Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

These numbers, by the way, come from a cybersecurity firm, as neither the federal government nor the Federal Bureau of Investigation track these kinds of attacks.

As of May 10, of this year, there were 22 known attacks on the public sector. Unfortunately, there are likely more that we just don’t know about yet, as reports of these attacks usually crawl in months or even years after the fact.

March Attacks

March saw a few ransomware attacks on municipalities. The sheriff’s office in Fisher County, Texas, was infected and couldn’t connect to a state law enforcement database as a result.

In Albany, New York, the capital city quietly announced that it had been victimized by a Saturday ransomware attack - a tactical choice on the part of the hackers, as there would be nobody there to fight back on the weekend. While the city initially gave an understated account of the attack’s effect, the real problems were much larger than a few belated marriage licenses and birth certificates.

In addition to the clerical delays, the ransomware attack had also impacted the Albany Police Department’s systems. As these systems are effectively entirely digitized, the department was left without their incident reports, crime reports, and even their schedules.

April Attacks

April saw the entirety of Genesee County, Michigan’s tax department shut down by ransomware for most of the month. The infection has since been removed.

May Attacks

May has been exemplified by the complete shutdown of Baltimore, Maryland, due to an attack using a ransomware known as RobinHood. As a result of this attack, government emails can’t be sent, payments to city departments are on hold, and real estate transactions have been paused.

While RobinHood leverages a notoriously powerful algorithm - even the National Security Agency may not be able to break it, according to cybersecurity expert Avi Rubin - it doesn’t help that Baltimore was also using outdated hardware and software.

Baltimore City Mayor Jack Young has already gone on record to state that the city will not be paying the ransom of 13 Bitcoins, or approximately $100,000. Instead, the FBI and Secret Service have been called in, along with assorted cybersecurity experts. Despite these resources, the city isn’t expected to recover for months.

Rubin provided some insight into why not paying the ransom is the right call for Baltimore, pointing out that if nobody paid the demanded ransoms, these kinds of attacks would quickly go out of fashion. However, many companies struck by ransomware will quietly pay up.

Analysis has found that a full 45 percent of affected organizations ultimately pay the ransom to try and get their data back, while 17 percent of state and local governments will fork over the demanded cash.

At BNMC, we have some experience in dealing with these kinds of things, which means we can confidently agree with the actions of Mayor Young and the statements made by Rubin - paid ransoms only encourage future ransomware attacks. What’s worse, what guarantee is there that any data will be restored even after payment is made?

No guarantee at all.

That’s why we’ve dedicated ourselves to assisting business users in protecting themselves against ransomware. Give us a call at 978-482-2020 to find out more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 19 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Business Computing Privacy User Tips Google Malware Hackers Network Security Productivity Microsoft Business Hosted Solutions Software Computer Tech Term Ransomware Communication Internet Data IT Services Efficiency Mobile Devices Small Business Backup Data Recovery IT Support Hardware Smartphone Cloud Computing Workplace Tips Saving Money Android Innovation Business Continuity Managed IT Services Microsoft Office Users Mobile Device Information Social Media Data Management Windows 10 Managed IT Services Windows Internet of Things Browser Data Backup Cybersecurity Vulnerability App Upgrade Office 365 Business Management Passwords Windows 10 Productivity Outsourced IT Word Gmail Server Facebook Phishing Remote Monitoring Disaster Recovery Encryption communications Smartphones Artificial Intelligence Chrome Network Managed Service Save Money Virtual Reality Website Infrastructure Miscellaneous Analytics Applications VoIP BYOD Tip of the week Gadgets Managed Service Provider Money IT Support Employer-Employee Relationship Robot YouTube Automation Paperless Office VPN Risk Management Access Control Google Drive IT Management Content Filtering Office Tips Bandwidth Apps Unified Threat Management Government Apple Education Big Data Router Maintenance Display Settings Hacker Data storage Company Culture Antivirus Employee-Employer Relationship Spam Chromebook Computing Outlook Managing Stress Bring Your Own Device Operating System Hard Disk Drive Networking WiFi Development LiFi End of Support Hosted Solution Administration Data Security Server Management Mouse HIPAA Business Technology Virtual Private Network Data loss Touchscreen Laptop SaaS Telephone Systems Mobile Security Quick Tips Tablet desktop The Internet of Things Computers Virtualization Holiday Storage Printing Firewall Business Intelligence Downtime Retail Alert Two-factor Authentication Document Management Avoiding Downtime Wireless Solid State Drive Scam Monitors Augmented Reality Vendor Management Mixed Reality Halloween Computing Infrastructure Professional Services Break Fix Device Alt Codes Training Corporate Profile Social Networking Time Management Printer Automobile Star Wars Search Black Friday LED Social Engineering G Suite Chatbots eWaste Migration Nanotechnology Servers Google Calendar PowerPoint Budget Dell Wearable Technology Network upgrade Emergency Laptops Social Websites Data Breach Scary Stories Information Technology Cabling Alerts USB Dark Web Mobility Typing Humor WannaCry Motherboard Network Management Cables Running Cable Current Events Google Maps Fraud Cost Management Cyber Monday Co-Managed IT Safety Best Practice Identity Continuity Screen Reader Charging Legislation Onboarding Buisness Remote Computing Smart Office Software as a Service Slack Hard Disk Drives Sports Network Congestion Licensing Dongle Microsoft Excel Print Toner Virtual Desktop Cryptocurrency Wires SharePoint IT solutions Going Green Assessment Managed IT Smart Technology Content Google Docs Solar Techology Messaging Digital Payment Smart Tech Statistics Digital Signage Writing How To Work Lenovo Entertainment Wi-Fi Hacks Voice over Internet Protocol Downloads Monitoring Solid State Drives Google Wallet Disaster Cooperation Service Level Agreement Mail Merge Blockchain Shortcuts Bitcoin Digital Dark Data Update Collaboration Hotspot Internet Exlporer Shortcut Distributed Denial of Service Streaming Business Growth Compliance VoIP Unified Threat Management Employee-Employer Relationships Connectivity Bluetooth Comparison Troubleshooting Legal IT Technicians Firefox Optimization Superfish iOS Cybercrime Password Modem FinTech Spying National Security Marketing Unified Communications Drones Uninterrupted Power Supply Staff Leominster Address Permissions Security Cameras Windows 8 Politics Spyware Students Customer Service File Sharing Language Value Patch Management Managed IT Service Human Error Computer Care IBM Regulations User Error Analysis IoT Specifications Office Deep Learning Samsung Mirgation Customer Relationship Management Recycling Scalability Mobile Device Management Private Cloud Cookies Heating/Cooling MSP Multi-Factor Security K-12 Schools Managed Services Tech Support Identity Theft Travel Law Enforcement Electronic Medical Records Mobile Computing Notifications CrashOverride Twitter Physical Security Supercomputer Emoji Motion Sickness Upgrades Gadget Staffing Administrator Crowdsourcing Taxes Windows 7 IT Budget Web Server what was your? Personal Information Botnet Cortana 3D Printing GPS BDR IT Consultant Regulation Processors Cameras Machine Learning Meetings Unsupported Software Tracking Cleaning CCTV Computer Repair Relocation Webcam Mobile Data Recovery How To Work/Life Balance Error Printers Health Updates Black Market Point of Sale Ben McDonald shares

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3