• CYBER SECURITY
    • RANSOMWARE PREVENTION
    • RANSOMWARE REMOVAL
    • RANSOMWARE FILE RECOVERY
    • RANSOMWARE TYPES
  • RANSOMWARE REMOVAL
    • .BETTA DHARMA
    • CRYPT
    • COMBO
    • .GAMMA
    • RYUK
    • RAPID 2.0
    • HERMES
    • DHARMA ARROW
    • NOZELESN
    • LOCKED
    • DHARMA BIP
    • DHARMA JAVA
    • DHARMA ARENA
    • OTHER TYPE OF RANSOMWARE?
  • NEWS
  • TUTORIALS
  • RANSOMWARE TV

A 3-Year Ransomware Campaign that Hit Hundreds of Organizations in the US

January 14, 2019Simo Z.

A federal court recently indicted two Iranians in connection with ransomware attacks on Atlanta’s municipal system and many similar incidents all across the United States. We keep on hearing new details of their activity, which clearly shows that even a single cryptovirological strain can wreak havoc. Moreover, it has proved once again that geographical distance is unconsequential for ransomware operators since both attackers successfully launched hundreds of attacks from within their country.

A 3-Year Ransomware Campaign

The US Deputy Attorney General Rod J. Rosenstein has revealed that the Iranian attackers launched nearly 200 attacks in their three-year campaign. They succeeded in skimming $6 million in the name of ransomware removal. Moreover, the affected entities incurred losses of around $30 million. These losses primarily entailed downtimes and expenses of ransomware removal and recovery measures. It’s worth mentioning that they used SamSam ransomware strain throughout their campaign.

Among those hundreds of attacks, some are quite high-profile. Besides Atlanta’s municipal system, the attackers also hit six healthcare facilities in different states. Moreover, the cryptovirological attacks on Colorado’s Department of Transportation (January, 2018) and Port of San Diego (September, 2018) are also being attributed to Iranian SamSam operators.

Is the Campaign State-Sponsored?

The US-Iran relations are almost always clouded with animosity. Therefore, law enforcement agencies have also talked about the possibility of the involvement of the Iranian government. The two attackers remain at large in their country, and there is no way to extradite them due to strained diplomatic ties of the two countries.

2018: The Year of SamSam

If 2017 belonged to WannaCry, then it is safe to say that SamSam was the leading ransomware threat of this year. Both individual users and companies have borne the brunt of millions due to SamSam ransomware removal and data recovery measures.

Previous post ESET Joins Global Initiative to Fight against Ransomware Next post Healthcare Entities, Ransomware Threat and 2019

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018MonsterCloud University
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018MonsterCloud University
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018MonsterCloud University
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/188243833?loop=0

Recent Posts

  • Ransomware Goes Rogue against the Cloud!
  • Gearing Up Against the Ransomware Attacks
  • Decoding the Modern-Day Cybercriminal
  • How to Remove Cosanostra Ransomware?
  • Ransomware Attack on Connecticut Provider Impacts 24,000 Patients

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • CYBER SECURITY
    • RANSOMWARE FILE RECOVERY
    • RANSOMWARE PREVENTION
    • RANSOMWARE REMOVAL
    • RANSOMWARE TYPES
  • NEWS
  • TUTORIALS

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

MORE

  • BECOME A CONTRIBUTOR

Need Help Removing Ransomware? Call Us!

(844) 222-1221
info@monstercloud.com
© 2018 MonsterCloud.com. All Rights Reserved.