
Why Multi-Factor Authentication is Not Enough
Knowing is half the battle, and the use and abuse of common frameworks shed insight into what defenders need to do to build defense in depth.
September 13, 2024 - Blog

One month after confirming a cyber incident that disrupted customer communications and raised concerns about data privacy, London North Eastern Railway (LNER) has revealed exactly what personal information was exposed. The British rail operator’s latest update provides long-awaited clarity for affected passengers and regulators, while underscoring the escalating risks of supply-chain breaches in the transportation sector.
Read more today:
As reported by LNER, the cyberattack originated not from its own internal systems but through a third-party supplier that handled customer data. The company first detected suspicious activity in early September 2025, prompting an immediate investigation and suspension of several online services, including customer communication channels.
Security experts quickly identified the incident as part of a broader trend in supply chain compromise, where attackers exploit smaller vendors with weaker defenses to access valuable corporate data. LNER stated that it worked closely with external cybersecurity specialists and the UK Information Commissioner’s Office (ICO) to assess the extent of exposure.
“We take the security of our customers’ data extremely seriously,” an LNER spokesperson said in a recent interview with RailTech. “Once we became aware of the breach, we took swift action to contain the incident, notify relevant authorities, and contact potentially affected individuals.”
In its latest disclosure, LNER outlined the specific categories of PII accessed by the unauthorized party.
Data Category | Status | Details |
Names | Exposed | Full names of some customers were compromised. |
Email Addresses and Contact Info | Exposed | Includes email addresses and occasionally phone numbers. |
Travel and Booking Details | Exposed | Some records of previous journeys and ticketing data. |
Payment Information | Not Exposed | No bank or credit-card details were accessed; LNER does not store card data on the affected systems. |
Passwords or Login Credentials | Not Exposed | Authentication details remain secure; no accounts were compromised. |
The company confirmed that core operational systems, such as ticketing infrastructure and train scheduling, were unaffected.
Although no financial data was lost, cybersecurity analysts caution that the breach could still have long-term implications. Exposed names, emails, and travel patterns provide fertile ground for targeted phishing and social engineering attacks.
Potential scams may include emails impersonating LNER, offering refunds or loyalty rewards, and asking recipients to “verify” payment details. LNER has urged all customers to remain alert to unsolicited messages, avoid clicking unknown links, and report suspicious emails immediately.
Since the breach, LNER has:
Notified all affected customers directly via email and postal letters.
Engaged independent cybersecurity experts to audit its own networks and vendor controls.
Reinforced its data-sharing agreements with third-party suppliers, requiring enhanced encryption and regular security assessments.
Strengthened internal incident-response protocols to detect and isolate vendor-related threats faster.
Cooperated fully with the ICO and the UK’s National Cyber Security Centre (NCSC) in remediation efforts.
LNER emphasized that transparency was a key part of its recovery plan, which, in turn, highlights the growing vulnerability of critical infrastructure operators to supply chain cyberattacks. Critical infrastructure providers increasingly depend on third-party software for ticketing, analytics, and customer management, thereby creating an extended web of potential entry points for attackers.
Industry observers note that the LNER case mirrors other high-profile incidents affecting transport networks in Europe, including attacks on Deutsche Bahn and SNCF vendors in recent years. The common factor: outsourced data processing and insufficient visibility into supplier security practices.
LNER advises customers to:
Be cautious of phishing messages claiming to be from LNER or related partners.
Avoid sharing personal or financial information over unsolicited emails or calls.
Update passwords regularly on accounts that use the same email address.
Monitor email activity for suspicious login or subscription alerts.
Those who believe they may have been affected can contact LNER’s dedicated support line or the ICO helpline for advice on data-protection rights.
LNER has pledged to publish a follow-up report once its forensic investigation concludes. The company also plans to introduce additional customer-facing privacy controls and review its entire vendor ecosystem.
The breach serves as a stark reminder that cybersecurity in transportation must extend beyond the rail operator’s firewall. In an interconnected digital ecosystem, trust is only as strong as the weakest supplier.
Speak with an Account Executive