Printer-friendly copy Email this topic to a friend
Lobby General Discussion topic #13247927

Subject: "OKP Failure - on: ATLANTA ransomware attack" Previous topic | Next topic
Selah
Member since Jun 05th 2002
16484 posts
Wed Apr-04-18 04:02 PM

Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
"OKP Failure - on: ATLANTA ransomware attack"
Wed Apr-04-18 04:08 PM by Selah

          

i just learned about this *yesterday*

article 1 - partial swipe: http://thehill.com/opinion/cybersecurity/381594-a-ransomware-attack-brought-atlanta-to-its-knees-and-no-one-seems-to

A ransomware attack brought Atlanta to its knees — and no one seems to care
By Morgan Wright, opinion contributor — 04/04/18 11:01 AM EDT

Winston Churchill once said, “Success is walking from failure to failure with no loss of enthusiasm.” By his definition, government has been extremely successful in stopping ransomware attacks.

Take the recent example of Atlanta. On March 22, the city was hit by the dreaded SamSam ransomware. City services have ground to a halt. Residents can’t pay for essential services like water. The city can’t collect revenue from parking fines. Police efficiency is dropping as reports are hand written.

One council member lost 16 years of data. Others are sharing an ancient personal laptop between them. And still no end in sight.

Only in government can failure be spun as success. As in, “We immediately assigned an incident response team,” or “We were able to successfully isolate the threat and ensure that no harm was done to other servers or systems across the city’s network.” And the most overused phrase, “No personal data was compromised.”

Never mind that the house is on fire. We saved the shed.

Even the private sector is not immune. Stunning phrases like “We detected a limited intrusion of malware” that “infiltrated a small number of systems” get fed to the press. One U.S. hospital, after a devastating ransomware attack for which it was unprepared, spun it as a success; the chief information officer (CIO) claimed he was proud that, for the duration of the outage, “no patients were adversely affected.”

Of course, the hospital was unable to perform any surgeries. That’s one way to avoid adverse effects.

Forewarned is forearmed

Emergencies rarely make appointments. But in Atlanta’s case, warning shots were fired many times and ignored, even as early as nine months before the crippling attack. And yet, the attackers met little to no resistance.

A simple Google search shows the term "ransomware" appearing 14.8 million times. Is there anyone in government or the private sector who hasn’t heard of this? Ransomware attacks increased more than 90 percent from 2016 to 2017.

The financial impact of ransomware attacks in 2015 was estimated to be $325 million. In 2017, it grew more than 1400 percent to $5 billion. If only government could grow revenues like this, we could fight off these digital invaders.

Public safety targeted

Unlike other types of ransomware attacks that rely on deceit, manipulation and influence (phishing and spearphishing), SamSam exploits weaknesses in the actual system. It is the most virulent strain of malicious software (malware) called ransomware. Ransomware seeks out and locks up files using nearly unbreakable encryption. Only the attackers hold the secret key to unlocking the files, and they want $51,000 in bitcoin (ransom) for it.

Our most critical systems, especially computerized 911 dispatch systems, are being targeted.

There have been 184 attacks against public safety agencies in the last 24 months, according to SecuLore Solutions, which compiled publicly available incidents. One big reason is the very nature of 911 systems; they’re critical to public safety and the community. The attackers hope they’re more likely to pay, as well. But that’s not always the case.

Days ago, Baltimore, Md., was struck by a ransomware attack. While it did not take down the actual inbound call system for 911 emergencies, it crippled the computer-aided dispatch system used by emergency personnel. Baltimore’s vulnerability — a technician’s change to an internal firewall — was only four hours old when it was exploited.

We’re the victim

Ransomware isn’t half as destructive as the denial exhibited by government officials in the face of this electronic onslaught. The bill for ignorance and short-sightedness has come due, and it’s payable only in bitcoin.

Atlanta mayor Keisha Lance Bottoms played the victim card first. She informed Atlanta’s citizens that “We are dealing with a hostage situation.” A situation, yes, but completely of Atlanta’s own making. The mayor admitted cybersecurity had not been a high priority prior to the attack. But now, it’s top of mind. For real this time. We really, really mean it.

To further drive home the portrait of victimhood, the mayor stated “I just want to make the point that this is much bigger than a ransomware attack. This is really an attack on our government, which means it's an attack on all of us."

This is the type of response that infuriates taxpayers and citizens. Why, you might ask?

There’s never enough time and money to do it right. But when government screws up, there’s always time and taxpayer money to do it over, usually at a much higher cost. In the end, it’s the consumer and taxpayer footing the bill.



In my testimony before Congress on Healthcare.gov in November 2013, some members thought whatever was broken could be “fixed” going forward. Never mind that there was ample opportunity to fix problems before the entire site launched.

What might cost taxpayers $1 to fix before launch, generally costs $100 after.

Son of SamSam

These attacks will continue, and they will get worse. SecurityScorecard released an analysis of the security shortcomings of 552 local, state and federal organizations and found dangerous delays in replacing outdated software, patching existing software, and other basic defensive steps. When compared against other industries, government ranked 16th out of 18 industries in a ranking of cybersecurity. Health care ranked higher than government. No, that was not a typo.

Of all industries, only government can print money and make law. With those built-in advantages, it still can’t make headway against one of the most damaging threats to our online way of life.

The SamSam ransomware is a formidable weapon. It’s adapting and learning from each attack, as the attackers do. It’s three-dimensional chess, and government is still playing checkers.

The attackers are more sophisticated than before, and their tactics evolve faster than government’s ability to adapt. The scary part is that these criminal groups are functioning more and more like state actors. All the elements are there; reconnaissance, target selection, lateral movement in the network, patience, timing for maximum impact, adaptive weaponry.

Getting it right

Where is the accountability? “Only in the government could such a gaping hole be allowed to exist without fear of consequence.” That was my testimony in 2013 before Congress about Healthcare.gov. It also describes Atlanta and dozens of successful cyber-attacks against government at all levels.

One place to start is to quit using worn-out phrases about how no personal information was compromised in the ransomware attack. That’s not the purpose of ransomware: It’s to hold data “hostage” for “ransom.” Claims of false victory ring hollow and show lack of understanding about how ransomware works.

Another place is to hold real people accountable — at the federal, state and local levels. Even the CEO of Equifax, along with the CIO and chief information security officer (CISO), got fired. You can call it “retiring early,” but it clearly wasn’t their idea.

Atlanta’s Mayor Bottoms tried to put a positive spin on the city’s failure: “I am looking forward to us really being a national model of how cities can shore themselves up and be stronger because of it.”

If George Carlin were still alive today, I imagine his monologue about oxymorons concerning the latest ransomware attacks would include “computer security,” “government organization” and his perennial favorite, “jumbo shrimp.”

Just remember. If plan A fails, there are 25 more letters.


=============================================
article2:
https://www.cnn.com/2018/03/27/us/atlanta-ransomware-computers/index.html

partial swipe:

Six days after a ransomware cyberattack, Atlanta officials are filling out forms by hand

Atlanta (CNN)Residents can't pay their water bill or their parking tickets. Police and other employees are having to write out their reports by hand. And court proceedings for people who are not in police custody are canceled until computer systems are functioning properly again.
More than six days after a ransomware attack shut down the city of Atlanta's online systems, officials here are still struggling to keep the government running without many of their digital processes and services.
The city said on Twitter that all court dates set for Wednesday will be rescheduled and all applications for jobs with the city are suspended until further notice.

On Tuesday officials told city employees to turn their computers and printers back on for the first time, part of an ongoing assessment of the impacts of the cyber breach, which took place on March 22......

  

Printer-friendly copy | Reply | Reply with quote | Top


Topic Outline
Subject Author Message Date ID
i thought this was about the Atlanta post on here
Apr 04th 2018
1
this is a major american city
Apr 04th 2018
2
People really replying to those emails w/ their login info
Apr 04th 2018
3
Yes, Spearphishing is trivial to pull off.
Apr 05th 2018
4
people will read their social security and bank info over the phone
Apr 05th 2018
5

mista k5
Member since Feb 01st 2006
16414 posts
Wed Apr-04-18 04:09 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
1. "i thought this was about the Atlanta post on here"
In response to Reply # 0


  

          

ransomware is pretty crazy, glad im not at all involved with company IT anymore

  

Printer-friendly copy | Reply | Reply with quote | Top

    
Selah
Member since Jun 05th 2002
16484 posts
Wed Apr-04-18 04:20 PM

Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
2. "this is a major american city"
In response to Reply # 1


          

imagine if they successfully went after Hartsfield and the impact that would have on airtravel

thats NUTS to consider

  

Printer-friendly copy | Reply | Reply with quote | Top

flipnile
Member since Nov 05th 2003
13573 posts
Wed Apr-04-18 09:49 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
3. "People really replying to those emails w/ their login info"
In response to Reply # 0


          

  

Printer-friendly copy | Reply | Reply with quote | Top

    
nonaime
Charter member
3117 posts
Thu Apr-05-18 06:32 AM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
4. "Yes, Spearphishing is trivial to pull off."
In response to Reply # 3


          

And the way that cloud based file storage providers facilitate collaboration makes it a no brainer to use their methods to steal credentials.

~~~~~~~~
A bad Samaritan averaging above average men (c) DOOM

  

Printer-friendly copy | Reply | Reply with quote | Top

    
Selah
Member since Jun 05th 2002
16484 posts
Thu Apr-05-18 09:58 AM

Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
5. "people will read their social security and bank info over the phone"
In response to Reply # 3


          

yeah

there is a level of blind trust given over to people who purport technical expertise from people who don't have it

and

when people don't care, they tend not to think too hard

  

Printer-friendly copy | Reply | Reply with quote | Top

Lobby General Discussion topic #13247927 Previous topic | Next topic
Powered by DCForum+ Version 1.25
Copyright © DCScripts.com