Too Much Ransomware to Treat Cases Individually

Various government agencies, radio stations, etc. have been hit. A new version of ransomware is making it’s way around firms in China. Too much really. Let’s concentrate on the .gov problems, because it can hit any of you, and you will – through your taxes – pay the bill. And we know that politicians don’t want to spend money on stuff they don’t understand, or won’t help them get reelected. Is it any wonder that they haven’t spent money on IT security? Worst first…

Transparency? Truth in government? The Little People might get the idea that the State isn’t All Powerful. I-TEAM reveals untold story behind computer hacking at Hopkins Airport.

The FOX 8 I-TEAM has uncovered information that the City of Cleveland withheld from the public about the computer hacking at Hopkins Airport that left flight message boards down and affected other computers too.

A search for backups that aren’t infected took place. Disk storage has gotten so cheap that people think they can use the spinning magnetic stuff for all the backups. But it you leave it connected to your network that is an online backup, and it won’t protect you from a fire (unless it is at a remote location) and it really won’t protect you from ransomware.

Baltimore, if you remember, was hit with Ransomware in early May. Baltimore won’t send water bills until at least early August.

The billing system was disrupted in May by a ransomware attack that also shut down city workers’ emails and online payment systems.

Now while ransomware is getting much more sophisticated, the stuff that hit Baltimore depended on unpatched versions of Windows. And they were hit 2 years after Microsoft, the government, and everyone with any appreciation of IT security told them to patch their damn systems. (Despite all of that, the attack was “unexpected” and they want you to pay for the clean-up.)

Syracuse was hit with the Ryuck ransomware last week. (One of the new, more sophisticated attacks.) Syracuse school district, Onondaga County libraries, recovering from cyberattack.

The school district attack rendered computer files and systems inoperable, freezing the district out of access. They’re still working to restore some systems. Meanwhile, the county libraries’ online and phone services were also knocked out. Library programs and checking out books are continuing the old-fashioned way.

At least they didn’t pay the ransom.

And a reminder out of Kentucky to be sure that you get help from people who really understand the problem. Library still plagued by ransomware.

They thought they were good. They ran a “scrubbing program” (antivirus?), but it didn’t remove Cryptolocker from the entire network. And not it’s back. So this time they are consulting someone who knows what to do.

‡ You think your servers are immune to structure fire? What about wild fire? Floods? Tornadoes? Terrorist – or disgruntled employee – attack? What would you do if tanker truck full of toxic waste turned over in front of your building and you were forced to evacuate? What if that happened while everyone was at lunch, and you couldn’t even grab the laptop off your desk? Do you have everything you need at a remote location? Do you have a remote location?