200px wide
1300 378 676
+61 7 3120 0640
[email protected]
CONTACT US
CALL US
CONTACT US
  • Corporate Services
    • IT Support Services
      • Managed IT Services Brisbane
      • IT Consulting
      • Outsource Your IT Department
      • IT Audit & Review
      • Project Services
      • Virtual CIO Services
      • Corporate Apple Services
      • Mobile Device Management
      • IT Support Sydney
      • IT Support Melbourne
    • IT Cyber Security Services
      • Managed Security Services
      • ISO 27001 Services & Consulting
      • IT Cyber Security Audits & Assessments
      • Information Security Management
      • RFFR & DESE ISMS Services
      • The Essential Eight Framework
    • Managed Cloud Services
      • Private Cloud
      • Hybrid Cloud
      • Cloud Consulting
      • Microsoft SharePoint
      • Microsoft Office 365
      • Power BI
      • Amazon Web Services
      • Microsoft Azure
      • Colocation & Server Hosting
      • Cloud Backups
      • Microsoft Teams
    • Managed Network Services
      • Business Internet
      • Power Apps Development & Consulting
      • Managed Wi-Fi
      • Network Security
      • Private WAN
    • Business Telephony
      • Hosted PBX
      • On-Premise PBX
      • Microsoft Teams Calling
      • Call Centre Services
    • Hardware and Software Procurement
    • Supported Industries
      • Accountant & Finance IT Support Services
      • Civil & Construction IT Services
      • Creative Industries IT Support Services
      • Law Firm & Legal IT Support Services
      • Not For Profit IT Support Services
      • Healthcare IT Support Services
      • Real Estate IT Support Services
      • Manufacturing IT Support Services
  • Education Services
    • Education Device Procurement & Technology in Schools
    • IT Support for Education Services
    • Mobile Device Management for Schools
    • Professional Development for Teachers
    • Apple Solution Expert
  • Case Studies
  • News
  • About Us
    • Why Choose Us?
    • Client Testimonials
    • Partners and Awards
    • Careers
  • Contact Us

What we can learn from the Baltimore services hack

May 27, 2019 By eStormAdmin

what we can learn from the baltimore service hacks

The Situation

On May 7th 2019, hackers digitally seized roughly 10,000 Baltimore government computers and demanded payment of 13 Bitcoins ($148,151 AUD) to free them back up. Using a ransomsware called RobbinHood, hackers have made it impossible to access servers without a digital key that only they possess.

What is a ransomware attack?
A ransomware attack is where hackers deploy malicious software to block access and take control over computer systems—in this case Baltimore city services and processes.

For three weeks city employees have been locked out of their accounts, while citizens have been unable to access vital services such as sites to pay water bills, property taxes and parking tickets.

A leaked N.S.A. tool, EternalBlue, was also used to exploit a vulnerability in unpatched software that allowed hackers to spread their malware faster and farther than they otherwise would have been able to.

This comes just 15 months after the attack on Baltimore’s 911 system, where hackers were able to disable the city’s 911 system for a day.

The Baltimore hackers ransom note demanded payment of 3 bitcoins per system unlocked, which totalled 13 bitcoins to unlock all seized systems. The note also threatened to increase the ransom if it were not paid within four days, as well as stating that information would be lost forever if it wasn’t paid within 10 days.

Government email systems and payment platforms remain offline, as well as affecting Baltimore’s property market as officials aren’t able to access systems needed to complete real estate sales.

Over 20 municipalities in the US have been hit by cyberattacks in 2019 alone, with an attack on Atlanta costing upwards of $17 million to fix.

 

The Takeaway

It’s important to note that ransomware attacks aren’t new. In 2017, a ransomware called WannaCry target tens of thousands of computers using Microsoft Windows operating systems in more than 100 countries. This attack included corporations in the UK, France, Russia, Israel and Ukraine as well as attacks on hospitals.

Ransomware schemes have become more effective since the invention of Bitcoin in 2009. Conventional payment networks make it difficult to accept payments without revealing your identity. Some ransomware schemes are so elaborate that customer service agents are hired to help victims obtain bitcoin and pay their ransom.

Since WannaCry, many organisations and sectors have made improvements to their security and security practices.

eStorm recommends taking stock of your networks to understand your exposure, assess the potential risks and patch vulnerable areas. We also recommend a multi-layered approach to security that includes:

  • 24×7 network monitoring
  • Strong authentication techniques that extend beyond usernames and passwords, like 2FA / multi-factor authentication. Learn more about what two-factor authentication is and why your business needs it
  • Frequent data backups to ensure data safety
  • Strong passwords and password management. You can learn about why you need a password manager and how to create strong passwords.
  • Strong cyber security policies that promote best practice and a culture of diligence
  • User training, particularly in regards to phishing attacks. Learn everything you need to know about how to protect yourself against email attacks.
  • Always updating your software. If you’re still using Windows 7, you can learn more about why you desperately need to upgrade from Windows 7.

 

If you have any questions about your business security, feel free to contact us at any time on (07) 3120 0640, email [email protected] or use the live-chat feature on our website between the hours of 9am and 5pm Monday to Friday.

Filed Under: News Tagged With: email scam, phishing

How To Achieve ISO 27001 Certification

11 Types of Phishing Attacks

Mastering Microsoft Ep 8: How to Externally Share Files in SharePoint

Tags

amazon Apple apps brisbane lions business network security cloud computing cloud management cloud migration cybercrime cybersecurity education email scam emerging technology facebook Google HomePod hybrid cloud management IT Events IT managed service provider it outsourcing IT services it strategy Microsoft microsoft office 365 Mircosoft password security phishing Phone Solutions remax australia remote work two-factor authentication virtual desktop infrastructure windows workplace productivity

Latest News

  • How To Achieve ISO 27001 Certification
  • 11 Types of Phishing Attacks
  • Mastering Microsoft Ep 8: How to Externally Share Files in SharePoint
  • What is cyber insurance and do you need it?
  • Phishing Attack Prevention: How You Can Avoid Becoming the Catch of the Day

eStorm Australia Head Office

Level 1, 16 Old Cleveland Road
Stones Corner, QLD 4120
P: 1300 378 676
P: +61 7 3120 0640
E: [email protected]

Service Centre Springfield

1/145 Sinnathamby Boulevard,
Springfield Central, QLD, 4300
P: (07) 3180 4228
E: [email protected]

Service Centre Toowoomba

11/12 Prescott St,
Toowoomba City, QLD, 4350
P: (07) 4596 6268
E: [email protected]

Interstate Contact

Sydney
P: (02) 9188 5148
Melbourne
P: (03) 9088 6431

 

Client Tools

Pay Invoice
Remote Support
Additional Support
Create a Ticket

NDIS provider

QAssure - 10805 - eStorm
GITC: Q-4675
DET QLD preferred
DoE QLD preferred Supplier

Find us on LinkedIn Follow us on Facebook Find us on YouTube

© 2022 eStorm Australia. All Rights Reserved.

Terms of Service | Refund Policy | Privacy Policy | Social Responsibility Policy