• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Jackson County Pays $400,000 Ransom

March 18, 2019Simeon Georgiev

Recently, ransomware breached the defenses of the Jackson County government. As a consequence, the government had to pay $400,000 to the cybercriminals.

Currently, the staff at the county are involved in the ransomware removal and decryption procedures since the last week, according to the County Manager, Kevin Poe.

Meanwhile, the FBI is in the loop as well and is engaged in the investigation of the attack. For those, who are unaware of ransomware, it is a type of malware in which the files of users are encrypted and locked out. The cybercriminals then ask for money in return for the restoration of data.

Poe explained that a ransom demand soon came after the attack. As a result, the management had to come up to a decision. They realized that it was possible for the servers to remain non-functional for months while at the same time they might have to spend a great amount of money for the restoration processes.

In order to counter the ransomware, the county decided to take up the services of a cybersecurity organization which had extensive experience of negotiations involving cybercriminals. After the negotiations, soon ransom was paid in the form of the popular cryptocurrency, bitcoin. Poe explained that the choice of bitcoin was due to the fact that it was extremely hard to track it.

Poe also revealed the fact his conversation with the cybersecurity professionals and FBI referred the breach among the most sophisticated of cyberattacks in the U.S history.

Earlier, on March 1, the servers of the county were corrupted due to ransomware. According to Poe, the ransomware dwelled in their systems for around 2 weeks. He commented on the planning and strategies of the hackers through which they brought down the entire IT infrastructure of Jackson County.

So far, there have been no clues about how exactly the hackers were able to enter into the servers of the county. Sources from FBI suggest that the cybercriminal group may belong to Eastern Europe.

However, the ransom demand was not accepted without proper verification. The hackers were first asked to decrypt one of the files as part of the test to determine the accuracy of their ransomware removal claims. In response, a decryption file was provided which was tested by the county officials. Subsequently, the file worked and the data was decrypted.

Poe also divulged the name of the ransomware, Ryuk Ransomware. He lamented the fact that due to its relatively new entry in the cybersecurity space, there were not enough antimalware tools which could detect it.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Israel Just Escaped a Ransomware Attack Next post Jokeroo Ransomware: Join a Membership Package to Rent Ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.