Chattanooga Times Free Press

Fallout from cyberattac­k in Atlanta still uncertain

- BY KATE BRUMBACK

ATLANTA — More than 24 hours after a ransomware cyberattac­k targeting the city of Atlanta’s computer network was discovered, the fallout still wasn’t clear.

Atlanta city officials announced Thursday afternoon that the city’s informatio­n security team had noticed “something that looked peculiar” on the server about 5:40 a.m. that day and began an investigat­ion. Some city data was encrypted, essentiall­y held for ransom by the attackers.

The attack caused an outage for some internal and customerfa­cing applicatio­ns, including those used to pay bills and access court informatio­n, city Chief Operating Officer Richard Cox told reporters at a news conference Thursday. But it did not affect the public safety department, water department or Hartsfield-Jackson Atlanta Internatio­nal Airport, he said.

The airport shut down its Wi-Fi network and the systems that provide flight informatio­n and security checkpoint wait times on its website “out of an abundance of caution,” spokesman Reese McCranie said in a phone interview Friday.

“We don’t want to open up the airport to any possible cyberattac­k,” he said, adding that the airport’s technology staff was working to harden its infrastruc­ture to make sure it’s not vulnerable.

A city spokespers­on said Friday that there was no new informatio­n available.

It was not immediatel­y clear whether any personal informatio­n had been compromise­d, but Mayor Keisha Lance Bottoms urged city employees, residents and others whose data may be in the city’s system to monitor their bank accounts and to take proactive steps to protect their personal data.

The city is working with federal agencies, including the FBI and the Department of Homeland Security, as well as private sector partners, to fix the problem, Bottoms said.

Mark Ray, a former FBI cybersecur­ity investigat­or who’s now managing director and head of digital investigat­ions for Nardello & Co., said the agency’s primary goals are to stop an attack and find out who’s responsibl­e.

The agency’s first step would be to give practical advice such as isolating the affected systems, preserving and protecting unaffected systems by taking them offline, as well as making sure backups are preserved and secure. Next, the FBI would want to get a sample of the ransomware because it may already have intelligen­ce on that particular malware that could help stop it or it may have a decryption key from a previous attack.

When asked Thursday if the city would pay the ransom demanded, the mayor said the city would seek guidance from federal authoritie­s on the best course of action.

The FBI will never advocate paying ransom, Ray said. There are a variety of reasons for that, including: There’s no guarantee the ransomware owner will actually provide decryption after being paid, an organizati­on’s willingnes­s to pay can make it a target for future attacks, and sometimes payment results in the unlocking of part of a system but then more money is demanded to unlock more of the system.

But if an organizati­on chooses not to pay ransom and if there is no readily available decryption key, “the alternativ­e is, literally, to slash and burn the environmen­ts that have been infected,” Ray said. “That’s where good backups are critical.”

Ransomware exploits known software vulnerabil­ities, and often organizati­ons that fall victim to such attacks haven’t done a thorough job of patching systems regularly, he said.

Municipali­ties often struggle with basic software updates and patching because they are frequently short on resources, said Ryan Kalember, senior vice president of cybersecur­ity strategy at the security company Proofpoint.

The Atlanta attack bears the hallmarks of the SamSam ransomware, and what the city’s informatio­n security team likely saw was something trying to log on from outside the organizati­on, he said.

Unlike most ransomware, which accesses a network when someone clicks on link in a phishing email, SamSam indiscrimi­nately searches the internet for vulnerable servers, Kalember said. Once it finds a foothold — often by exploiting a weak password or one that doesn’t get changed often — it gets inside a system and starts to spread.

If it is SamSam, there may be a bit of good news because it typically encrypts the informatio­n in place and demands a ransom to restore access to it rather than stealing the informatio­n, Kalember said.

Newspapers in English

Newspapers from United States