Our Blog: Stuff we think you should know

Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

These numbers, by the way, come from a cybersecurity firm, as neither the federal government nor the Federal Bureau of Investigation track these kinds of attacks.

As of May 10, of this year, there were 22 known attacks on the public sector. Unfortunately, there are likely more that we just don’t know about yet, as reports of these attacks usually crawl in months or even years after the fact.

March Attacks

March saw a few ransomware attacks on municipalities. The sheriff’s office in Fisher County, Texas, was infected and couldn’t connect to a state law enforcement database as a result.

In Albany, New York, the capital city quietly announced that it had been victimized by a Saturday ransomware attack - a tactical choice on the part of the hackers, as there would be nobody there to fight back on the weekend. While the city initially gave an understated account of the attack’s effect, the real problems were much larger than a few belated marriage licenses and birth certificates.

In addition to the clerical delays, the ransomware attack had also impacted the Albany Police Department’s systems. As these systems are effectively entirely digitized, the department was left without their incident reports, crime reports, and even their schedules.

April Attacks

April saw the entirety of Genesee County, Michigan’s tax department shut down by ransomware for most of the month. The infection has since been removed.

May Attacks

May has been exemplified by the complete shutdown of Baltimore, Maryland, due to an attack using a ransomware known as RobinHood. As a result of this attack, government emails can’t be sent, payments to city departments are on hold, and real estate transactions have been paused.

While RobinHood leverages a notoriously powerful algorithm - even the National Security Agency may not be able to break it, according to cybersecurity expert Avi Rubin - it doesn’t help that Baltimore was also using outdated hardware and software.

Baltimore City Mayor Jack Young has already gone on record to state that the city will not be paying the ransom of 13 Bitcoins, or approximately $100,000. Instead, the FBI and Secret Service have been called in, along with assorted cybersecurity experts. Despite these resources, the city isn’t expected to recover for months.

Rubin provided some insight into why not paying the ransom is the right call for Baltimore, pointing out that if nobody paid the demanded ransoms, these kinds of attacks would quickly go out of fashion. However, many companies struck by ransomware will quietly pay up.

Analysis has found that a full 45 percent of affected organizations ultimately pay the ransom to try and get their data back, while 17 percent of state and local governments will fork over the demanded cash.

At Haber Group, we have some experience in dealing with these kinds of things, which means we can confidently agree with the actions of Mayor Young and the statements made by Rubin - paid ransoms only encourage future ransomware attacks. What’s worse, what guarantee is there that any data will be restored even after payment is made?

No guarantee at all.

That’s why we’ve dedicated ourselves to assisting business users in protecting themselves against ransomware. Give us a call at 866.625.3560 to find out more.

Google Docs Working on Office Support
Tip of the Week: Overcoming the Hurdles of New Sol...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business User Tips Malware Business Computing Network Security Microsoft Computer Google Software Hosted Solutions Productivity Internet Tech Term Data Small Business Ransomware Mobile Devices Efficiency Communication IT Services Backup Workplace Tips Hardware Windows 10 Smartphone Data Recovery Android IT Support Microsoft Office Cloud Computing Saving Money Productivity Social Media Browser Business Continuity Gmail Data Management Managed IT Services Facebook Windows Upgrade Word Information Office 365 Internet of Things Managed IT Services Innovation Mobile Device Server Users Data Backup Phishing Passwords Disaster Recovery Smartphones Outsourced IT Windows 10 App Vulnerability Cybersecurity Employer-Employee Relationship Business Management Artificial Intelligence Miscellaneous communications Remote Monitoring Managed Service Provider VoIP Encryption Network Chrome Analytics Apps Content Filtering IT Support Big Data Applications Government Money Infrastructure BYOD Gadgets Spam Office Tips Virtual Reality Website Save Money Tip of the week Hacker Managed Service Apple Two-factor Authentication Data storage Access Control Antivirus Display Router Bandwidth Unified Threat Management VPN YouTube Development Firewall Education Robot Risk Management WiFi Wireless Printing Automation Avoiding Downtime The Internet of Things IT Management Virtualization Customer Service Maintenance Augmented Reality Employee-Employer Relationship Tablet Settings Paperless Office SaaS Storage Solid State Drive Downtime HIPAA Retail Networking Hosted Solution Hacking Hard Disk Drive Holiday Outlook Data Security Monitors Data loss Business Technology Search IBM Chromebook Virtual Private Network Mobile Security Presentation Operating System Server Management Mobile Device Management Administration Touchscreen Customer Relationship Management Office End of Support Document Management Bring Your Own Device Wi-Fi Wireless Technology Computing Google Drive Telephone Systems Laptop Business Intelligence Password Recovery Mouse Vendor Management Quick Tips LiFi Safety Company Culture Scam Computers Business Growth Legislation Identity MSP Scalability Google Wallet Permissions VoIP Assessment Scary Stories Managing Stress Managed Services Current Events FCC How To Smart Tech PowerPoint Updates IT service Alerts Heating/Cooling Service Level Agreement IP Address Cybercrime eWaste Refrigeration Device Remote Computing Distributed Denial of Service WannaCry User Mixed Reality Legal LED Update Alt Codes Dark Data Comparison Public Speaking Migration Drones Fraud Time Management Internet Exlporer SharePoint Cabling Sports Cables Competition Laptops Going Green Social Engineering Title II Firefox Connectivity Knowledge Onboarding BDR Licensing Servers Mobile Office Continuity Mobility Social Managed IT Service Modem Slack Data Breach Digital Payment Smart Office Co-Managed IT Typing Specifications Compliance Charging Politics Network Management Value Unified Communications Digital Signage Collaboration Deep Learning Humor Downloads IT Technicians Managed IT Wires Software as a Service Online IoT Techology Experience Google Maps Cooperation Running Cable Solar Undo Print Toner Hacks Break Fix Digital Cookies Lenovo Monitoring Hard Disk Drives Private Cloud Professional Services Marketing Work Content Cryptocurrency Black Friday Regulations Mail Merge Virtual Desktop Messaging Tech Support Budget Hotspot Application Desktop File Sharing sip Multi-Factor Security Disaster Mirgation Shortcut Buisness Voice over Internet Protocol Entertainment Computer Care How To Microsoft Excel Star Wars Unified Threat Management Staff Statistics Lithium-ion battery Shortcuts Samsung Dark Web Spyware Nanotechnology Superfish IT solutions Spying Solid State Drives Language USB Optimization Streaming Bitcoin Network Congestion Cyber Monday Social Networking Address Analysis Employee-Employer Relationships Websites Identity Theft Troubleshooting Best Practice telephony Google Calendar Uninterrupted Power Supply Chatbots Patch Management 5G FinTech iOS Training Information Technology Blockchain Cost Management User Error Automobile Google Docs Printer Wearable Technology Bluetooth Halloween Security Cameras G Suite Writing Net Neutrality Screen Reader Cortana National Security Computing Infrastructure Dongle Recycling Hard Drives Human Error Windows 8 Smart Technology Corporate Profile Motherboard Fun Students Printers Motion Sickness Domains Gadget Staffing Upgrades Personal Information Administrator Crowdsourcing Taxes Web Server Emergency Machine Learning IT Budget GPS 3D Printing Computer Repair IT Consultant Processors Cameras Relocation Meetings Windows 7 Tracking Unsupported Software Health Cleaning Alert CCTV Emoji Webcam Regulation Mobile Data Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Travel Law Enforcement Notifications Mobile Computing CrashOverride Twitter Botnet Supercomputer Physical Security