Company Details
pittsburgh-regional-transit
875
7,910
484
rideprt.org
0
PIT_1148579
In-progress

Pittsburgh Regional Transit Company CyberSecurity Posture
rideprt.orgPittsburgh Regional Transit, formerly Port Authority of Allegheny County, is the nation’s 26th largest transit agency. Our 2,600 employees operate, maintain, and support bus, rail, and incline service in the Pittsburgh metro area.
Company Details
pittsburgh-regional-transit
875
7,910
484
rideprt.org
0
PIT_1148579
In-progress
Between 0 and 549

PRT Global Score (TPRM)XXXX

Description: On December 23, 2024, Pittsburgh Regional Transit experienced a ransomware attack that caused considerable disruptions to its transportation services. The incident was promptly addressed with an investigation, law enforcement notification, and the expertise of cybersecurity professionals. Although there was a temporary suspension of rail services on Thursday morning, operations have since returned to normal. Nonetheless, certain rider services like the PRT Customer Service Center remained affected with an inability to manage Senior and Kid's ConnectCards. The extent of data compromise, if any, remains undetermined, and the identity of the cyber attackers or ransomware gang responsible for the incident has not been disclosed.
Description: Pittsburgh Regional Transit (PRT) suffered service disruptions due to a ransomware attack, causing significant inconvenience for local transportation systems. The incident, detected on December 19, 2024, led to temporary interruptions in rail services, impacting commuters. Cybersecurity experts and law enforcement were engaged to address the situation and assess potential data compromises. Although rail services resumed promptly, the Customer Service Center's ability to process ConnectCards remains affected. The extent of data theft, if any, remains undisclosed.
Description: Pittsburgh Regional Transit (PRT) suffered a **ransomware attack** on **December 19**, disrupting critical transit operations. The attack caused **temporary outages** in the city’s **T rail system**, leading to **20-minute delays** and forcing several systems offline. While rail services resumed normal operations by the following week, other key functions—such as the **Customer Service Center** and processing of **senior/child ConnectCards**—remained impaired. PRT activated its **Cyber Incident Response Team**, engaged **third-party forensics experts**, and notified law enforcement, but the extent of data compromise (if any) and the attacker’s identity remain undisclosed.The incident highlights the vulnerability of **public transit agencies**, which are frequent targets due to their **sensitive customer data** and potential to cause **large-scale operational disruptions**. Similar attacks have previously crippled transit systems, including the **Port of Seattle (2023)** and **SEPTA (2020)**, where real-time transit information was knocked offline for weeks. PRT emphasized its commitment to security but withheld specifics, citing the **ongoing investigation’s sensitivity**. The attack underscores the growing threat of **ransomware against critical infrastructure**, risking **public safety, financial losses, and reputational damage**.


No incidents recorded for Pittsburgh Regional Transit in 2025.
No incidents recorded for Pittsburgh Regional Transit in 2025.
No incidents recorded for Pittsburgh Regional Transit in 2025.
PRT cyber incidents detection timeline including parent company and subsidiaries

Pittsburgh Regional Transit, formerly Port Authority of Allegheny County, is the nation’s 26th largest transit agency. Our 2,600 employees operate, maintain, and support bus, rail, and incline service in the Pittsburgh metro area.


CLW GROUP TRUCK produce trucks specially for you,we are the biggest special trucks manufacturer in China,you can find all kinds of the special trucks produced in our factory ,and you can also send us the drawings and the requirement details to produced specially for you . In our factory you can f

Put us on the job and consider it done. Schneider is a premier provider of transportation and logistics services headquartered in Green Bay, Wisconsin, and with offices in Chicago, Dallas and many cities in between. Offering one of the broadest portfolios in the industry, Schneider’s solutions inclu

Penske Truck Leasing is a Penske Transportation Solutions company headquartered in Reading, Pennsylvania. A leading provider of innovative transportation solutions, Penske operates and maintains more than 400,000 vehicles and serves its customers from nearly 1,000 maintenance facilities and more tha

Penske Logistics is a Penske Transportation Solutions company headquartered in Reading, Pennsylvania. The company is a leading provider of innovative supply chain and logistics solutions. Penske offers solutions including dedicated transportation, distribution center management, lead logistics, frei

Transnet Freight Rail is the largest division of Transnet SOC Ltd. It is a world class heavy haul freight rail company that specialises in the transportation of freight. The company maintains an extensive rail network across South Africa that connects with other rail networks in the sub-Saharan reg

We’re an innovative NSW government organisation comprised of a network of agencies and divisions that keep the state moving. Our focus is on delivering safe, reliable and integrated transport networks for everyone. With over 28,000 team members, we’re committed to inclusion, diversity, and opportun

XPO provides world-class transportation solutions to the most successful companies in the world. We have a high-energy team around the globe focused on being the best in the industry. Given the scope of our business, there are opportunities to do satisfying work in many different fields, and at all

J.B. Hunt Transport, Inc. is a Fortune 300 company that specializes in freight shipping for customers of all sizes. Our mission is to drive long-term value for our people, customers and shareholders while staying focused on our vision to create the most efficient transportation network in North Amer

Established in 1947, Grimaldi is a fully integrated multinational logistics Group specialising in maritime transport of cars, rolling cargo, containers and passengers. Wholly owned by the Grimaldi family, the Group is led by Gianluca and Emanuele Grimaldi, sons of the founder Guido, and their broth
.png)
The Mt. Washington Transit Tunnel in Pittsburgh is expected to reopen by the end of 2025, following a delay caused by a design issue,...
Nearly 30 passengers were rescued from the Monongahela Incline after the cars stopped with people inside on Saturday.
Pittsburgh Regional Transit said the reopening of the Mount Washington Tunnel has been delayed. The tunnel has been closed since February,...
Pittsburgh Regional Transit will suspend rail service in Downtown Pittsburgh on Monday to conduct repairs on overhead electrical lines.
Officials have revealed what happened before a woman was hit and killed by a Pittsburgh Regional Transit bus in the city's Spring Hill...
A woman died after she was hit by a Pittsburgh Regional Transit Bus in the city's Spring Hill neighborhood.
Explore how railway systems cybersecurity defends critical infrastructure from hacks, AI-driven threats, and rising geopolitical...
In response to state Sen. Devlin Robinson's op-ed “Standing up for Pittsburgh transit — funding, safety and accountability” (Aug.
One of the nation's largest and oldest Labor Day parades returns to Pittsburgh on Monday. The day of festivities begins with the traditional...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Pittsburgh Regional Transit is http://www.ridePRT.org.
According to Rankiteo, Pittsburgh Regional Transit’s AI-generated cybersecurity score is 499, reflecting their Critical security posture.
According to Rankiteo, Pittsburgh Regional Transit currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Pittsburgh Regional Transit is not certified under SOC 2 Type 1.
According to Rankiteo, Pittsburgh Regional Transit does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Pittsburgh Regional Transit is not listed as GDPR compliant.
According to Rankiteo, Pittsburgh Regional Transit does not currently maintain PCI DSS compliance.
According to Rankiteo, Pittsburgh Regional Transit is not compliant with HIPAA regulations.
According to Rankiteo,Pittsburgh Regional Transit is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Pittsburgh Regional Transit operates primarily in the Truck Transportation industry.
Pittsburgh Regional Transit employs approximately 875 people worldwide.
Pittsburgh Regional Transit presently has no subsidiaries across any sectors.
Pittsburgh Regional Transit’s official LinkedIn profile has approximately 7,910 followers.
Pittsburgh Regional Transit is classified under the NAICS code 484, which corresponds to Truck Transportation.
No, Pittsburgh Regional Transit does not have a profile on Crunchbase.
Yes, Pittsburgh Regional Transit maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/pittsburgh-regional-transit.
As of November 30, 2025, Rankiteo reports that Pittsburgh Regional Transit has experienced 3 cybersecurity incidents.
Pittsburgh Regional Transit has an estimated 5,474 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with cybersecurity experts, and and third party assistance with cybersecurity professionals, and and and and and recovery measures with restored t rail service by dec 25; ongoing recovery for other systems, and communication strategy with public updates via news release; limited details due to sensitivity..
Title: Ransomware Attack on Pittsburgh Regional Transit
Description: Pittsburgh Regional Transit (PRT) suffered service disruptions due to a ransomware attack, causing significant inconvenience for local transportation systems. The incident, detected on December 19, 2024, led to temporary interruptions in rail services, impacting commuters. Cybersecurity experts and law enforcement were engaged to address the situation and assess potential data compromises. Although rail services resumed promptly, the Customer Service Center's ability to process ConnectCards remains affected. The extent of data theft, if any, remains undisclosed.
Date Detected: 2024-12-19
Type: Ransomware Attack
Title: Pittsburgh Regional Transit Ransomware Attack
Description: On December 23, 2024, Pittsburgh Regional Transit experienced a ransomware attack that caused considerable disruptions to its transportation services.
Date Detected: 2024-12-23
Type: Ransomware Attack
Attack Vector: Ransomware
Title: Ransomware Attack on Pittsburgh Regional Transit (PRT)
Description: Pittsburgh’s transit authority (Pittsburgh Regional Transit, PRT) was hit with a ransomware attack on December 19, causing temporary disruptions to the city’s public transportation system, including delays in T rail service (20-minute delays) and offline systems. By December 25 (Monday), transit services returned to normal, but other rider services (e.g., Customer Service Center) and ConnectCard processing for seniors/children remained impacted. PRT activated its Cyber Incident Response Team, notified law enforcement, and engaged third-party cybersecurity experts. No confirmation yet on data compromise or culprit identification.
Date Detected: 2023-12-19
Date Publicly Disclosed: 2023-12-25
Type: ransomware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Systems Affected: Rail servicesCustomer Service Center
Downtime: Temporary interruptions in rail services
Operational Impact: Significant inconvenience for local transportation systems

Systems Affected: Rail servicesPRT Customer Service CenterSenior and Kid's ConnectCards
Downtime: ['Temporary suspension of rail services on Thursday morning']
Operational Impact: Disruptions to transportation services

Systems Affected: T rail service (20-minute delays)Customer Service CenterConnectCard processing (senior/child cards)Online systems (unspecified)
Downtime: {'T rail': '~1 week (Dec 19–Dec 25)', 'Customer Service Center': 'ongoing as of Dec 25', 'ConnectCard processing': 'ongoing as of Dec 25'}
Operational Impact: Temporary disruptions to rail and rider services

Entity Name: Pittsburgh Regional Transit
Entity Type: Public Transportation
Industry: Transportation
Location: Pittsburgh

Entity Name: Pittsburgh Regional Transit
Entity Type: Public Transportation Agency
Industry: Transportation
Location: Pittsburgh

Entity Name: Pittsburgh Regional Transit (PRT)
Entity Type: public transit authority
Industry: transportation
Location: Pittsburgh, Pennsylvania, USA

Third Party Assistance: Cybersecurity Experts.

Third Party Assistance: Cybersecurity Professionals.

Incident Response Plan Activated: True
Recovery Measures: Restored T rail service by Dec 25; ongoing recovery for other systems
Communication Strategy: Public updates via news release; limited details due to sensitivity
Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity experts, , Cybersecurity professionals, , .

Data Encryption: likely (systems taken offline)
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Restored T rail service by Dec 25; ongoing recovery for other systems.

Source: Pittsburgh Regional Transit News Release
Date Accessed: 2023-12-25
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Pittsburgh Regional Transit News ReleaseDate Accessed: 2023-12-25, and Source: WPXI Channel 11 (local news)Date Accessed: 2023-12-19.

Investigation Status: ongoing (culprit and data compromise unclear)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public updates via news release; limited details due to sensitivity.

Stakeholder Advisories: Public updates committed as investigation evolves
Customer Advisories: Disruptions to ConnectCard processing and Customer Service Center acknowledged
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Public updates committed as investigation evolves and Disruptions to ConnectCard processing and Customer Service Center acknowledged.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity Experts, , Cybersecurity Professionals, , .
Most Recent Incident Detected: The most recent incident detected was on 2024-12-19.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-12-25.
Most Significant System Affected: The most significant system affected in an incident was Rail servicesCustomer Service Center and Rail servicesPRT Customer Service CenterSenior and Kid's ConnectCards and T rail service (20-minute delays)Customer Service CenterConnectCard processing (senior/child cards)Online systems (unspecified).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was cybersecurity experts, , cybersecurity professionals, , .
Most Recent Source: The most recent source of information about an incident are WPXI Channel 11 (local news) and Pittsburgh Regional Transit News Release.
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (culprit and data compromise unclear).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Public updates committed as investigation evolves, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Disruptions to ConnectCard processing and Customer Service Center acknowledged.
.png)
A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.