• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Another Municipality Bites the Dust: Plymouth Gets Ransomwared!

March 21, 2019Simeon Georgiev

In 2018, an interesting trend was noticed in the cybersecurity circles. While cybercriminals were never afraid to lock horns with large businesses, they crossed a new limit and began to attack IT systems in municipalities. Many prominent cities in USA were attacked by various ransomware strains where the cybercriminals not only encrypted sensitive data but also disabled many public services. According to recent reports, one more municipal government has suffered a blow. This time the city is Plymouth (CT).

On Wednesday, the IT servers belonging to the city’s government got infected as their data was encrypted. According to Jeff Ziplow, a local cybersecurity expert, the systems of the municipality and local police department became corrupted due to in the aftermath of the attack. The ransomware is so far called as decrypt.txt ransomware—it is possible the name was coined due to the file name of the ransom note.

So far, it has been established that the cybercriminals used emails for their deception to enter the municipality’s network. Afterward, they encrypted files as the staff was no longer able to access their systems. As part of the ransomware removal and recovery process, the management chose to close the servers to ensure that the ransomware is isolated and does not manage to spread out to other departments.

Ziplow revealed that they are currently attempting to find out the name of the ransomware and identify the type of the variant. He termed the effect of the ransomware attack on the servers as “dramatic”. He expects to collaborate with the IT director where they will check all the servers to identify which of them were affected as well as complete the ransomware removal process. So far, there have been two strategies to counter the ransomware. Firstly, it will be determined whether the ransomware is removable with a tool. If no tool succeeds, then restoration via backups would be the preferred contingency plan.

He also disclosed that the systems in the municipality used Microsoft Office 360 and there are chances that the two-factor authentication mechanism will be introduced in the office to improve the security of the systems.

Ziplow pointed out the fact that recently municipalities were in the crosshairs of cybercriminals, especially those in Connecticut.

According to Ziplow, a text document was created by the ransomware which entailed step-by-step guide on how the town can pay the ransom in the form of the popular cryptocurrency, bitcoin. The hackers promised ransomware removal in exchange for the ransom, though the management refused to bow down to their demands—wise decisions as these hackers are not always true to their words.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Mexico: The Biggest Victim of Ransomware in Latin America Next post Ransomware Masquerades as Proton Technologies Staff

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.