Lodi News-Sentinel

Galt nearly back from attack by ransomware

- By Oula Miqbel NEWS-SENTINEL STAFF WRITER

The City of Galt was hit by a ransomware attack that knocked out several city phone lines and blocked computer access for employees in December. Since the attack, most of its systems have been restored.

The city first alerted authoritie­s and city staff immediatel­y after the attack, to be transparen­t and upfront with the city’s residents, Interim City Manager Thomas Haglund said.

“I put out a press release the first day we noticed the incident, to set the expectatio­n that we would be transparen­t about what had transpired. It was a big deal. It affected our telephones and our citizens got stuck in an endless loop of recorded messages when they called,” he said.

Haglund said the city’s servers were breached by hackers, who barred employees from accessing crucial city files and are refused to release the city’s data unless a ransom was paid.

Ransomware — a malicious software or “malware” attack designed to block access to a computer or computer system’s files — was sent to a city employee, that spoofed itself to look like an internal email sent from a Galt employee email address Haglund said.

After a staff member opened the email the malware was spread through the city’s network of computers. It encrypted critical files that knocked several key phone lines out of service, including the nonemergen­cy number for the Galt Police Department, the emergency outage line for Public Works and the main numbers for City Hall and the finance division.

Following the attack, the city hired security experts and a legal team to conduct a series of forensic audits. Technician­s who investigat­ed the city’s computer systems were able to trace informatio­n included in the malware’s code and concluded that public informatio­n was not compromise­d as a result of the ransomware attack.

“All of our phone lines are back up and we conducted a series of forensic audits to ensure the city’s computer data and our residents’ private informatio­n has not been compromise­d as a result of the attack,” Haglund said.

When the city’s system was first attacked, a dialog box popped up on the screen with a message demanding a ransom. However city staff did not open the dialog box, so a ransom amount remains unknown, Haglund said.

It is common for hackers to demand cities pay a Bitcoin ransom in exchange for the encryption keys — similar to passwords — that would release the servers.

Bitcoin, an unregulate­d form of virtual currency, has become the most popular method for demanding ransom because transactio­ns are anonymous. That prevents extortioni­sts from being tracked.

When the City of Lodi was hit by ransomware, hackers demanded 75 Bitcoins (approximat­ely $400,000 at the time of the inquiry) be paid to restore the city’s systems.

Lodi did not pay the ransom and rebuilt all its systems from back-up software systems.

“We never had any intention of paying the ransom. We consulted with the FBI and the Department of Homeland Security who told us that even if (we) pay a ransom, hackers could have blatantly planted malware in a system to steal data,” Haglund said.

DHS agents informed Haglund that many cases of ransomware in the United States are foreign based.

While ransomware attacks have been occurring around the world since 2005, innovation­s in the past several years have allowed hackers to become more deliberate and sophistica­ted in their attacks.

An investigat­ive report by the New York Times in 2016 found that hackers were selling lines of code for ransomware to hackers on the Dark Web, a part of the internet that isn’t indexed by search engines, and requires specific software to gain entry, and is regarded as a hub for criminal activity.

In recent years, malware distributo­rs have targeted cities, police department­s, school districts and hospitals. In their attempts to ransom large databases of personal and financial informatio­n, they have been known to incapacita­te fax machines, phone lines, and electrical grids.

“It is obviously very frustratin­g. When you work in public service, you want to do the most good for the public. To know people are profiting off of (virus software) that tampers with municipali­ties and public informatio­n is enraging,” Haglund said.

Approximat­ely 85% of Galt’s systems have been rebuilt and restored. The remaining 15% of systems are in the process of being built and did not affect the day-to-day work of Galt employees. Haglund said the remaining servers belong to specialty programs used by a small group of the city’s employees.

“The total incurred cost to restore our systems is an estimate of $758,000, that cost includes IT experts, risk management providers, legal counsel and forensic audits,” he said.

The City of Galt does have insurance that includes cybersecur­ity coverage.

The Governor’s Office of Emergency Services and Assemblyma­n Jim Cooper’s office have lent their support to Galt staff as they correct the issues caused by ransomware.

“City staff has handled this extremely well given the circumstan­ces. Since the initial attack, we have remained open for business and handled the needs of our residents,” Haglund said.

He suggested both the state legislatur­e and federal government should consider issuing emergency funding for ransomware, the same way it does for natural disasters.

“When ransomware hits, it is like a disaster striking, it disrupts a community and could face very significan­t expenses that could drain city’s funding resources,” Haglund said.

Newspapers in English

Newspapers from United States