Hackers infecting the computer systems of the city of New Bedford, Massachusetts, with ransomware wouldn't settle for anything less that than $5.3 million to decrypt the data. The ransom was too high and they got a big fat nothing in return.

The attack occurred on Friday, July 5, before working hours, and details remained unknown at the time as cybersecurity consultants "strongly advised" against providing information about the attack.

Blame it on greedy Ryuk

In a communication on Wednesday, Mayor Jon Mitchell disclosed that the city fell victim to a ransomware attack that affected 4% of the City's computers, or 158 workstations.

The infection did not spread to other machines due to Management Information Systems (MIS) staff's response to contain the data encryption process from spreading by disconnecting servers and shutting down workstations on the network.

Mitchell says that the attacker deployed a variant of Ryuk ransomware, a threat which according to Malwarebytes has climbed to the top spot in the list of file-encrypting malware targeting businesses.

The Providence Journal reports that the attackers demanded a bitcoin cryptocurrency payment of $5.3 million for the release of the data decryption keys.

The city tried to negotiate for $400,000, which was in line with payments from other cities hit by ransomware attacks. The offer was rejected and the negotiations stopped at this as the hackers made no new demand and the city decided to try and recover the data on its own.

Lesson learned

For Ryuk incidents, cybersecurity company Emsisoft says they can decrypt files in 3% to 5% of the cases. The ID Ransomware service can confirm if decryption works with a particular sample or not.

Not paying the ransom has been a strong recommendation from the infosec community for years, since giving in to the attacker's demand keeps the ransomware business humming.

Administrators of this sort of malware are making big money and have partnered up with other cybercriminals for distribution to victims. One of the most recent ransomware families is Sodinokibi. Although its activity started in April, the average payment for decrypting a network of computers is $150k. Its handlers have already found affiliates to spread it and take a portion of the ransom.

Creating backups and storing them off the main network is a good way to prevent significant losses and lower the downtime caused by a ransomware attack.

"The City’s MIS Department has now completely rebuilt the City’s server network, restored most software applications, and replaced all of the computer workstations that were found to be affected."

Mayor Mitchell said that systems will continue to be restored and the city will be vigilant for such incidents in the future. Without offering details, the mayor states that additional measures will be taken to avert these episodes.


Related Articles:

Rite Aid says June data breach impacts 2.2 million people

Microsoft links Scattered Spider hackers to Qilin ransomware attacks

RansomHub extortion gang linked to now-defunct Knight ransomware

Microsoft: Octo Tempest is one of the most dangerous financial hacking groups

SEXi ransomware rebrands to APT INC, continues VMware ESXi attacks