Cryptopolitan
2025-09-25 07:42:02

Hacker group hosts Bitcoin auction for stolen Maryland Transportation Department data

Maryland Department of Transportation (MDOT) data is being auctioned on the dark web after the Rhysida ransomware group hacked and stole information from the agency. The hackers are demanding 30 Bitcoins, worth about $3.4 million, in exchange for the information. As reported by the dailydarkweb news outlet on Wednesday, the breach on the state-level agency MDOT could affect five major administrations, including aviation, port operations, motor vehicles, highways, and transit. MDOT also oversees the Maryland Transportation Authority and the Washington Metropolitan Area Transit Authority. Rhysida claimed it is in possession of the department’s internal and personal records, including Social Security numbers , birth dates, and home addresses. The group is reportedly open to selling the stolen data to a single buyer and has set a seven-day deadline for those interested. Maryland officials decline to provide details of ransomware attack The Maryland Transit Administration (MTA), a division of MDOT, released a statement admitting to the public that its data had been compromised. Questioned by reporters about the extent of the breach, MTA spokesperson Veronica Battisti said: “The agency is unable to disclose specific or additional details regarding what data has been lost because of the sensitivity of the ongoing investigation.” The Maryland Department of Information Technology has confirmed it is working with law enforcement agencies and cybersecurity firms to trace the source of the intrusion and assess the depth of the damage. Transportation systems, including buses, subways, and light rail, were not directly impacted. However, the attack affected several real-time information services and tools, including those linked to a program known as Mobility, a service that orders shared rides from home through a website for those who do not use bus stops. Per cybercrime news outlet The Record, Rhysida was responsible for a ransomware attack against Prince George’s County Public Schools (PGCPS), one of the largest districts in the Washington, DC, suburbs. The attack, which occurred in August 2023, caused a network outage that disrupted operations just before the new school year. PGCPS, which serves about 130,000 students, later confirmed in a regulatory filing that personal information of nearly 100,000 individuals may have been exposed. “The information present in the files that may have been viewed or acquired as a result of this incident varies per person, and includes individuals’ names, financial account information, and Social Security numbers,” the district said at the time. Pennsylvania attorney general’s office hit by ransomware In other-related news, ransomware attacks were also reported by Pennsylvania’s Office of the Attorney General in early September. According to Attorney General Dave Sunday, the cybercrime group Inc. ransomware had encrypted files and communications systems on August 11. AG Sunday said courts granted extensions in certain cases where evidence and court filings had been affected, and that no prosecutions or investigations would fail “because of the cyberattack.” “This situation has certainly tested OAG staff and prompted some modifications to our typical routines; however, we are committed to our duty and mission to protect and represent Pennsylvanians, and are confident that mission is being fulfilled,” Sunday said in a statement. The office has not disclosed if any personal data was stolen, but officials said anyone whose information was compromised would be notified once the investigation concludes. Security researchers said the Pennsylvania incident may have been caused by security flaws in Citrix NetScaler devices that are used by several government and corporate networks . A CVE-2025-5777 or “Citrix Bleed 2” exploit could allow attackers to bypass authentication to access sensitive government systems. Cybersecurity analyst Kevin Beaumont published evidence suggesting that at least two internet-exposed Citrix NetScaler appliances in the attorney general’s office were vulnerable before being taken offline. Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free .

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.