City of Knoxville Shuts Down Network After Ransomware Attack (bleepingcomputer.com) 23
An anonymous reader quotes a report from Bleeping Computer: The City of Knoxville, Tennessee, was forced to shut down its entire computer network following a ransomware attack that took place overnight and targeted the city's offices. Knoxville has a population of over 180,000, it's Tennessee's third-largest city after Nashville and Memphis, and it's also part of the Knoxville Metropolitan Statistical Area, with a reported population of almost 870,000 in 2015. Computers on Knoxville's network were encrypted overnight, with the attack being noticed by employees of the city's fire department around 4:30 AM, June 11, according to Chief Operations Officer David Brace.
While the City of Knoxville official website was still down at the time this article was published, Knox County government computer operations have not been affected in the attack. [...] "No credit card information is stored by the City, so individuals who have made any online reservations of City facilities are not believed to be at risk," Knoxville spokesman Eric Vreeland told WBIR. The city reported the ransomware attack o the Federal Bureau of Investigation (FBI) and is currently working with the Tennessee Bureau of Investigation as part of an ongoing incident investigation. At the moment, the ransomware group responsible for this attack is still unknown.
While the City of Knoxville official website was still down at the time this article was published, Knox County government computer operations have not been affected in the attack. [...] "No credit card information is stored by the City, so individuals who have made any online reservations of City facilities are not believed to be at risk," Knoxville spokesman Eric Vreeland told WBIR. The city reported the ransomware attack o the Federal Bureau of Investigation (FBI) and is currently working with the Tennessee Bureau of Investigation as part of an ongoing incident investigation. At the moment, the ransomware group responsible for this attack is still unknown.
And now (Score:1)
Stop Paying! (Score:4, Insightful)
This is simple enough, we need to stop paying these people. It's like kidnapping for ransom. Yes, it'll cause more harm for any given incident, but if the ransomware people never get paid for doing it, then they'll stop, and we'll all be better off on average.
Windows (Score:3)
Probably Windows. Not a good thing.
But worse than using Windows is to have no good backup.
Re: (Score:3)
That's easy to say, but harder to do when you're the one that lost data.
It's the same with protecting the environment, everyone else should do it, but not me because its inconvenient.
Re:Stop Paying! (Score:5, Insightful)
Yes, it's easy to say, but in this case it's not hard to do at all. It's trivially easy to protect yourself 100% from ransomware. And I don't mean by closing all malware attack vectors - any IT manager can be forgiven for missing a vulnerability somewhere. No IT manager can be forgiven for having such poor backup strategies that ransomware can be effective. I feel badly when someone is robbed, but I don't feel bad when someone who leaves the keys in the car gets it stolen. I have no pity for people who get hit with ransomware because it is so easy to protect yourself against with proper backup procedures. Any corporate or government IT manger that doesn't have at least weekly backups ought to be fired. Better yet a nightly differential backup and a weekly image. Get hit by ransomware, restore from before the attack and move on. Any time I hear of a ransomware attack, I cringe - that IT manager ought to be publicly shamed first (so the whole country knows never to hire him again) and fired.
Re:Stop Paying! (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
I did all of this. I recommended best practices including proper backup schemes with backup devices disabled after backup, and enabled just prior to backup.
Backup drives left the building each night and we kept 30 days of rotation.
When new management showed up, they cut corners and changed all that. I objected via email and demanded responses that I could archive to cover my ass.
It worked. Weeks after I retired, the firm was hit by ransomware, and all hell broke loose.
I got hold of the gut who replaced me
Re: (Score:2)
Backup is for recovery, not protection.
Re: (Score:2)
As soon as she realized it was ransomware, she went into a panic. She yanked the network cable out of the wall (destroying the cable), and y
No lost data. (Score:2)
For lost data, there are what's technically called a "backup". No lost data.
Re: (Score:2)
Just like spam, stop replying or clicking and it will stop. /s
Re: (Score:2)
National Defense Assets (Score:3)
Bears. (Score:2)
Wot ?
Let those bears alone, they don't want to deal with those crazy humans any more.
Re: (Score:2)
And do what? The fucking NSA, FBI, CIA, have their own ransomware problems.
A swat team is useless in this situation.
Re: PCMatic (Score:1)
In Australia and elsewhere- months ago.. (Score:4, Interesting)
Scary (Score:1)
Easy fix (Score:1)
How? (Score:1)