City of Las Vegas Said It Successfully Avoided Devastating Cyberattack (zdnet.com) 20
An anonymous reader quotes a report from ZDNet: Officials from the city of Las Vegas said they narrowly avoided a major security incident that took place on Tuesday, January 7. According to a statement published by the city on Wednesday, the compromise took place on Tuesday, at 4:30 am, in the morning. The city said IT staff immediately detected the intrusion and took steps to protect impacted systems. The city responded by taking several services offline, including its public website, which is still down at the time of writing.
City officials have not disclosed any details about the nature of the incident, but local press reported that it might have involved an email delivery vector. In a subsequent statement published on Twitter on Wednesday, the city confirmed it "resumed full operations with all data systems functioning as normal." "Thanks to our software security systems and fast action by our IT staff, we were fortunate to avoid what had the potential to be a devastating situation," it said. "We do not believe any data was lost from our systems and no personal data was taken. We are unclear as to who was responsible for the compromise, but we will continue to look for potential indications," the city also added.
City officials have not disclosed any details about the nature of the incident, but local press reported that it might have involved an email delivery vector. In a subsequent statement published on Twitter on Wednesday, the city confirmed it "resumed full operations with all data systems functioning as normal." "Thanks to our software security systems and fast action by our IT staff, we were fortunate to avoid what had the potential to be a devastating situation," it said. "We do not believe any data was lost from our systems and no personal data was taken. We are unclear as to who was responsible for the compromise, but we will continue to look for potential indications," the city also added.
What happens in Vegas... (Score:3)
I guess the house does always win! O_O
Resume Building (Score:3, Funny)
I narrowly avoided clicking on the linked article. It was a close call, but I did it. Prove me wrong.
they have failed : (Score:5, Informative)
lasvegasnevada.gov has :
NO DNSSEC
DMARC policy is not strict
DNS does not provide a TLSA record for DANE.
mail servers supports one or more TLS versions that should be phased out e.g. protection.outlook.com and us-smtp-inbound-2.mimecast.com are insecure
mimecast supported mail servers allows for client-initiated renegotiation of the TLS stream, which is not secure.
Re: (Score:2)
Re: (Score:2)
Nope. It's always beets.
https://www.youtube.com/watch?... [youtube.com]
Re: (Score:1)
yes it would have protected them (Score:2)
its a spear fishing via email...
if they had DNSSEC with DANE and Decent DMARC policy then the attackers would not have been able to spoof the email... its that simple
the still dont so basically it sounds like they turned it off, did a restore and turned it on again and hoped... not a good response
hack the ticket out / atm's (Score:2)
hack the ticket out / atm's one they start spitting out cash there can be mad dash for the cash.
No information so... (Score:2)
Since there is no information in the articles, we really do not know what happened. I propose the following:
Someone in the LV city offices plugged in their personal laptop to the network. The next day, at around 4:30, when their single IT guy came in he saw an "unauthorized device" warning popup on his laptop. He called his boss, who told them to unplug some network cables and shutdown some servers. After realizing that it was some moron in Carolyn Goodman's office, they tried to get everything up and r
Re: (Score:2)
Me too (Score:3)
Re: Me too (Score:1)
Responsibility (Score:1)
We are unclear as to who was responsible for the compromise...
It was the person or people who decided to put Windows on their network. Everything that happened after that was predictable.
Re: (Score:2)
Yeah, they really should never have installed the most common operating system on the planet, which supports all the programs that the end users need with a consistent interface. And an LDAP authentication system that actually works? What the hell were they thinking? And don't get me started on Group Policies and roaming desktops, no one wants that stuff. It's not like people actually need to get work done or anything.
Damn commies! (Score:1)
Las Vegas narrowly avoided security intrusion? (Score:2)
Re: (Score:2)
That is the most likely scenario.
430am? (Score:1)
So...someone was wanking at work?
yea... a hacker did it.. (Score:1)