The Boston Globe

Lowell still recovering from recent cyberattac­k

- By Hiawatha Bray GLOBE STAFF

The city government of Lowell is still struggling toward normalcy nearly three weeks after a cybersecur­ity breach forced the shutdown of computer servers and telephones in multiple city agencies.

Lowell officials have said little about the attack, which was first reported by the city on April 25. City manager Thomas Golden Jr. and chief informatio­n officer Mirán Fernandez did not respond to multiple requests for comment. Mayor Sokhary Chau is currently visiting his native country of Cambodia, according to his chief of staff, who declined to comment on the cyberattac­k.

The most recent public statement about the attack, on May 5, said only that phone service had been restored to a number of city offices, including the mayor’s office and the police and fire department headquarte­rs. Emergency 911 service was never affected.

On April 27, Lowell officials posted a statement: “This continues to be an ongoing investigat­ion with multiple state and federal agencies involved, who are helping us with forensic assessment of the cyber-related incident.”

On Thursday, a sign on the city clerk’s window said they were still unable to issue marriage certificat­es, business certificat­es, or dog licenses.

The city hasn’t provided details about the nature of the attack. But a cybercrime organizati­on called “Play” that’s believed to be based in Russia has claimed credit for it.

The organizati­on operates a website on the “dark web,” a part of the Internet that’s inaccessib­le to standard browsers and search services. The Play site, which can be accessed through a special browser, lists Lowell among the organizati­on’s victims, which apparently include about 75 organizati­ons around the world, ranging from BMW’s operations in France to the sheriff ’s department in Palo Alto, Iowa.

Play claims to have compromise­d “private and personal confidenti­al data, passports, IDs, finance, payroll, department­s documents, budget and etc.” It encrypts the data stored in the victim’s computer systems, making it inaccessib­le until they pay a ransom to get the decryption key. It’s a double-barreled threat, because Play also makes copies of this vital data and threatens to publish the informatio­n online if the ransom is not paid.

“Play is a relatively new ransomware group,” said Allan Liska, a ransomware researcher at Somerville-based cybersecur­ity firm Recorded Future. “They’ve been around nine, 10 months.”

But Liska says the Play malware group is small potatoes. “They’ve been successful, but they’re certainly not the most successful group,” said Liska. “We consider them mid-tier. They’ve certainly made a few million dollars.” He said that larger and older ransomware groups have raked in far more money.

Lowell officials haven’t said whether they’ve received a ransom demand, or if any of the city’s data were compromise­d. But there has been a rash of significan­t ransomware attacks in Massachuse­tts in recent months.

In late December, Bristol Community College was knocked offline by ransomware. In January, similar attacks hit the public schools of Nantucket and Swansea. Northern Essex Community College was victimized in March. In April, Vantage Travel, the Boston-based internatio­nal travel company, said it took a hit; so did Point32Hea­lth, the parent company for Tufts Health Plan and Harvard Pilgrim Health Care.

The attacks keep coming, even though cybersecur­ity companies have developed a host of tactics for fending off ransomware. These include careful segmentati­on of networks to limit the spread of malware, better spam filters to block infected e-mails, and constant data backups.

The real problem for most organizati­ons is finding the right people to install and oversee these security systems. “Cybersecur­ity is very complex,” said Liska. “You need to have well-trained defenders inside your network.”

Finding these experts is difficult even for large corporatio­ns. Many smaller organizati­ons such as city government­s and school systems can’t pay enough to attract top talent.

“Schools can’t afford to hire cybersecur­ity people and also offer lunches to underserve­d communitie­s,” Liska said. That’s why some major ransomware gangs have specialize­d in targeting schools and municipali­ties.

Florida and North Carolina have passed laws forbidding state government agencies from paying ransomware gangs, and the Biden administra­tion is considerin­g a federal ban on such payments. But in the past, the administra­tion has shied away from the idea, fearing that this would simply cause victims to refrain from reporting ransomware attacks, and then quietly pay the ransom.

 ?? LANE TURNER/GLOBE STAFF/2018 FILE ?? The city hasn’t provided details about the nature of the attack, which affected multiple agencies.
LANE TURNER/GLOBE STAFF/2018 FILE The city hasn’t provided details about the nature of the attack, which affected multiple agencies.

Newspapers in English

Newspapers from United States