
Man clings to Austrian high-speed train and survives
Yesterday, the man grabbed onto the outside of the train at St Poelten, west of Vienna, railways spokesman Herbert Hofer said, and was later taken onboard after the train performed an emergency stop.
"It is irresponsible, this kind of thing usually ends up with someone dying," he said.
"And you're not just putting yourself in danger, if you end up under the train there's rescuers, there's police, fire service that come," he added.
The railjet train was on its way from Zurich in Switzerland to the Austrian capital and left Sankt Poelten on time but arrived in Vienna with a seven minute delay, Mr Hofer said.
Citing a passenger onboard, Austrian tabloid Heute said the man jumped into the space between two carriages after the train began to set off from a planned stop in Sankt Poelten.
The man had taken advantage of being at a station to smoke a cigarette on the platform, Heute said.
The man soon began to bang on windows to attract attention, Heute said, resulting in the train's conductor activating the emergency brake before train crew took the man aboard.
"The conductor really had a very big go at him," the passenger told Heute.
The man is a 24-year-old Algerian and was led away by police after the train arrived in Vienna's Meidling station, Heute reported.
Hofer said he could not comment on the man's background ahead of further investigations.
In January, a 40-year-old Hungarian man survived clinging to a German high-speed train for 20 miles, likewise after it set off before he had finished his cigarette.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


RTÉ News
a day ago
- RTÉ News
Man clings to Austrian high-speed train and survives
A man has survived clinging to the outside of an Austrian high-speed train, Austria's state railway said, reportedly after it left whilst he was having a cigarette break. Yesterday, the man grabbed onto the outside of the train at St Poelten, west of Vienna, railways spokesman Herbert Hofer said, and was later taken onboard after the train performed an emergency stop. "It is irresponsible, this kind of thing usually ends up with someone dying," he said. "And you're not just putting yourself in danger, if you end up under the train there's rescuers, there's police, fire service that come," he added. The railjet train was on its way from Zurich in Switzerland to the Austrian capital and left Sankt Poelten on time but arrived in Vienna with a seven minute delay, Mr Hofer said. Citing a passenger onboard, Austrian tabloid Heute said the man jumped into the space between two carriages after the train began to set off from a planned stop in Sankt Poelten. The man had taken advantage of being at a station to smoke a cigarette on the platform, Heute said. The man soon began to bang on windows to attract attention, Heute said, resulting in the train's conductor activating the emergency brake before train crew took the man aboard. "The conductor really had a very big go at him," the passenger told Heute. The man is a 24-year-old Algerian and was led away by police after the train arrived in Vienna's Meidling station, Heute reported. Hofer said he could not comment on the man's background ahead of further investigations. In January, a 40-year-old Hungarian man survived clinging to a German high-speed train for 20 miles, likewise after it set off before he had finished his cigarette.


Sunday World
3 days ago
- Sunday World
Gardai help take down ‘serious' cybercriminal organisation behind $370m ransom payments
'nowhere to hide' | In the US, authorities there said the operation resulted in the seizures of servers, domains and digital assets used to deploy ransomware, extort victims, and launder proceeds A copy of the 'splashscreen' image which has replaced the seized domains The Garda National Cyber Crime Bureau joined United States Immigration and Customs Enforcement (ICE) in a 'disruption operation' targeting the Blacksuit Ransomware Group. Key operational infrastructure, including the dark web leaks page and the victim negotiation site, as well as domains attributed to the international criminal network have been successfully removed. Other law enforcement agencies including the United States Department of Homeland Security (DHS), US Secret Service, the FBI, as well as Dutch, German, UK and Ukrainian police, and Europol took part in the operation. According to a Garda press release, the Blacksuit ransomware group are an organised crime gang responsible for the commission of ransomware and other 'serious cyber criminality internationally'. A copy of the 'splashscreen' image which has replaced the seized domains News in 90 Seconds - Aug 8th 'The Blacksuit ransomware group emerged in May 2023, as a result of the rebranding of the Royal Ransomware Group,' gardai said, 'itself originating from the Conti Ransomware Group, responsible for a number of serious ransomware attacks internationally.' The Garda Assistant Commissioner for Organised and Serious Crime said they will continue to work with international law enforcement colleagues and private partners 'to identify, target and disrupt organised crime groups using the infrastructure to carry out ransomware and other forms of cybercrime'. 'Our work to date involving close collaboration with international partners, including this seizure and takedown of key online operational infrastructure will continue as part of our ongoing effort to keep people safe both on an offline.' According to gardaí, dark web leaks page is a website maintained by a ransomware group on the darknet. It is where they publish the names of victims that refuse to pay a ransom or to engage with them. A victim negotiation site is another site maintained by the threat actors. This is not generally accessible by the wider public, but is where the victims of a ransomware go to engage and communicate with the offenders. In the US, authorities there said the operation resulted in the seizures of servers, domains and digital assets used to deploy ransomware, extort victims, and launder proceeds. 'Disrupting ransomware infrastructure is not only about taking down servers, it's about dismantling the entire ecosystem that enables cybercriminals to operate with impunity,' said HSI Cyber Crimes Center Deputy Assistant Director Michael Prado. Read more 'This operation is the result of tireless international coordination and shows our collective resolve to hold ransomware actors accountable.' Since 2022, the Royal and BlackSuit ransomware groups have compromised over 450 known victims in the United States, including entities in the healthcare, education, public safety, energy and government sectors. Combined, the groups have received more than $370 million in ransom payments, based on present-day valuations of cryptocurrency. The ransomware schemes used double-extortion tactics — encrypting victims' systems while threatening to leak stolen data to further coerce payment. 'This investigation reflects the full reach of HSI's cyber mission and our commitment to protecting victims — whether they're small businesses, school systems, or hospitals,' said HSI Washington, D.C. acting Special Agent in Charge Christopher Heck. 'We will continue to target the infrastructure, finances and operators behind these ransomware groups to ensure they have nowhere left to hide.'


Irish Independent
3 days ago
- Irish Independent
Gardaí help US take down ‘serious' cybercriminal gang behind $370m ransom payments
The Garda National Cyber Crime Bureau joined United States Immigration and Customs Enforcement (ICE) in a 'disruption operation' targeting the Blacksuit Ransomware Group. Key operational infrastructure, including the dark web leaks page and the victim negotiation site, as well as domains attributed to the international criminal network have been successfully removed. Other law enforcement agencies including the United States Department of Homeland Security (DHS), US Secret Service, the FBI, as well as Dutch, German, UK and Ukrainian police, and Europol took part in the operation. According to a Garda press release, the Blacksuit ransomware group are an organised crime gang responsible for the commission of ransomware and other 'serious cyber criminality internationally'. 'The Blacksuit ransomware group emerged in May 2023, as a result of the rebranding of the Royal Ransomware Group,' gardai said, 'itself originating from the Conti Ransomware Group, responsible for a number of serious ransomware attacks internationally.' The Garda Assistant Commissioner for Organised and Serious Crime said they will continue to work with international law enforcement colleagues and private partners 'to identify, target and disrupt organised crime groups using the infrastructure to carry out ransomware and other forms of cybercrime'. 'Our work to date involving close collaboration with international partners, including this seizure and takedown of key online operational infrastructure will continue as part of our ongoing effort to keep people safe both on an offline.' According to gardaí, dark web leaks page is a website maintained by a ransomware group on the darknet. It is where they publish the names of victims that refuse to pay a ransom or to engage with them. A victim negotiation site is another site maintained by the threat actors. This is not generally accessible by the wider public, but is where the victims of a ransomware go to engage and communicate with the offenders. In the US, authorities there said the operation resulted in the seizures of servers, domains and digital assets used to deploy ransomware, extort victims, and launder proceeds. ADVERTISEMENT 'Disrupting ransomware infrastructure is not only about taking down servers, it's about dismantling the entire ecosystem that enables cybercriminals to operate with impunity,' said HSI Cyber Crimes Center Deputy Assistant Director Michael Prado. 'This operation is the result of tireless international coordination and shows our collective resolve to hold ransomware actors accountable.' Since 2022, the Royal and BlackSuit ransomware groups have compromised over 450 known victims in the United States, including entities in the healthcare, education, public safety, energy and government sectors. Combined, the groups have received more than $370 million in ransom payments, based on present-day valuations of cryptocurrency. The ransomware schemes used double-extortion tactics — encrypting victims' systems while threatening to leak stolen data to further coerce payment. 'This investigation reflects the full reach of HSI's cyber mission and our commitment to protecting victims — whether they're small businesses, school systems, or hospitals,' said HSI Washington, D.C. acting Special Agent in Charge Christopher Heck. 'We will continue to target the infrastructure, finances and operators behind these ransomware groups to ensure they have nowhere left to hide.'