Feeds

Met Police confirms ICT outage but plays down attack fears

Two weeks of IT woe for cop staff

Reducing security risks from open source software

The Metropolitan Police Service is investigating the cause of a "major network issue" that has prevented staff using some IT services for almost two weeks.

A Met spokesman confirmed the problem was first identified on 9 June, but insisted no critical systems had been downed by the incident.

"As a result of a major network issue, the MPS is currently experiencing issues with a small number of ICT services, including printing services and system access for some MPS staff and officers," he told the Reg.

"MPS has taken significant steps to investigate this as a matter of priority. Progress has been made to restore a number of services and urgent work continues to resolve the issues and restore the remaining services to all staff and officers as quickly as possible.

"Where operationally required, staff and officers have been advised of workarounds and reverted to fallback procedures in the absence of certain applications to ensure this does not impact on the service to the public."

The Met said it has no reason to suspect the the network issues were caused by a deliberate cyber attack. "Investigations are still ongoing to identify the root cause and at this stage we are not ruling anything out. However, our anti-virus software continues to work effectively."

According to sources, a portion of the Met's computer system is offline, hindering some Police National Computer checks. It's possible "information leakage" by certain print servers could be blamed for the issue.

At the time of writing, the Met spokesman was unable to shed any light on this point or detail when the network woes would be resolved.

Previous research by the European Network and Information Security Agency highlighted the risks of printing and carelessly discarding sensitive biz documents. But Graham Cluley, senior tech consultant at Sophos, was unaware of any previous security attacks infecting actual printer hardware.

"Printers don't normally have a programming interface to run its own code, there could be data storage or management software but I haven't heard of malware [attacks] and if there were it would be hardware specific," he said.

"It would, however, be an interesting proof of concept." ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.