By accepting you will be accessing a service provided by a third-party external to

Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

These numbers, by the way, come from a cybersecurity firm, as neither the federal government nor the Federal Bureau of Investigation track these kinds of attacks.

As of May 10, of this year, there were 22 known attacks on the public sector. Unfortunately, there are likely more that we just don’t know about yet, as reports of these attacks usually crawl in months or even years after the fact.

March Attacks

March saw a few ransomware attacks on municipalities. The sheriff’s office in Fisher County, Texas, was infected and couldn’t connect to a state law enforcement database as a result.

In Albany, New York, the capital city quietly announced that it had been victimized by a Saturday ransomware attack - a tactical choice on the part of the hackers, as there would be nobody there to fight back on the weekend. While the city initially gave an understated account of the attack’s effect, the real problems were much larger than a few belated marriage licenses and birth certificates.

In addition to the clerical delays, the ransomware attack had also impacted the Albany Police Department’s systems. As these systems are effectively entirely digitized, the department was left without their incident reports, crime reports, and even their schedules.

April Attacks

April saw the entirety of Genesee County, Michigan’s tax department shut down by ransomware for most of the month. The infection has since been removed.

May Attacks

May has been exemplified by the complete shutdown of Baltimore, Maryland, due to an attack using a ransomware known as RobinHood. As a result of this attack, government emails can’t be sent, payments to city departments are on hold, and real estate transactions have been paused.

While RobinHood leverages a notoriously powerful algorithm - even the National Security Agency may not be able to break it, according to cybersecurity expert Avi Rubin - it doesn’t help that Baltimore was also using outdated hardware and software.

Baltimore City Mayor Jack Young has already gone on record to state that the city will not be paying the ransom of 13 Bitcoins, or approximately $100,000. Instead, the FBI and Secret Service have been called in, along with assorted cybersecurity experts. Despite these resources, the city isn’t expected to recover for months.

Rubin provided some insight into why not paying the ransom is the right call for Baltimore, pointing out that if nobody paid the demanded ransoms, these kinds of attacks would quickly go out of fashion. However, many companies struck by ransomware will quietly pay up.

Analysis has found that a full 45 percent of affected organizations ultimately pay the ransom to try and get their data back, while 17 percent of state and local governments will fork over the demanded cash.

At BNMC, we have some experience in dealing with these kinds of things, which means we can confidently agree with the actions of Mayor Young and the statements made by Rubin - paid ransoms only encourage future ransomware attacks. What’s worse, what guarantee is there that any data will be restored even after payment is made?

No guarantee at all.

That’s why we’ve dedicated ourselves to assisting business users in protecting themselves against ransomware. Give us a call at 978-482-2020 to find out more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 05 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Network Security Email Hosted Solutions Microsoft Hackers Computer Software Business Efficiency Malware Communication Data Google Small Business Workplace Tips IT Services Mobile Devices IT Support Cloud Computing Hardware Tech Term Internet Managed IT Services Data Recovery Backup Ransomware Innovation Outsourced IT Users Smartphone Android Saving Money Mobile Device Windows Smartphones Upgrade Data Backup Miscellaneous Phishing communications Information Microsoft Office Browser Business Continuity Disaster Recovery VoIP Business Management Windows 10 Server Facebook Office 365 Managed IT Services Social Media Network Cybersecurity Productivity Windows 10 Passwords Data Management Internet of Things Word Gmail Vulnerability Remote Monitoring App Gadgets Artificial Intelligence Encryption Quick Tips Mobile Office Infrastructure Chrome Apps Managed Service Tip of the week Analytics Remote Workers Employer-Employee Relationship Networking BYOD Website VPN IT Support Access Control Money Applications Router Information Technology Save Money Company Culture Settings Virtual Reality Managed Service Provider Maintenance Education Collaboration Firewall Apple Storage Avoiding Downtime Development Government Antivirus YouTube Computers Hacker Data storage HIPAA Risk Management BDR Office Tips Display IT Management Data Security Paperless Office WiFi Virtual Private Network Robot Big Data Unified Threat Management Google Drive Bandwidth Automation Content Filtering Employee-Employer Relationship Managing Stress Remote Computing Two-factor Authentication Managed IT Service OneNote SaaS Document Management Data Breach Customer Relationship Management Scam Printing Wi-Fi Windows 7 Password IT Software as a Service Break Fix Social Network Virtualization Wireless Holiday Solid State Drive Search Training Retail Alert Hard Disk Drive Mobile Security Outlook Spam Computing Laptop Business Technology Server Management Bring Your Own Device Operating System The Internet of Things iOS Social Monitors Touchscreen LiFi Vendor Management Business Intelligence Managed IT Humor Chromebook Hosted Solution Data loss Administration Best Practice Tablet Conferencing Telephone Systems Downtime Mouse Managed Services End of Support Marketing desktop MSP Going Green Augmented Reality Social Networking Migration Consulting Address Hacks Permissions Memes Computing Infrastructure Professional Services LED Threats Laptops Patch Management Bitcoin Network Congestion Star Wars PowerPoint User Error Google Wallet Chatbots eWaste Specifications Nanotechnology Spyware Halloween Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Business Growth Motherboard Cables Computer Care IBM Writing Alerts USB File Sharing Co-Managed IT Heating/Cooling Multi-Factor Security Legal Managed Services Provider Windows 8 Fraud Cost Management Onboarding GDPR Time Management Unified Communications Printer Drones Identity Continuity Black Friday Dark Data Update Screen Reader Charging Identity Theft Scary Stories Slack Hard Disk Drives COVID-19 Smart Office Print Toner Myths Wires Corporate Profile Running Cable Messaging Emergency Mobile Device Management Holidays Licensing Dongle Content Huawei Servers Deep Learning Google Calendar Entertainment Vendor Dark Web Distribution Assessment Automobile Buisness Digital Signage Data Warehouse Network Management Politics Solar G Suite Alt Codes Cyber Monday Customer Service Smart Tech Sports Monitoring Solid State Drives Remote Work Work/Life Balance Work Dell Virtual Desktop Shortcuts Mobile Management Health Private Cloud Voice over Internet Protocol WannaCry Employee-Employer Relationships Payment Card Office Cooperation Samsung Service Level Agreement Cabling Streaming Processor Legislation Hybrid Cloud Microsoft Excel Logistics Hotspot Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Budget Compliance Tech Support Security Cameras Profiles Typing Smart Technology Connectivity Spying National Security Techology IT Technicians Optimization Modem FinTech Analysis Students How To Lenovo Current Events Inventory Social Engineering Staff Leominster Human Error Memory Statistics Cybercrime Scalability Mail Merge Blockchain Asset Management Language Value Virus Downloads Regulations Websites Utility Computing Shortcut Cryptocurrency Distributed Denial of Service IoT Digital Payment Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Cookies Digital Mixed Reality Firefox IT solutions Superfish Shadow IT Safety K-12 Schools Disaster Device Reducing Cost Bluetooth Comparison Google Docs Personal Information Botnet Cleaning Cortana 3D Printing CCTV Webcam Machine Learning Processors Financial Error Unsupported Software Point of Sale Ben McDonald shares Computer Repair Relocation Travel Mobile Data Recovery Regulation Supercomputer CrashOverride How To Staffing Mobile Computing Motion Sickness Taxes Black Market Administrator IT Budget Law Enforcement Web Server what was your? Electronic Medical Records GPS Notifications IT Consultant Twitter Printers Physical Security Emoji Upgrades Gadget Cameras Tracking Crowdsourcing Meetings

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3