A flurry of ransomware attacks has been reported this week affecting entities in US states of Georgia, New York, Tennessee, and Florida.

File-encrypting malware has grown rampant lately, with the likes of Ryuk, Sodinokibi, or Dharma/Phobos targeting organizations in both the public and private sector.

The actors behind these threats do not discriminate between targets but statistics from Coveware,  ransomware incident response company, show that public sector victims pay ten times more than private companies. The calculated average for Q2 was $338,700.

Wiz

Ryuk in Tennessee

On Thursday, officials in Collierville, Tennessee, confirmed that the Town's computer systems were infected with a ransomware strain.

The IT department worked to minimize the impact and isolated several servers hit by the attack but some services (permits, public records requests, and business services) were affected.

The attack occurred in the morning and did not have an effect on emergency services, according to News Channel 3. Later in the day, Town officials said that the disruption was caused by the Ryuk ransomware strain.

Ransomware hits radio station in Florida

Community radion station WMNF 88.5-FM in Tampa decided to beef up its security posture following a ransomware attack last month.

The incident occurred on June 18 and did not affect any sensitive data but it did reach a system that stored audio archives for pre-recorded promos and episodes of news and public affairs programming.

Systems for live HD broadcasts were also infected, causing radios with a digital display to show the name of the rock band 'Derek and the Dominos' regardless of the tune played.

Despite not having backups for the malware-encrypted data, WMNF decided not to pay the ransom, Tampa Bay Times reports on Wednesday.

The Florida Department of Law Enforcement told the radio that there is a good chance of losing the data even if they paid the cybercriminals.

In other ransomware incidents in Florida, crooks were able to cash in at least $1 million in bitcoins after infecting computers in the City of Lake City (paid 42 bitcoins) and in Riviera Beach (paid a 65 bitcoins ransom).

Ryuk in New York libraries

Another page in the chronicle of ransomware attacks can be found in the libraries of Onondaga County (OCPL), New York, where a Ryuk incident was discovered last Friday.

The FBI has been involved in the investigation and information technology teams have been working to restore to normal the systems at the county's library locations.

The systems continued to be unavailable on Tuesday but signs of returning to normal occurred today when OCPL informed that cardholders can now access their OverDrive accounts and check out items using a web browser.

The ransomware strain causing the disruption appears to be Ryuk, also responsible for the attack on Syracuse City School District last week, according to News Channel 9.

Ransomware in Georgia

Another incident that may be caused by file-encrypting malware was reported today in Henry County, Georgia. The attack happened on Wednesday morning (around 3 or 4 AM) and the systems were still not functioning this afternoon.

The computers that have been taken down served the budgeting and procurement systems, and the Planning and Zoning Department.

Melissa Robinson, public information officer for the county told local news outlet Henry Herald informs that the Planning and Zoning Department would have to switch to paper permits if the current situation persists in the next couple of days.

Robinson did not clearly explain the nature of the incident but stated that the FBI was contacted and they would take over in situations where ransomware is involved, if this is the case.

Paying is a short-term solution

Ransomware is a serious threat that can be stifled by not paying the price the cybercriminals ask for the decryption tool as this would make the business less profitable for the attacker.

Furthermore, yielding to the threat actor's demands does not solve the problem in the long run. In the end, victims will have to accept the financial loss and also invest in a better security posture that would shield them from other types of attacks in the future.

For instance, the attack on Riviera Beach ended with the city paying about $600,000 to get the decryption keys from the hackers and investing close to $1 million in new computers and hardware to rebuild its IT network.

Most cyber attacks are possible by exploiting vulnerabilities that have already been reported and addressed, so installing the latest security updates lowers the chances of an attack.

It is also important to note that there are projects such as No More Ransom that provide free decryption for various versions of several ransomware families.

Another project, ID Ransomware, can identify the ransomware strain by checking the ransom note or an encrypted file. For Ryuk incidents, Emisoft can decrypt files in 3% to 5% of the cases and the ID Ransomware service can confirm if decryption works with a particular sample.

On the defense side, organizations should make sure that they have a proper file backup system that runs regularly and is isolated from the main network.

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Related Articles:

RansomHouse upgrades encryption with multi-layered data processing

Romania's oil pipeline operator Conpet confirms data stolen in attack

Crazy ransomware gang abuses employee monitoring tool in attacks

Hackers breach SmarterTools network using flaw in its own software

Payments platform BridgePay confirms ransomware attack behind outage