The Australian transportation and logistics giant Toll Group was victim of a ransomware attack, in response to the incident the company has shut down some of its online services.
The Toll Group is an Australian transportation and logistics company with operations in road, rail, sea, air, and warehousing, it is a subsidiary of Japan Post Holdings and has over 44,000 employees.
The attack was discovered on January 31 when the internal staff detected a piece of ransomware on its systems. In order to mitigate the threat, the personnel isolated some systems to avoid malware propagation and potential data.
The company published a security breach notice on its website the same day, but it provided further details some days later.
“As a result of our decision to disable certain systems following a recent cyber security threat, we’re continuing to meet the needs of many of our customers through a combination of manual and automated processes across our global operations, although some are experiencing delay or disruption. For our parcels customers, all of our processing centres are continuing to operate including pick up, processing and dispatch albeit at reduced speed in some cases.” reads a data breach notification published by the company on its website.
“We can confirm the cyber security incident is due to a targeted ransomware attack which led to our decision to immediately isolate and disable some systems in order to limit the spread of the attack.”
The company declared that it has seen no evidence to suggest any personal data has been exfiltrated. The Toll Group has reported the incident to the authorities, an investigation is still ongoing.
While the systems were off-line, the customers were not able to track their shipments.
The company confirmed that the attack was targeted, but at the time it is unclear what ransomware family infected the systems at the Toll Group.
Toll Group is currently working on restoring affected systems, it is only accepting orders via phone.
“We’re working with relevant authorities and have referred the matter to the appropriate bodies for criminal investigation. In the meantime, we’ll continue to work to our current processes in order to meet the needs of our customers.” continues the company.
“For our parcels customers, all of our processing centres are continuing to operate including pick up, processing and dispatch albeit at reduced speed in some cases,” “Most other Toll operations are continuing to operate on manual systems based on our business continuity plans.”
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Toll Group, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…
The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…
Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…
Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…
A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…
The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…
This website uses cookies.