{"id":54852,"date":"2023-12-14T13:34:47","date_gmt":"2023-12-14T13:34:47","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35302\/Trains-Were-Designed-To-Break-Down-After-Third-Party-Repairs-Hackers-Find.html"},"modified":"2023-12-14T13:34:47","modified_gmt":"2023-12-14T13:34:47","slug":"trains-were-designed-to-break-down-after-third-party-repairs-hackers-find","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/","title":{"rendered":"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/12\/Newag-YouTube-800x437.jpg\" alt=\"Dragon Sector uploaded a video to social media after discovering an &quot;undocumented \u2018unlock code\u2019 which you could enter from the train driver\u2019s panel&quot; fixed &quot;mysterious issues&quot; impacting trains in Poland.\"><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/12\/Newag-YouTube.jpg\" class=\"enlarge-link\" data-height=\"1093\" data-width=\"2000\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Dragon Sector uploaded a video to social media after discovering an &#8220;undocumented \u2018unlock code\u2019 which you could enter from the train driver\u2019s panel&#8221; fixed &#8220;mysterious issues&#8221; impacting trains in Poland.<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2023\/12\/manufacturer-deliberately-bricked-trains-repaired-by-competitors-hackers-find\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">117<\/span> <\/a> <\/aside>\n<p> <!-- cache hit 6:single\/related:69a9cdf565e0e11daa6ffa533e6d2359 --><!-- empty --><\/p>\n<p>An unusual right-to-repair drama is disrupting railroad travel in Poland despite efforts by hackers who helped repair trains that allegedly were designed to stop functioning when serviced by anyone but Newag, the train manufacturer.<\/p>\n<p>Members of an ethical hacking group called Dragon Sector, including Sergiusz Baza\u0144ski and Micha\u0142 Kowalczyk, were called upon by a train repair shop, Serwis Pojazd\u00f3w Szynowych (SPS), to analyze train software in June 2022. SPS was desperate to figure out what was causing &#8220;mysterious failures&#8221; that shut down several vehicles owned by Polish train operator the Lower Silesian Railway, Polish infrastructure trade publication Rynek Kolejowy <a href=\"https:\/\/www.rynek-kolejowy.pl\/wiadomosci\/afera-hakerska--mamy-stanowiska-sps-i-newag--116410.html\">reported<\/a>. At that point, the shortage of trains had already become &#8220;a serious problem&#8221; for carriers and passengers, as fewer available cars meant shorter trains and reduced rider capacity, Rynek Kolejowy reported.<\/p>\n<p>Dragon Sector spent two months analyzing the software, finding that &#8220;the manufacturer&#8217;s interference&#8221; led to &#8220;forced failures and to the fact that the trains did not start,&#8221; and concluding that bricking the trains &#8220;was a deliberate action on Newag&#8217;s part.&#8221;<\/p>\n<p>According to Dragon Sector, Newag entered code into the control systems of Impuls trains to stop them from operating if a GPS tracker indicated that the train was parked for several days at an independent repair shop.<\/p>\n<p>The trains &#8220;were given the logic that they would not move if they were parked in a specific location in Poland, and these locations were the service hall of SPS and the halls of other similar companies in the industry,&#8221; Dragon Sector&#8217;s team <a href=\"https:\/\/www.rynek-kolejowy.pl\/wiadomosci\/afera-hakerska--mamy-stanowiska-sps-i-newag--116410.html\">alleged<\/a>. &#8220;Even one of the SPS halls, which was still under construction, was included.&#8221;<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>The code also allegedly bricked the train if &#8220;certain components had been replaced without a manufacturer-approved serial number,&#8221; 404 Media <a href=\"https:\/\/www.404media.co\/polish-hackers-repaired-trains-the-manufacturer-artificially-bricked-now-the-train-company-is-threatening-them\/\">reported<\/a>.<\/p>\n<p>In a <a href=\"https:\/\/www.rynek-kolejowy.pl\/wiadomosci\/newag-odpowiada-hakerom-i-sps-chce-wycofania-pojazdow-z-ruchu-116422.html\">statement<\/a>, Newag denied developing any so-called &#8220;workshop-detection&#8221; software that caused &#8220;intentional failures&#8221; and threatened to sue Dragon Sector for slander and for violating hacking laws.<\/p>\n<p>\u201cHacking IT systems is a violation of many legal provisions and a threat to railway traffic safety,\u201d Newag said, insisting that the hacked trains be removed from use because they now pose alleged safety risks. Newag&#8217;s safety claims are still unsubstantiated, 404 Media reported.<\/p>\n<p>&#8220;We categorically deny and negate Newag&#8217;s uploading of any functionality in vehicle control systems that limits or prevents the proper operation of vehicles, as well as limiting the group of entities that can provide maintenance or repair services,&#8221; Newag&#8217;s statement said. According to Newag, Dragon Sector&#8217;s report shouldn&#8217;t be trusted because it was commissioned by one of Newag&#8217;s biggest competitors.<\/p>\n<p>Dragon Sector maintains that the evidence supports its conclusions. Baza\u0144ski <a href=\"https:\/\/social.hackerspace.pl\/@q3k\/111528162462505087?ref=404media.co\">posted<\/a> on Mastodon that \u201cthese trains were locking up for arbitrary reasons after being serviced at third-party workshops. The manufacturer argued that this was because of malpractice by these workshops, and that they should be serviced by them instead of third parties.&#8221; In some cases, Baza\u0144ski wrote, Newag &#8220;appeared to be able to lock the train remotely.\u201d<\/p>\n<p>Newag has said that &#8220;any remote intervention&#8221; is &#8220;virtually impossible.&#8221;<\/p>\n<h2>Lawsuit threats fails to silence hackers<\/h2>\n<p>Dragon Sector got the trains running after discovering &#8220;an undocumented \u2018unlock code\u2019 which you could enter from the train driver\u2019s panel which magically fixed the issue,&#8221; Dragon Sector&#8217;s team told 404 Media.<\/p>\n<p>Newag has maintained that it has never and will never &#8220;introduce into the software of our trains any solutions that lead to intentional failures.&#8221;<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>&#8220;We do not know who interfered with the train control software, using what methods and what qualifications,&#8221; Newag said. &#8220;We also notified the Office of Rail Transport about this so that it could decide to withdraw from service the sets subjected to the activities of unknown hackers.&#8221;<\/p>\n<p>Dragon Sector and SPS have denied interfering with the train&#8217;s control systems.<\/p>\n<p>While Newag has contacted authorities to investigate the hacking, Janusz Cieszy\u0144ski, Poland\u2019s former minister of digital affairs, <a href=\"https:\/\/twitter.com\/jciesz\/status\/1732411016221524070?s=20\">posted on X<\/a> that the evidence appears to weigh against Newag.<\/p>\n<p>&#8220;The president of Newag contacted me,&#8221; Cieszy\u0144ski wrote. &#8220;He claims that Newag fell victim to cybercriminals and it was not an intentional action by the company. The analysis I saw indicated something else, but for the sake of clarity, I will write about everything.<\/p>\n<p>Newag president Zbigniew Konieczek <a href=\"https:\/\/www.rynek-kolejowy.pl\/wiadomosci\/afera-hakerska--mamy-stanowiska-sps-i-newag--116410.html\">said<\/a> that &#8220;no evidence was provided that our company intentionally installed the faulty software. In our opinion, the truth may be completely different\u2014that, for example, the competition interfered with the software.&#8221;<\/p>\n<p>Konieczek also accused Cieszy\u0144ski of disseminating &#8220;false and highly harmful information about Newag.&#8221;<\/p>\n<p>404 Media noted that Newag appeared to be following a common playbook in the right-to-repair world where manufacturers intimidate competitor repair shops with threatened lawsuits and unsubstantiated claims about safety risks of third-party repairs. So far, Dragon Sector does not appear intimidated, posting its success <a href=\"https:\/\/www.youtube.com\/watch?v=Gv6vjhkLQpM\">on YouTube<\/a> and discussing its findings at Poland\u2019s Oh My H@ck conference in Warsaw. The group is also planning &#8220;a more detailed presentation&#8221; for the 37th Chaos Communication Congress in Hamburg, Germany, at the end of December, <a href=\"https:\/\/www.theregister.com\/2023\/12\/08\/polish_trains_geofenced_allegation\/\">The Register reported<\/a>.<\/p>\n<p>Because of the evidence gathered during their analysis, the Dragon Sector team has doubts about whether Newag will actually follow through with the lawsuit.<\/p>\n<p>&#8220;Their defense line is really poor, and they would have no chance defending it,&#8221; Kowalczk told 404 Media. &#8220;They probably just want to sound scary in the media.\u201d<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35302\/Trains-Were-Designed-To-Break-Down-After-Third-Party-Repairs-Hackers-Find.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54853,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[256],"class_list":["post-54852","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackerflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trains Were Designed To Break Down After Third Party Repairs, Hackers Find 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-14T13:34:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/12\/Newag-YouTube-800x437.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find\",\"datePublished\":\"2023-12-14T13:34:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/\"},\"wordCount\":940,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find.jpg\",\"keywords\":[\"headline,hacker,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/\",\"name\":\"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find.jpg\",\"datePublished\":\"2023-12-14T13:34:47+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find.jpg\",\"width\":800,\"height\":437},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/","og_locale":"en_US","og_type":"article","og_title":"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-12-14T13:34:47+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/12\/Newag-YouTube-800x437.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find","datePublished":"2023-12-14T13:34:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/"},"wordCount":940,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find.jpg","keywords":["headline,hacker,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/","url":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/","name":"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find.jpg","datePublished":"2023-12-14T13:34:47+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find.jpg","width":800,"height":437},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/trains-were-designed-to-break-down-after-third-party-repairs-hackers-find\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/"},{"@type":"ListItem","position":3,"name":"Trains Were Designed To Break Down After Third Party Repairs, Hackers Find"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54852"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54852\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54853"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}