Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»LNER Reveals Supply Chain Attack Compromised Customer Information
News

LNER Reveals Supply Chain Attack Compromised Customer Information

Team-CWDBy Team-CWDSeptember 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The operator of one of the UK’s busiest rail lines has admitted that an unauthorized third party has accessed customer details via a supplier.

LNER, the government-owned company that runs east coast services between London and Scotland, revealed the incident in an online update yesterday.

“We have been made aware of unauthorised access to files managed by a third-party supplier, which involves customer contact details and some information about previous journeys,” it said.

“Importantly, no bank, payment card or password information has been affected.”

However, the train operator did warn that compromised information could be used to target customers in follow-on attacks.

“Please be cautious of unsolicited communications, especially those asking for personal information. If in doubt, do not respond,” it urged.

Read more on threats impacting the rail industry: Cybercriminals Hack UK Rail Network Wi-Fi

LNER’s warnings were echoed by security experts.

“The data exposed in the LNER breach, while not of critical security context, can still be used to generate compelling phishing documents and other attacks against a user’s identity,” said Huntress senior security operations analyst, Michael Tigges.

“Incidents such as these are a stark reminder that while the primary organization may protect our data, third parties around the world constantly handle data and personal information in the regular course of their business.”

He urged businesses to carry out regular tabletop exercises, as well as data discovery, to understand where sensitive information flows out of the organization and how it is protected.

“End users should consider hardening their identities (emails and personal information) with identity threat detection and response systems to help detect attacks that may weaponize the information stolen,” Tigges added.

As no passwords were stolen in the incident, LNER is not resetting customer credentials, although it reminded them that “it is always good practice to maintain a secure password and to change passwords regularly.”

In a speech in London yesterday, security minister Dan Jarvis called out several government initiatives designed to crack down on cyber and fraud threats.

“We are boosting police powers through the Crime and Policing Bill, so that law enforcement can suspend IP addresses and domain names being used to facilitate serious crime,” he said.

“And I am driving forward across government the new package of legislative measures we intend to introduce in the coming year to protect UK businesses from ransomware.”

Image credit: Bradley Caslin / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUkrainian Ransomware Fugitive Added to Europe’s Most Wanted
Next Article KillSec Ransomware Hits Brazilian Healthcare IT Vendor
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What’s at stake if your employees post too much online

December 1, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Here’s what you should know

February 6, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.