Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

These numbers, by the way, come from a cybersecurity firm, as neither the federal government nor the Federal Bureau of Investigation track these kinds of attacks.

As of May 10, of this year, there were 22 known attacks on the public sector. Unfortunately, there are likely more that we just don’t know about yet, as reports of these attacks usually crawl in months or even years after the fact.

March Attacks

March saw a few ransomware attacks on municipalities. The sheriff’s office in Fisher County, Texas, was infected and couldn’t connect to a state law enforcement database as a result.

In Albany, New York, the capital city quietly announced that it had been victimized by a Saturday ransomware attack - a tactical choice on the part of the hackers, as there would be nobody there to fight back on the weekend. While the city initially gave an understated account of the attack’s effect, the real problems were much larger than a few belated marriage licenses and birth certificates.

In addition to the clerical delays, the ransomware attack had also impacted the Albany Police Department’s systems. As these systems are effectively entirely digitized, the department was left without their incident reports, crime reports, and even their schedules.

April Attacks

April saw the entirety of Genesee County, Michigan’s tax department shut down by ransomware for most of the month. The infection has since been removed.

May Attacks

May has been exemplified by the complete shutdown of Baltimore, Maryland, due to an attack using a ransomware known as RobinHood. As a result of this attack, government emails can’t be sent, payments to city departments are on hold, and real estate transactions have been paused.

While RobinHood leverages a notoriously powerful algorithm - even the National Security Agency may not be able to break it, according to cybersecurity expert Avi Rubin - it doesn’t help that Baltimore was also using outdated hardware and software.

Baltimore City Mayor Jack Young has already gone on record to state that the city will not be paying the ransom of 13 Bitcoins, or approximately $100,000. Instead, the FBI and Secret Service have been called in, along with assorted cybersecurity experts. Despite these resources, the city isn’t expected to recover for months.

Rubin provided some insight into why not paying the ransom is the right call for Baltimore, pointing out that if nobody paid the demanded ransoms, these kinds of attacks would quickly go out of fashion. However, many companies struck by ransomware will quietly pay up.

Analysis has found that a full 45 percent of affected organizations ultimately pay the ransom to try and get their data back, while 17 percent of state and local governments will fork over the demanded cash.

At BNMC, we have some experience in dealing with these kinds of things, which means we can confidently agree with the actions of Mayor Young and the statements made by Rubin - paid ransoms only encourage future ransomware attacks. What’s worse, what guarantee is there that any data will be restored even after payment is made?

No guarantee at all.

That’s why we’ve dedicated ourselves to assisting business users in protecting themselves against ransomware. Give us a call at 978-482-2020 to find out more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy Computer User Tips Microsoft Network Security Software Malware Google Hackers Productivity Business Hosted Solutions Tech Term Communication Hardware Internet Data Small Business Mobile Devices Ransomware IT Services Efficiency Smartphone IT Support Cloud Computing Data Recovery Workplace Tips Backup Innovation Android Saving Money Office 365 Managed IT Services Windows Microsoft Office Information Users Upgrade Business Continuity Mobile Device Windows 10 Business Management Windows 10 Managed IT Services Browser Internet of Things Data Backup Data Management Miscellaneous Social Media communications Gmail Passwords Productivity Facebook Server Phishing Outsourced IT Word Vulnerability App Cybersecurity Disaster Recovery Artificial Intelligence Encryption VoIP Smartphones Network Chrome Remote Monitoring Analytics Applications BYOD Infrastructure Money IT Support Managed Service Provider Gadgets Managed Service Tip of the week Save Money Employer-Employee Relationship Website Virtual Reality Apple Access Control Office Tips Education VPN IT Management Paperless Office Storage Government Router Quick Tips Big Data Unified Threat Management Hacker Data storage Company Culture Employee-Employer Relationship Settings Display Maintenance Antivirus Robot Development YouTube Google Drive Content Filtering Bandwidth Automation Apps Risk Management Mobile Security Hard Disk Drive Data Security Business Technology Server Management Laptop SaaS Printing Touchscreen The Internet of Things Business Intelligence Virtual Private Network Holiday Computers Virtualization Tablet Data loss Alert Telephone Systems Downtime Retail desktop Computing Augmented Reality Outlook Spam Collaboration Firewall Bring Your Own Device Operating System Two-factor Authentication Managing Stress WiFi LiFi OneNote Avoiding Downtime Vendor Management Monitors Hosted Solution Scam Chromebook Document Management Administration Wireless Mouse Solid State Drive Networking HIPAA End of Support Assessment Automobile Digital Signage Data Warehouse Network Management Solar G Suite Hacks Entertainment Dark Web Buisness Remote Computing Monitoring Google Wallet Solid State Drives Virtual Desktop Work Dell Bitcoin Shortcuts Cyber Monday Sports Network Congestion Smart Tech Cooperation Service Level Agreement Cabling Business Growth Streaming Processor Legislation Voice over Internet Protocol WannaCry Employee-Employer Relationships Hotspot Internet Exlporer Google Maps Troubleshooting Legal Business Analysis SharePoint Wi-Fi Compliance Password iOS Microsoft Excel Writing Unified Communications Spying Drones National Security Techology IT Technicians Optimization Windows 8 Security Cameras Managed IT Smart Technology Connectivity How To Lenovo Staff Leominster Human Error Memory Statistics Dark Data Update Modem FinTech Analysis Students Language Value Deep Learning Virus Downloads Cybercrime Regulations Mobile Device Management Scalability Mail Merge Blockchain Digital Payment Updates VoIP Unified Threat Management Politics Mirgation Recycling Managed Services Shortcut Distributed Denial of Service Marketing IoT Mixed Reality Firefox Superfish K-12 Schools Disaster Alt Codes Device Bluetooth Comparison Customer Service Cookies MSP Digital Office Samsung Computing Infrastructure Professional Services LED Threats Private Cloud Social Networking Migration Address Permissions PowerPoint Budget User Error Tech Support Chatbots eWaste Social Laptops Patch Management Managed IT Service Star Wars Information Technology Data Breach Customer Relationship Management Wearable Technology Network upgrade Uninterrupted Power Supply Typing Mobility Humor Specifications Halloween Nanotechnology Spyware Social Engineering Alerts USB File Sharing Best Practice Co-Managed IT Heating/Cooling Multi-Factor Security Motherboard Cables Computer Care IBM Current Events Windows 7 Cost Management Onboarding GDPR Time Management Printer Websites Identity Continuity Software as a Service Break Fix Fraud Slack Hard Disk Drives Smart Office Cryptocurrency Print Toner Search Black Friday Scary Stories Screen Reader Charging Identity Theft Safety Licensing Dongle Content Google Docs Huawei Servers Google Calendar Running Cable Wires Training Corporate Profile IT solutions Going Green Messaging Emergency Personal Information Botnet 3D Printing Cortana Regulation Supercomputer CrashOverride Motion Sickness Staffing Administrator Machine Learning Taxes Processors Unsupported Software Web Server what was your? IT Budget GPS Printers Computer Repair Relocation IT Consultant Mobile Data Cameras How To Work/Life Balance Meetings Recovery Tracking Health Cleaning Mobile Computing CCTV Black Market Law Enforcement Webcam Notifications Financial Electronic Medical Records Error Physical Security Twitter Upgrades Gadget Point of Sale Ben McDonald shares Emoji Crowdsourcing Travel BDR

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3