Alaska Dusts Off Its Typewriters

Government workers in a borough of Alaska have turned to typewriters to do their jobs, after ransomware infected their computer systems.

A spokeswoman for Matanuska-Susitna said the malware had encrypted its email server, internal systems and disaster recovery servers. She said staff had "resourcefully" dusted off typewriters and were writing receipts by hand.

The borough is in the process of rebuilding its systems.

Ransomware is malicious computer software that encrypts or scrambles data and demands a fee for it to be restored.

The borough said "nearly all" of its 500 desktop computers running Windows 7 and 10 had been infected and 120 computer servers were also affected.

According to technology news site Bleeping Computer, the ransomware attack spread on 24 July. However, the borough thinks it may have been dormant in its systems since May.

As well as infecting the borough's desktop computers and email server, it had also attacked its telephone system and door entry card system, said IT director Eric Wyatt.

He said anti-virus software had detected one component of the attack on 17 July but had missed other elements of the malware, which allowed it to spread.

The ransomware also infected and encrypted some of the borough's back-up data, although "some portion" had been saved.

"Though it initially appeared that our data was a complete loss, we have recently recovered data from the shared drives," said Mr Wyatt.

"Email does appear to be completely unrecoverable."

Some systems have been restored with "year-old data" and the borough is in the process of rebuilding each affected machine. "There is optimism for the recovery of additional data," said Mr Wyatt in a report.

"Encrypted data will be stored for months or years in hopes that the FBI will recover the decryption keys."

BBC

You Might Also Read: 

US City Of Atlanta Suffers An Attack:

« Dixons Carphone Data Breach Hits 10m Users
Digital Resilience Is A Step Up From Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Viakoo

Viakoo

Viakoo is an Enterprise IoT Applications Management company providing performance, security, and compliance. Viakoo enables you to be proactive in maintaining cyber hygiene and protecting your network

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Obscure Technologies

Obscure Technologies

Obscure Technologies is a firm of experts, specialised in brokering the best security solutions to market.

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

Increase Your Skills (IYS)

Increase Your Skills (IYS)

Armed and ready: raise awareness of cyberattacks in your company with the Full-Service Awareness Platform from IYS – fast and effective. We help you develop a robust, sustainable security strategy.