Thirteen spirits stand between Baltimore city and many of the services and processes that its citizens rely on have seized thousands of government computers at the beginning of the month. The event takes place for two weeks, and there is no clear end to it.
This is happening: On May 7th, academics digitized approximately 10,000 Baltimore government computers and claimed about $ 100,000 even in tire spirits to release them. This is a “ransomware” attack, whereby hackers use malicious software to prevent or take access to a computer system until the owner of that system pays off ransom.
Baltimore, like some other cities are hit by such attacks over the past two years, is refusing to pay up. As a result, for two weeks, city employees were locked out of their email accounts and citizens were unable to access essential services, including websites where they pay their water bills, property taxes, and parking tickets. This is the second ransomware attack by Baltimore in about 15 months: Last year, a specific 911 system attack closed the city for about a day. Baltimore has scrutinized his handling of both.
The ransomware attacks in Baltimore and other local governments across the United States, as ransomware attacks, and as common goals such as hospitals and schools spread the security of their online systems, show that many goals are still at risk from the kills. this. It also gives insight into the appearance of ransomware victims: pay up and get your access back, or reject – it may be much more expensive in the long run.
It explains briefly what is going on in Baltimore
Hackers focused on Baltimore city on May 7th using ransomware called RobbinHood, which, as NPR explains, makes it impossible to access a server without a digital key that only has the hackers.
The redemption note of Séad's hackers, who received the Baltimore Sun, claimed that three spirits per system should be paid for unlocking, which equates to 13 spirits to unlock all seizures. The note prevented the ransom being increased if it was not paid in four days, and said the information would be lost forever if it was not paid in 10 days. Both deadlines have now passed.
“We won't speak anymore, it's all the information we have! Hurry up! Tik Tak, Tik Tak, Tik Tak! ”The note said.
The city government is refusing to pay, which means the government is still offline due to email systems and government payment platforms. The Baltimore property market was also damaged by the attack, as officials were unable to access systems needed to carry out real estate sales. (The city said transactions were taking place again on Monday.) T
Mayor of Baltimore, Jack Young, who was officially in office less than a month, said in a statement on Friday that city officials are “good in the restorative process” and that “chief industrial cyber security consultants are working 24-7 on the presence of us. “The FBI is also involved in the investigation.
“Some of the reform efforts also require us to rebuild certain systems to ensure that we do so in a safe way, when we restore business functions,” said Young. He did not offer a timeline when all the systems come back online.
Baltimore City Council president intends to set up a special committee to investigate this latest attack and try to make sure it doesn't happen again.
Similar attack using RobbinHood hit government computers in Greenville, North Carolina, in April. A spokesman for Greenville told the Wall Street Journal that the city had never finished paying, and although its systems have not been fully restored, “all our major technology needs are now being met.” T
More than 20 municipalities in the United States are hit by cyberattacks in one year. And such attacks can be expensive, especially if they say goals they will not pay. In 2018, hackers claimed that Atlanta paid around $ 50,000 in ordinary parts as part of a ransomware attack. The city refused, and according to a report received by the Atlanta Journal-Constitution and Channel 2 Action News, the attack ended the city's $ 17 million settlement.
No new Ransomware attacks – but we're still finding out how to deal with them
In 2017, ransomware called WannaCry focused on thousands of PCs using Microsoft Windows operating systems in more than 100 countries. Ultimately, officials in the United States and the United Kingdom blamed North Korea for the attack. Also in 2017, there were ransomware attacks by corporations in the UK, France, Russia, Israel and Ukraine. US hospitals were also targeted.
This is how Timothy Lee explained to pops what was going on and how ransomware was more fruitful:
The basic idea behind ransomware is simple: A criminal hacks in your computer, your files scrambles with unbreakable encryption, and then requires that you pay for the encryption key necessary to unscramble the files. If you have important files on your computer, you may be willing to pay enough to avoid them.
Ransomware schemes have become much more efficient since bitcoin was appointed in 2009. Payment routine networks such as Visa and Mastercard make it difficult to accept payments without disclosing equality. Bitcoin makes that much easier. So the ransomware schemes have risen over the past four years and meet indifferent computer users.
Some ransomware schemes are so sophisticated that worth investing in customer service, helping victims who want to pay their ransom for the complexities of obtaining bitcoins and making bitcoin payments.
Since then, some sectors and organizations have made improvements to their security practices to protect against ransomware. But the latest Baltimore attack shows what the following game: whack one area improves its practice and only hackers are looking for someone else.
Recode and Vox have come together to change how our digital world is changing – and changing for us. Subscribe to Recreate podcasts Kara Swisher and Peter Kafka will be in charge of the tough discussions needed by the technology industry today.