ransomware attacks
April 5, 2018

Vulnerabilities in local government cyber security invite ransomware attacks

If the ransomware threat wasn’t already keeping you up at night, surely the attack on Atlanta has left you questioning the strength of your cyber defenses and disaster recovery. Now, it should be abundantly clear to all who work in local government that you are under attack.

And, it’s up to you to ensure critical government services remain operational.

As reports continue to surface about downed 911 dispatch systems, and IT admins ponder the devastating impact of encrypted criminal case files and investigative databases, the threat becomes abundantly clear.

Ransomware attacks on city and county government threaten public safety.

The rise of SamSam attacks on city and county government

SamSam ransomware attacks pose a clear and present danger to local government.

How so?

It’s important to first understand that these aren’t meddlesome millennials wreaking havoc from the safety of their parents’ basements.

Rather, an organized crime syndicate directs SamSam attacks; a group of cyber-extortionists who:

  • Invest the time and resources necessary to identify targets most likely to pay-up
  • Access and study target infrastructure
  • Deploy SamSam in a manner that will exact maximum damage

What’s more, they’re not demanding millions of dollars.

SamSam attackers understand what it will cost for Cities and Counties to recover from a ransomware attack. They then set their ransom demands far lower, making the cost-benefit analysis tilt in their favor.

Consider the potential hard and soft costs the City of Atlanta will incur as a result of the SamSam attack—from employee productivity losses and liability exposure to weakening public trust and system recovery. In comparison, it’s easy to see how some in government would willingly fork over the $51,000 ransom demanded by the attackers.

Of course, these targeted attacks on local government are happening for a reason.

Cybercriminals know local governments are vulnerable, and they’re exploiting those vulnerabilities.

As an IT professional in city or county government, you know:

  • You rarely have the budgets necessary to fully secure your systems, applications, and data, as we might otherwise expect from business
  • Your IT team is often stretched thin, increasing the risk of unknown vulnerabilities
  • Your government leadership is more likely to pay the ransom to mitigate disruption to resident services—especially those that impact public safety

Recent ransomware attacks on local government underscore the threat

The City of Atlanta is believed to be the victim of a SamSam attack. What can we learn from the fallout?

First, it’s important to be cognizant of the fact that SamSam ransomware traditionally accesses government infrastructure through a Remote Desktop Protocol, and via a remote access attack.

Second, a January 2018 cybersecurity audit identified a “significant level of preventable risk exposure to the city.” We know they were vulnerable. And, while Atlanta had begun addressing those security vulnerabilities, the city was unable to resolve those deficiencies in time.

What did that ultimately mean for the City?

The Atlanta SamSam attack:

  • Knocked out five of 13 City departments
  • Shutdown portions of the City website, preventing residents from paying fines, speeding tickets, water bills, and more
  • Denied Atlanta police access to some of their investigative databases
  • Forced City employees to conduct business operations on paper
  • Destroyed 16 years-worth of some employees’ data
  • Prompted the City of Atlanta to shut down its airport WiFi as a preventive measure

This was a hugely disruptive event and, nearly two weeks following the initial ransomware attack, Atlanta is still down.

This is a clear indicator that Atlanta didn’t have a good disaster recovery plan in place.

Of course, the City of Atlanta isn’t alone.

Hackers have increased their onslaught of ransomware and DDoS attacks on local governments, and crippled critical services:

Local governments face unique challenges in addressing ransomware

Like all IT professionals, you may encounter resistance to necessary data security and backup and recovery upgrades. However, some challenges that are unique to local government make your task of resolving data protection vulnerabilities more complex.

For starters, you often operate with more limited budgets and far fewer IT staff than similarly sized businesses. What’s more, strict budget cycles make it difficult—if not impossible—to respond to data security threats with greater agility.

Additionally, in government, it often takes a great deal of inertia to “alter the direction of the boat.” While you might recognize the threats to your data and work actively to minimize your exposure, you may not have the support from government leadership necessary to protect against ransomware.

That said, widely-publicized ransomware stories, like the crippling impact of WannaCry on the NHS and the SamSam attack on the City of Atlanta, are starting to open eyes.

What steps should you take to prevent and remediate ransomware attacks?

First, it’s important to understand that you simply can’t prevent all ransomware attacks. Despite advances in data security, including the adoption of machine-learning technologies, you’ll never be able to fully prevent a targeted ransomware attack.

And, it’s this focus on ransomware prevention that’s leaving many local governments vulnerable. They’re simply not investing the time and resources necessary to mitigate the impacts of ransomware after an attack occurs.

That’s why it’s so critical that you effectively manage your risk.

We urge you to immediately adopt the following best practices:

  • Ensure your Remote Desktop Protocol isn’t exposed on the Internet, and leverage a VPN before you access remote machines
  • Segment your network so that, if you are infected, you can contain the spread of the ransomware infection
  • Recognize that your end users are your last line of defense; invest in phishing training and testing to ensure they’re more vigilant
  • Invest in a redundant backup and recovery solution—ideally maintaining copies onsite, offsite, and offline
  • Test and validate your disaster recovery to ensure you can satisfy SLAs
  • Implement a ransomware crisis plan to enable you to act swiftly in the event of an attack

Keep fighting the good fight

Today, the scope and scale of ransomware attacks is growing exponentially. And, as governments respond to the threat, cyber attackers evolve their ransomware in an attempt to evade increasingly educated end users and more sophisticated data security solutions.

In short, it’s an arms race.

Of course, you know that already. Ransomware is a big challenge—if not your biggest challenge. And, for what it’s worth, we recognize the extra hours you’re investing to stay ahead of cyber threats and keep critical data safe.

For that, we thank you.

And, we’re with you.

Recent posts
April 26, 2018
The 9 best ransomware tools and resources money can’t buy…because they’re free Read
Ransomware attackers are the schoolyard bullies of cyberspace, and they’re unrelenting in their hunt for your “milk money.” Get caught unprepared, and you’ll be forced to choose between rewarding the cyber extortionist with bitcoins—or weathering the financial burden that naturally results from data loss and downtime. Well, we think that stinks. To that end, we’ve...

Ransomware attackers are the schoolyard bullies of cyberspace, and they’re unrelenting in their hunt for your “milk money.” Get caught unprepared, and you’ll be forced to choose between rewarding the cyber extortionist with bitcoins—or weathering the financial burden that naturally results from data loss and downtime. Well, we think that stinks. To that end, we’ve…

April 24, 2018
Are ransomware payments ever a good idea? The answer: It depends Read
Cybercriminals are fueling near continuous news coverage of governments, universities, healthcare systems, and businesses brought to a screeching halt by ransomware. Caught unprepared, these organizations are then forced into an uncomfortable cost-benefit analysis: Cough up the ransomware payment or endure the damaging impacts of downtime and data loss. It’s not always an easy choice. But...

Cybercriminals are fueling near continuous news coverage of governments, universities, healthcare systems, and businesses brought to a screeching halt by ransomware. Caught unprepared, these organizations are then forced into an uncomfortable cost-benefit analysis: Cough up the ransomware payment or endure the damaging impacts of downtime and data loss. It’s not always an easy choice. But…

April 19, 2018
The 2018 ransomware trends that will keep you up at night Read
The art of the scam is nothing new. While ransomware attacks now fuel a continuous stream of breaking news, we only have to think back to the many distraught Nigerian princes—all who suffered the loss of their uncles and were desperate to find safe places to stash their unexpected inheritances—to remember how long these “spray...

The art of the scam is nothing new. While ransomware attacks now fuel a continuous stream of breaking news, we only have to think back to the many distraught Nigerian princes—all who suffered the loss of their uncles and were desperate to find safe places to stash their unexpected inheritances—to remember how long these “spray…

March 23, 2018
The City of Atlanta falls victim to a ransomware attack Read
Once again, cyber attackers are proving no one is safe from a ransomware attack. This time, it’s the City of Atlanta that has fallen victim. So, what do we know? Experts suggest Atlanta may have been infected by a variant of SamSam ransomware; the same family deployed against governments and hospitals since 2015. In this...

Once again, cyber attackers are proving no one is safe from a ransomware attack. This time, it’s the City of Atlanta that has fallen victim. So, what do we know? Experts suggest Atlanta may have been infected by a variant of SamSam ransomware; the same family deployed against governments and hospitals since 2015. In this…

Site sponsor:
Render ransomware attackers powerless.
Restore encrypted data quickly with Arcserve backup and recovery.
Get your free trial now