Rail Transport: Critical Infrastructure on the Boundary Between Cyber and Physical

11. mája 2026

In August 2023, something happened on the Polish railways that until then had belonged to the realm of scenarios, not reality. Unknown actors abused the radio system for emergency stopping (radio-stop) and transmitted a signal that brought more than 20 trains to a halt in various regions of the country. The attack required no access to digital systems and no sophisticated malware. A radio transmitter and knowledge of publicly available tones were enough. It was a demonstration of why rail transport ranks among the most complex categories of critical infrastructure. It brings together older analogue and radio technology with contemporary IT and OT systems, and each of these layers has its own vulnerabilities.

The Slovak rail system


The Slovak rail system has three main actors. Železnice Slovenskej republiky (ŽSR), as the infrastructure manager, administers approximately 3,580 kilometres of track, signalling and safety systems, traffic control workplaces and communication networks. Železničná spoločnosť Slovensko (ZSSK) operates passenger transport. Železničná spoločnosť Cargo Slovakia (ZSSK Cargo) operates freight transport, which is strategically important for the transit between Ukraine, the EU and the countries of Western Europe.


It is precisely rail freight transport that has acquired a new strategic dimension since February 2022. The Slovak railway has become one of the principal routes for the transport of humanitarian and military aid to Ukraine, for the export of Ukrainian grain and for the logistical support of defence cooperation within NATO. This shift has transformed the railway infrastructure from a domestic transport service into a cross-border strategic corridor.


Layers of vulnerability


Rail transport has four layers at which it may encounter an attack. The first is the signalling and safety layer, which encompasses onboard train protection systems, fixed signals, automatic train operation and GSM-R radio communication systems. The European Rail Traffic Management System (ERTMS), which is being gradually rolled out on Slovak lines, brings modernisation, but also new digital dependencies.


The second is the traffic control and command layer, which encompasses traffic control workplaces, train operation control systems and integration with neighbouring operators. The third is the commercial and administrative layer, including reservation systems, ticket sales, freight logistics systems and integration with customs and border systems. The fourth is the physical infrastructure of tracks, bridges, tunnels and junction stations, the disruption of which can have a direct physical impact on the safety of operations.


Attacks on railways in recent years have affected each of these layers. The cyber attack on Britain’s Network Rail in September 2024 through Wi-Fi networks in stations. The ransomware attack on the Italian operator Trenitalia in March 2022, which disabled ticket sales at stations. The physical sabotage of DB Netz fibre-optic cables in Germany in October 2022, which paralysed northern Germany for several hours. Ukrainian railway Ukrzaliznytsia has been facing virtually continuous cyber and physical attacks since 2022, which it has withstood thanks to the exceptional improvisational capability of its personnel.


Regulatory framework


Rail transport is classified under Act No. 367/2024 Coll. on Critical Infrastructure within the transport sector, as one of the 11 sectors of critical infrastructure. Act No. 366/2024 Coll. (the transposition of NIS 2) places railway infrastructure managers and carriers among the entities providing critically important services. To these are added specific rail regulations, in particular EU Regulation 2016/796 on the European Union Agency for Railways (ERA) and Regulation 2023/1230 on the common safety method for cybersecurity in the rail sector.


In July 2024, ENISA, jointly with ERA, published guidelines for the cybersecurity of ERTMS, which set out minimum requirements for the protection of signalling systems, identity management, network segmentation and the management of vulnerabilities in supply chain components. Decree of the National Security Authority No. 227 of 2025 supplements these requirements with the Slovak regulatory context.


Three practical priorities


For operators in the rail sector, three practical priorities emerge. The first is segmentation between operational systems (signalling, traffic control, GSM-R) and corporate IT, including the management of remote access by suppliers to OT environments. The second is the management of vulnerabilities specific to rail components with a long life cycle, where firmware and operating systems are updated on a timescale of years, not months. The third is cross-border coordination with operators in neighbouring countries, in particular in the context of transit between the EU and Ukraine, where a failure on one side has an immediate impact on the other.


“Rail transport shows why the Act on Critical Infrastructure cannot be implemented solely from the perspective of IT security. The security risks for a train can take the form of phishing aimed at a traffic controller, the compromise of a software supplier, the jamming of a radio signal or the physical sabotage of a track. Functional resilience means seeing all these layers simultaneously and having an operationally rehearsed response for each of them,” states Ing. Tibor Straka, President of AKI SR.


The railway is a 19th-century technology that has become digital in the 21st century. It is precisely this layered character that makes it one of the most fascinating and most demanding sectors of critical infrastructure, and one that deserves systematic professional attention.


11. mája 2026
V auguste 2023 sa na poľskej železnici udialo niečo, čo dovtedy patrilo do oblasti scenárov, nie reality. Neznámi aktéri zneužili rádiový systém núdzového zastavenia (radio-stop) a vyslali signál, ktorý zastavil viac ako 20 vlakov v rôznych regiónoch krajiny. Útok nepotreboval prístup do digitálnych systémov ani sofistikovaný malvér. Stačil rádiový vysielač a znalosť verejne dostupných tónov. Bola to ukážka, prečo železničná doprava patrí medzi najkomplexnejšie kategórie kritickej infraštruktúry. Spája sa v nej staršia analógová a rádiová technika so súčasnými IT a OT systémami a každá z týchto vrstiev má vlastné zraniteľnosti. 
6. mája 2026
Roughly 99 % of the world's intercontinental digital communication does not travel through satellites. It travels through a network of approximately 600 submarine fibre-optic cables with a combined length of 1.4 million kilometres, lying on the floor of the world's oceans. Through these cables flow more than 10 trillion US dollars in financial transactions every day, the bulk of email and cloud traffic, and almost all international internet traffic. They are the physical rope on which the digital economy hangs.
6. mája 2026
Asi 99 % medzikontinentálnej digitálnej komunikácie sveta neprebieha cez satelity. Prebieha cez sieť približne 600 podmorských optických káblov s celkovou dĺžkou 1,4 milióna kilometrov, ktoré ležia na dne svetových oceánov. Cez tieto káble každý deň pretečú finančné transakcie v hodnote viac ako 10 biliónov amerických dolárov, väčšina e-mailovej a cloudovej komunikácie a takmer celá medzinárodná internetová prevádzka. Sú to fyzické laná, na ktorých drží digitálna ekonomika.
1. mája 2026
Asociácia kritickej infraštruktúry SR (ďalej len „asociácia") považuje za potrebné reagovať na článok publikovaný v Denníku E, ktorý vo viacerých bodoch nepresne interpretuje činnosť asociácie, jej členskú základňu, ako aj povahu projektov realizovaných niektorými členskými subjektmi. Nižšie uvádzame vecné stanovisko k jednotlivým tvrdeniam.
30. apríla 2026
The area of critical infrastructure in the Slovak Republic is regulated by Act No. 367/2024 Coll. on Critical Infrastructure and on the Amendment and Supplementation of Certain Acts, which defines the individual sectors, sub-sectors and essential services necessary for the functioning of the state. The Critical Infrastructure Association of the Slovak Republic gradually presents the individual sectors with the aim of bringing closer their importance, their functioning and their impacts on the everyday life of society. This time we focus on the finance sector.
30. apríla 2026
Oblasť kritickej infraštruktúry v Slovenskej republike upravuje zákon č. 367/2024 Z. z. o kritickej infraštruktúre a o zmene a doplnení niektorých zákonov, ktorý definuje jednotlivé sektory, podsektory a základné služby nevyhnutné pre fungovanie štátu. Asociácia kritickej infraštruktúry Slovenskej republiky postupne predstavuje jednotlivé sektory s cieľom priblížiť ich význam, fungovanie a dopady na každodenný život spoločnosti. Tentokrát sa zameriame na sektor financií .
29. apríla 2026
On 17 April 2026, a trial began at the District Court in Vilnius that is shifting the European debate on the protection of critical infrastructure from the technical level to a very concrete one. Five men are charged with sending, in July 2024, in cooperation with the Special Tasks Department of the Russian military intelligence service GRU, incendiary parcels via DHL and DPD from Vilnius to the air hub in Leipzig, to Poland and to the United Kingdom. The head of the German counter-intelligence service BfV stated that only a flight delay prevented an in-flight detonation that could have destroyed a cargo aircraft. 
29. apríla 2026
Na Okresnom súde vo Vilniuse sa 17. apríla 2026 začal proces, ktorý posúva európsku diskusiu o ochrane kritickej infraštruktúry z roviny technickej do roviny veľmi konkrétnej. Päť mužov je obvinených z toho, že v júli 2024 v spolupráci s Oddelením špeciálnych úloh ruskej vojenskej spravodajskej služby GRU posielali zápalné zásielky cez DHL a DPD z Vilniusu do leteckého uzla v Lipsku, do Poľska a do Veľkej Británie. Šéf nemeckej kontrarozviedky BfV uviedol, že len omeškanie letu zabránilo detonácii vo vzduchu, ktorá mohla zničiť dopravné lietadlo.
28. apríla 2026
The KYBER2026 conference of the National Security Authority and SK-CERT, held on 27 and 28 April 2026 at Hotel Sitno Vyhne, confirmed what operators of essential services and critical entities had already suspected since the beginning of the year. 2026 is not a year of preparation — it is a year of demonstrable functionality. At the centre stands Regulation (EU) 2024/2847 of the European Parliament and of the Council on cyber resilience, which reaches its first hard milestone on 11 September 2026: mandatory reporting of actively exploited vulnerabilities and significant incidents through ENISA's Single Reporting Platform.
28. apríla 2026
Konferencia KYBER2026 Národného bezpečnostného úradu a SK-CERT, ktorá sa konala 27. a 28. apríla 2026 v hoteli Sitno Vyhne, potvrdila to, čo prevádzkovatelia základných služieb a kritických subjektov tušili už od začiatku roka. Rok 2026 nie je rokom prípravy, ale rokom preukázateľnej funkčnosti. V centre stojí nariadenie Európskeho parlamentu a Rady číslo 2024/2847 o kybernetickej odolnosti, ktoré dosiahne 11. septembra 2026 prvý ostrý míľnik, povinné hlásenie aktívne zneužívaných zraniteľností a závažných incidentov cez Single Reporting Platform agentúry ENISA.