2018 Atlanta cyberattack

Jump to navigation Jump to search

2018 Atlanta cyberattack
Date22 March 2018[1]
LocationAtlanta, Georgia, United States
TypeCyberattack
ThemeRansomware encrypting files with $51,000 demand (via Bitcoin)
Cause
  • SamSam Ransomware
OutcomeMultiple municipal services down, including databases and wi-fi
Years' worth of data destroyed
City spends $2.7 million in recovering services

The city of Atlanta, Georgia was the subject of a massive cyberattack which began in March 2018.[2] The city recognized the attack on Thursday, March 22, 2018,[1][3] and publicly acknowledged it was a ransomware attack.

Due to Atlanta's national importance as a transportation and economic hub, the attack received wide attention[4] and was notable for both the extent and duration of the service outages caused. Many city services and programs were affected by the attack, including utility, parking, and court services.[5] City officials were forced to complete paper forms by hand.[6]

On November 26, a grand jury indicted two Iranian hackers, Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri, for the attack. The Department of Justice alleged that Savandi and Mansouri are part of the SamSam group; that the SamSam group is based out of Iran; and that the pair created SamSam Ransomware, the malware used in the attack. There are no affiliations with the government of Iran.[7]

Approach and attack

Leading up to the attack, the Atlanta government was criticized for a lack of spending on upgrading its IT infrastructure, leaving multiple vulnerabilities open to attack. In fact, a January 2018 audit found 1,500 to 2,000 vulnerabilities in the city's systems, and suggested that the number of vulnerabilities had grown so large that workers grew complacent. The virus used to attack the city was the SamSam Ransomware, which differs from other ransomware in that it does not rely on phishing, but rather utilizes a brute-force attack to guess weak passwords until a match is found. It is known to target weaker IT infrastructures and servers.[8] The ransomware has prominently been behind attacks on medical and government organizations since its discovery in 2016, with previous attacks on targets ranging from small towns such as Farmington, New Mexico to the Colorado Department of Transportation and the Erie County Medical Center. It can also bypass antivirus software.[9] Despite no suspects being identified or indicted until November 2018, the SamSam hackers were described as "opportunistic".[10]

On March 22, at 5:40 AM, the Department of Atlanta Information Management first learned of outages on various internal and customer applications “including some applications customers use to pay bills or access court related information,” according to Richard Cox, the city's interim Chief of Operations. Soon afterward, the city shut down many of its digital services in an attempt to control the situation, including its court system database and the wi-fi at Hartsfield–Jackson Atlanta International Airport. The city eventually identified it as a ransomware attack.[3][1]

Aftermath and recovery efforts

This hack was notable as it was the largest successful breach of security for a major American city by ransomware, potentially affecting up to 6 million people.[8][11] Following the attack, the city of Atlanta cooperated with the FBI, Department of Homeland Security, and Secret Service and hired security firms such as SecureWorks to investigate, and many government computers were advised to stay powered off until 5 days later.[6]

Though the city declared that there was little to no evidence that personal data had been compromised, later studies show that the breach was worse than originally estimated. In June 2018, it was estimated that a third of the software programs used by the city remained offline or partially disabled.[12] In addition, many legal documents and police dashcam video files were permanently deleted, though the police department was able to restore access to all its investigation files.[13] For a while, residents were forced to pay their bills and forms by paper.[6]

In response to this hack, Atlanta devoted $2.7 million to contractors in order to recover, but later estimated it would need $9.5 million.[12]

On November 26, 2018, the Department of Justice indicted two Iranian hackers for the attack, charging that Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri were part of the SamSam group and created SamSam Ransomware.[7]

References

  1. ^ a b c "Atlanta, GA : Ransomware Cyberattack Information". www.atlantaga.gov.
  2. ^ Press, The Associated (March 23, 2018). "Atlanta City Computer Network Remains Hobbled by Cyberattack" – via NYTimes.com.
  3. ^ a b "Atlanta officials warn cyber attack may compromise sensitive data".
  4. ^ Blinder, Alan; Perlroth, Nicole (March 27, 2018). "A Cyberattack Hobbles Atlanta, and Security Experts Shudder". The New York Times.
  5. ^ Kearney, Laila (March 23, 2018). "Atlanta ransomware attack throws city services into disarray". Reuters.
  6. ^ a b c CNN, Kimberly Hutcherson. "Six days after a ransomware cyberattack, Atlanta officials are filling out forms by hand".
  7. ^ a b Perlroth, Nicole; Benner, Katie. "Iranians Accused in Cyberattacks, Including One That Hobbled Atlanta". Retrieved November 30, 2018.
  8. ^ a b Freed, Benjamin (April 24, 2018). "Atlanta was not prepared to respond to a ransomware attack". StateScoop. Retrieved July 18, 2018.
  9. ^ Crowe, Jonathan (March 2018). "City of Atlanta Hit with SamSam Ransomware: 5 Key Things to Know". Barkly vs Malware. Barkly Protects, Inc. Retrieved July 18, 2018.
  10. ^ "SamSam ransomware attacks have earned nearly $850,000". CSO Online. IDG. March 23, 2018. Retrieved July 18, 2018.
  11. ^ Poon, Linda (March 30, 2018). "Why Are Cities So Vulnerable to Cyber Attack?". Citylab.com. Retrieved July 18, 2018.
  12. ^ a b "Atlanta officials reveal worsening effects of cyber attack". Thomson Reuters. June 6, 2018. Retrieved July 18, 2018.
  13. ^ Vaas, Lisa (June 8, 2018). "Atlanta ransomware attack destroyed years of police dashcam video". Naked Security. Sophos.
The article is a derivative under the Creative Commons Attribution-ShareAlike License. A link to the original article can be found here and attribution parties here. By using this site, you agree to the Terms of Use. Gpedia Ⓡ is a registered trademark of the Cyberajah Pty Ltd.