Their assumption is that they're being targeted and that this "united front" will give attackers less reason to target them, when the harsh reality is that these CrytoMalware emails/IM Spam are being send to every business/government internationally looking for the softest targets.<p>They should have passed a resolution to implement a 1-2-3 Backup Strategy with mandatory offline & offsite backups and testing protocols. But that would cost money and require competent management/oversight, instead they'd prefer to pass a meaningless fiat that won't do jack.<p>Honestly until there are consequences for government officials/management nothing will change. This is 95% about poor resource management and 5% about CrytoMalware. Nobody should be paying, because they should ALREADY have multiple tiers of backups, that are audited, tested, and reviewed.<p>PS - "It also encrypted our backups" is also pure incompetence. They just didn't want to manage rotated backups or pay the storage fee/costs of high density tape.
Mayors will pay "cyber-security" consulting firm. The firm will pay the hackers.<p><a href="https://www.zdnet.com/article/georgia-county-pays-a-whopping-400000-to-get-rid-of-a-ransomware-infection/" rel="nofollow">https://www.zdnet.com/article/georgia-county-pays-a-whopping...</a>
I am on a local city commission. As part of this, they gave me an email address (made me unhappy, but whatever). They sent me an email to my personal email address telling me how to log in to my city email address, explaining that my password was a trivial algorithm based on my name, followed by a number an exclamation point. This was a form email: every single address in the entire city has the same password format (with the same number, to be explicitly clear). They disabled the feature to let people change their password. So... anyone can log in to the email account of any official in this city and do stuff like delete mail before they see it (as even if they have audit trails turned on for administrators, the official can still delete mail from their own perspective, and would never know if someone helpfully deleted it "for them").
This type of acausal deal only works for single-target attacks. If a bad actor is searching for a victim and sees two potential targets, one of which has resolved to never cede to their demands and one who wasn't commented, they will attack the ambivalent party.<p>Malware is not a single target attack. Whether or not it's probably beneficial to attack one of these cities is not considered. Instead of making gestures, these mayors should be investing in better cybersecurity.
Honestly, I can't add much more than what has already been said here... If your data/biz/org/etc is crippled because of these types of attacks, then you really need to have a frank discussion around IT/resource allocations/goals. These are 100% manageable (worst case).
Fascinating. The page manages to bypass uBlock Origin and pop up an ad window in the right bottom corner to start paying heavy (which my computer and connection can barely handle) video with sound (!) automatically.
this is beyond stupid. municipal IT systems are vulnerable because of poor resource availability and lack of budgets to properly secure them.<p>paying the ransom ware folks should be considered the cost of doing business. it’s cheaper than actually securing the data.<p>anyway it’s expected. the same mayors that underfund IT would be the same ones to make this ridiculous “red line”.<p>good opportunity here for a cookie cutter IT consultancy to come in to all of these cities and offer cookie cutter service.
I’m curious where the cities that have paid ransomware attackers acquired bitcoin. Did they literally just open a Coinbase account and send funds through there?