Another ransomware attack, another city government. This time Springs Hill City, Tennessee, was struck by ransomware early November 2017. This is not the first incident of this type: Licking County City government was also attacked earlier this year. From the two attacks, we can observe a few common things that are important for understanding why cyber extortionists will continue to target city governments. During such attacks, the city servers are partially or completely down. Here are the top consequences:
All the above make city government institutions appealable as targets for ransomware attacks because of the importance of the services they provide. Having such sensitive services disrupted or disabled puts a lot of pressure on city officials and increase the chances that they pay a ransom to restore their systems. The Licking County and Spring Hill attacks come after other similar attacks in Ohio in 2016, and will likely be followed by more attacks in 2018.
The latest attack has been disrupting the activity of Spring Hill City institution for over ten days and the systems are not yet fully restored. It started as one employee opened a malicious attachment. The main systems were disabled with critical files held captive by strong encryption. In this case the cyber-extortionists demanded a rather large ransom, amounting $250,000 and the city officials refused to pay for it.
The restoration of the systems started with the most important servers, delivering functionality for the 911 dispatch systems and continues with the rest of the assets. More reports and updates can be found on the WKRN website.
Conclusion
As we are likely to see more and more ransomware attacks targeted at core public service institutions like hospitals and city governments, it is imperative to raise awareness about why such institutions are desirable targets, especially for employees. More awareness supported by cybersecurity education can significantly protect against the ransomware threats. The use of anti-ransomware technology is also a key component of any security strategy designed to mitigate the ransomware risk.
For more information, follow us on social media and subscribe to our newsletter.
This post was last modified on August 21, 2023 7:26 am
In the digital world, information is often stored and transferred through files. From the most…
Introduction Data security is more important than ever in today's fast-paced digital world. One critical…
Introduction: Cyber threats are a growing concern for businesses and individuals alike. With the increasing…
Microsoft Internet Information Services (IIS) is a popular web server that is widely used to…
File tracking is an important aspect of server administration, and it can help administrators detect…
File monitoring solutions are essential tools for administrators to manage and protect their organizations' data…