmware is exceptionally complicated. Because each hard drive model is unique and developing alternative firmware for it is time, resource, and money consuming, hackers have a tough time pulling this off. And they’re not interested in doing it to the regular user, either.
Well quite. I didn't say it's impossible, but the gain to be had by flashing the firmware of an SDD controller or a motherboard (which in itself is not as easy as that article suggests, since the firmware would usually not permit a flash of an update that isn't digitally signed, often doesn't work remotely, and even if it does is so flaky as to mean a successful attack would have to be exceptionally lucky - hence why you never hear of it happening in the wild) is what? A ransomware hacker just wants the bitcoin. He or she (or the government they work for) will get that once they've managed to get access. Doing that is difficult enough. Trying to install an extra complicated malware system into the firmware that probably won't actually work is so much effort that they risk not even succeeding in their primary attack.

Like I say, not saying it couldn't happen, but it's a magnitude less likely than the supplier hasn't got a working backup system and needs to go round each machine and install it from scratch.
 

Dai Corner

Established Member
Joined
20 Jul 2015
Messages
6,351
Well quite. I didn't say it's impossible, but the gain to be had by flashing the firmware of an SDD controller or a motherboard (which in itself is not as easy as that article suggests, since the firmware would usually not permit a flash of an update that isn't digitally signed, often doesn't work remotely, and even if it does is so flaky as to mean a successful attack would have to be exceptionally lucky - hence why you never hear of it happening in the wild) is what? A ransomware hacker just wants the bitcoin. He or she (or the government they work for) will get that once they've managed to get access. Doing that is difficult enough. Trying to install an extra complicated malware system into the firmware that probably won't actually work is so much effort that they risk not even succeeding in their primary attack.

Like I say, not saying it couldn't happen, but it's a magnitude less likely than the supplier hasn't got a working backup system and needs to go round each machine and install it from scratch.
Hardware damage is apparently exactly what happened. I assume 'the machines' are the ticket machines at stations as opposed to the servers they connect to at the data centre.
Despite what the supplier initially thought, investigation has shown that the malware has cause hardware damage to the machines, hence the delay in restoring the network.
 

flitwickbeds

Member
Joined
19 Apr 2017
Messages
529
I guess it's possible that the machines were programmed to try so hard to connect to the server in the event of a failure that something, for want of a better phrase, "burnt out"?
 

Djgr

Established Member
Joined
30 Jul 2018
Messages
1,669
Currently at Manchester Victoria.

All ticket machines out of order.

Not a single ticket office window open.

Northern, the TOC that just keeps giving (grief)
 

DB

Guest
Joined
18 Nov 2009
Messages
5,036
I guess it's possible that the machines were programmed to try so hard to connect to the server in the event of a failure that something, for want of a better phrase, "burnt out"?

Can't see how that could happen - repeated attempts to connect would just lead to repeated timeouts, which wouldn't cause any hardware damage.
 

DanNCL

Established Member
Joined
17 Jul 2017
Messages
4,280
Location
County Durham
The Chiltern machine at Great Missenden, which is the same design and uses the same software as the Northern ones, is working and selling tickets this afternoon. Surely Northern could use a modified copy of Chiltern’s back end system to get their own machines running again?
 

yorksrob

Veteran Member
Joined
6 Aug 2009
Messages
38,990
Location
Yorks
Fortunately Normy's seems to be back on now, so no need do descend into modern phone based dystopia just yet.
 

yorkie

Forum Staff
Staff Member
Administrator
Joined
6 Jun 2005
Messages
67,791
Location
Yorkshire
Presumably the answer they get is to buy an e-ticket online using their smartphone.
That may be an option for some but the staff are obliged to let passengers through to buy on the train (or at their interchange/destination if applicable)
 

Taunton

Established Member
Joined
1 Aug 2013
Messages
10,079
A good number of computer users, having gone "into The Cloud", think that handles all their security issues, things like the computer disk crashing or the server being destroyed by fire.

Not so, if the information out there is lost, due to a range of problems, malicious or otherwise, you have to be able to get it back from somewhere else.
 

AGH

Member
Joined
15 Feb 2021
Messages
103
Location
Newton Le Willows
On Friday engineer had the one at Newton Le Willows (Manchester bound side) open tinkering with it. Seems the need to attend physically may be correct.
 
Status
Not open for further replies.

Top