• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Crawford County Gets Hacked

November 2, 2018Simeon Georgiev

Another one bites the dust. According to the latest reports, this time the Crawford County (Robinson, IL) has gotten into the crosshairs of a ransomware. The ransomware managed to lock the department’s data and demanded to pay a ransom for ransomware removal. So far, the name of the ransomware was not found out. Similarly, the ransom amount has not been revealed yet. Early investigations reveal that hacked data consisted of the last 30-day details.

According to one of the officials, Fayrene Wright, the accounting department was hit. It is believed that personal and sensitive information of the county officials has not been stolen or misused. After the ransomware entered, it managed to lock various portions of data. This data included accounts receivable and accounts payable, rendering the company unable to process its accounting processes

The payroll system was also wrecked. The department payroll system used encryption for the generation of salary checks. Factors like deductions, tax, and other critical factors were processed to generate an appropriate salary for each official.

Since the payroll system maintained the processing of last month’s salaries, the department had to adapt. This meant that the department went back to the good old days –– writing checks on a piece of paper –– that existed before the rapid digitization. As a result, the management had to scratch their heads along with the auditors. Collaborated efforts were enacted in order to process and generate salaries for each employee. All the relevant factors that were used by the payroll systems were taken into account.

Fortunately, the department received assistance and support from the county employees. County employees understood the severity and intricacies of the event. A county clerk assured that the ransomware was unable to access the records of voters. This was because the server that stored those records was not breached in the attack.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post The Cybercriminal Group behind GandCrab Ransomware Shows Mercy to Syrian Father Next post SOLO ransomware – A Cryptovirological discovery

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.