To bring you the best content on our sites and applications, Meredith partners with third party advertisers to serve ransom virus bitcoin ads, including personalized digital ads. Those advertisers use tracking technologies to collect information about your activity on our sites and applications and across the Internet and your other apps and devices. County manager Dena Diorio, at a 2 p.
Diorio said in a news release. It will take time, but with patience and hard work, all of our systems will be back up and running as soon as possible. On Monday, a county employee received a phishing email and inadvertently opened an attachment that contained spyware and a worm into the county’s computer system. And there was no guarantee that paying the criminals was a sure fix. Our journalism takes a lot of time, effort, and hard work to produce.
If you read and enjoy our journalism, please consider subscribing today. The county said it had backed up almost all of its data, and will rebuild its applications. Health and Human Services, the court system and Land Use and Environmental Services will be restored first. If the county had paid the ransom, Diorio said, it would take a day to set up an online account, another day to receive the account’s key and a day to test the key and ensure it wouldn’t again infect the county’s computer system. There would have been no assurance that the data would be fully unlocked even if the money were paid, officials said. Hackers typically don’t steal data but encrypt it, placing it out of reach of the owners until ransom is paid. In the past year and a half multiple local governments have been held up by hackers.
Forensic analysis of the attack, including efforts to ensure the worm is fully contained, will take a few more days, chief information officer Keith Gregg said. The county has not released the phishing email that delivered the worm. But Mecklenburg County spokesperson Danny Diehl said Wednesday that the email appeared to have been routed from another county employee’s e-mail address, making it appear as though it was a regular employee-to-employee communication. United Kingdom, South Africa, India and the Philippines, bleepingcomputer.
7,000 per machine in ransom, it reported. Local governments are increasingly being targeted by cyber-criminals, the journal Cities Today reported in February. The federal Multi-State Information Sharing and Analysis Center saw an 85 percent increase in ransomware total attacks on cities from 2015 to 2016 and a 295 percent increase from 2014 to 2016, it said. A number of county websites were still down Wednesday evening. For instance, the Sheriff’s Office website would not allow people to search who is in the county-run jail. The county-run real estate website was also not working.
The FBI confirmed it is monitoring the situation but declined to comment on whether it is involved in any investigation. She said the county has discussed the situation with Bank of America and third-party experts. Driorio said the experts gave the county conflicting advice on whether to pay the ransom. Mecklenburg Commissioner Matthew Ridenhour said he had seen a copy of the phishing e-mail.
He said the e-mail contained a text file. After that was mistakenly opened, the file said that the county’s files were being encrypted. It gave the county an e-mail address and instructions on how to pay the ransom. Ridenhour said the county backs up its data regularly and may have backed up its data as recently as over the weekend. So the county should be able to recreate almost all of the encrypted data. Gregg said about the original e-mail.