The Denver Post

Rolling along.

CDOT is back to 80 percent functional­ity after a ransomware attack.

- By Tamara Chuang

Six weeks after ransomware forced Colorado Department of Transporta­tion’s backend operations offline, the agency is back to 80 percent functional­ity — at an estimated cost of up to $1.5 million, according to the state.

Colorado officials said they never caved to the attacker’s demands to pay bitcoin in order to recover encrypted computer files. But clearing each computer took time and additional resources — including the Colorado National Guard — to investigat­e, contain and recover.

“We were able to recover from the SamSam attack relatively quickly due to our ro- bust backup plan and our segmentati­on strategies,” Brandi Simmons, a spokespers­on for Colorado’s Office of Informatio­n Technology, said in an email. “We are still capturing costs associated with the incident, but our estimate is between $1M and $1.5M.”

What started with a core team of 25 IT employees, Simmons said, ballooned to 150 “during the peak of the incident” — March 2-9. She added that others included CDOT, the FBI, state emergency operations and private companies. The milliondol­lar estimate includes only overtime pay and other unexpected costs. The state’s new backup system prevented data loss, but personal data on employees’ computers may not be recovered.

The cyberattac­k started around Feb. 21 when a variant of the SamSam ransomware hijacked CDOT computer files. CDOT shut down more than 2,000 computers. Its employees had to use personal devices to check email. The state did not share the value of bitcoin that attackers demanded.

Elsewhere, SamSam attacked the city of Atlanta, debilitati­ng computer systems that residents used to pay traffic tickets, report potholes and access Wi-Fi at the airport. The city hasn’t issued a public update since March 30, and a city spokesman said Thursday there is nothing new to share.

Attackers demanded $51,000 worth of bitcoin. Asked whether Atlanta has paid the ransom, spokeswoma­n Anne Torres said: “Unfortunat­ely, we cannot comment further on the ransom.”

The rise of ransomware attacks has caused some to wonder whether it’s worth paying to avoid business outages — Hancock Health in Indiana paid $55,000 to get its files back. Dan Likarish, a computer professor at Den- ver’s Regis University, said there’s still a good reason not to do it.

“If you pay the ransom, you’re supporting the criminal,” said Likarish, adding there’s also no guarantee the attacker will return computer files intact. “The weasel answer? It’s a risk mitigation. That’s the way we label ourselves. We talk to upper management, present the business case that we’ve identified the problem, let’s just pay. That’s what a lot of hospitals have done. It’s not unusual to pay for the key and go about your business. It depends on how sophistica­ted your security staff is. If you don’t have it, what do you do? You’ve got to keep things running.”

Likarish said he was able to help with efforts to contain the CDOT attack and was in awe at how the state’s IT office swooped in and took command. While IT staff had already updated its own computer operations, not every state agency is on the same system, including CDOT.

“People are listening to them now,” Likarish said.

Newspapers in English

Newspapers from United States