In a disturbing trend, another Florida city votes for ransomware payment
“Florida man” has become such a popular meme that it has a Wikipedia page, but it may have a new contender in the form of “Florida city” after yet another one has decided to pay hackers following a ransomware attack.
Following in the footstep of Riviera Beach June 20, Lake City council voted Monday to pay a 42-bitcoin ($550,000) ransom to gain a promised decryption key that will allow it once again to access its data.
Lake City was inflicted with ransomware on June 10 in an alleged “Triple Threat” attack. If the description is accurate, the attack on Lake City may have also been rare as it wasn’t simply a ransomware attack alone. A Triple Threat attack includes the Emotet and TrickBot banking trojan viruses with Ryuk ransomware, with a goal to steal sensitive information, encrypt computers and ransom victims’ data.
Why hackers would find the data stored by Lake City, population 12,046, interesting is the missing piece in this story.
The only positive for Lake City taxpayers is that the decision only cost them $10,000 since insurance covered the rest of the ransomware payout.
Lake City’s decision to pay the hackers behind their ransomware attack has not been well-received in the cybersecurity community because ultimately every time a government or private organization pays the ransom, it emboldens those behind the attacks to try for more.
Shlomie Liberow, technical program manager at HackerOne Inc., told SiliconANGLE that paying the ransom often seems like the only way to fix the problem, sinces operations can be halted or slowed for months while security teams work to recover the systems.
“However, paying the ransom only encourages cybercriminals, proving their tactics work and leading to further attacks,” he said. That’s why hospitals, councils and other critical services are top targets, since “they cannot afford to take the financial and timely hit that comes from a ransomware attack.”
Ilia Kolochenko, founder and chief executive officer of security testing firm ImmuniWeb, agreed.
“Until today, based on our experience, ransomware against such vulnerable classes of victims were either unsystematic or of relatively poor quality,” Kolochenko said. “However, with such lucrative and easy stakes on the table, cybercriminals will now willingly invest to prepare sophisticated, hardly detectable and well-targeted campaigns. It’s a paradise for black hats.”
Photo: Michael Rivera/Wikimedia Commons
A message from John Furrier, co-founder of SiliconANGLE:
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provide free, deep, and relevant content.
Join our community on YouTube
Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
THANK YOU