Second Florida town pays out $500k to ransomware hackers
Lake City and Riveria Beach combined pay out over $1 million to regain control of municipal computer systems
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
For the second time in a week, a Florida town has been forced to pay a ransom to hackers in order to regain control of government computer systems.
It's reported that Lake City, a town located in the north of the state, has paid out almost $500,000 in bitcoin after a ransomware attack brought down most of the town's municipal email systems and landline phones.
It comes just one week after officials in Riviera Beach, a town in the south of the state, were forced to pay out $600,000 to regain control of their hacked systems.
Lake City's municipal systems had been down since 10 June after falling foul of a malware attack known as 'Tripple threat' - a ransomware program that combines three different methods of attack to target network systems.
Lake City mayor Stephen Witt told CBS on Tuesday: "I would've never dreamed this could've happened, especially in a small town like this."
Although Lake City has yet to say how the ransomware was spread to its systems, the attack on Riviera Beach was reportedly the result of an employee opening a malicious email attachment, according to the New York Times.
The virus took down all of Riviera Beach's online systems, including email and some phones, as well as water utility pump stations.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Anything that was done online, we did not have access to," city spokeswoman Rose Anne Brown told the newspaper.
Andrea Carcano, CPO of Nozomi Networks, said the two attacks were "a testament to the growing use of ransomware attacks to target US cities".
"This is a scary reminder of the damage cybercriminals can inflict when they target critical infrastructure and government services," she said. "However, by agreeing to pay the ransom both councils are only fuelling the profitability of the ransomware industry for attackers."
In 2018, a ransomware attack on Alaskan borough Matanuska-Susitna was so severe that one of its offices had to resort to using typewriters while its systems were repaired. In May, the city of Baltimore lost control of its public services for more than two weeks after a ransomware attack crippled its government's computer systems.
Unlike Lake City and Riveria Beach, however, Baltimore officials refused to pay out. On that occasion, hackers had demanded 13 bitcoins, valued at just under $100,000 at the time, but city officials were advised by the FBI not to give funds to the hackers.
According to the Baltimore Sun, the recovery operations cost Baltimore approximately $18.2 million.
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.
-
Organizations hit by 90 zero-day vulnerabilities last yearNews Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points
-
Major data leak forum taken downNews LeakBase enabled the sale and purchase of a huge amount of personal data and had more than 142,000 members
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
