Ransom Attack Strikes New Orleans

New Orleans is the latest city to fall victim to a cyberattack, although it appears to have fared better than other American cities. The city declared a state of emergency and a shut-down of most of its computers after detecting suspicious activity, including ransomware and a flurry of phishing emails. 

It's not clear if the ransomware compromised any systems, although Mayor LaToya Cantrell said that there had been no ransom requests or evidence of employees being tricked into handing over login details.

Officials are running many services on pen and paper until it's deemed safe for computers to come back online, although the Orleans Parish Communication District (which handles both 311 and 991 lines) and courts weren't affected. The state of emergency was declared on Friday 13th December following what the city has described as a “cybersecurity incident.”New Orleans officials said after their systems were targeted by phishing and ransomware attacks on Friday.

New Orleans government employees responded swiftly to the attacks. They started to notice suspicious activity around 5am, received more reports about potential issues at about 8am and shut down their systems at 11am.

City employees were ‘immediately alerted to power down computers, unplug devices, and disconnect from WiFi. The declaration, made by Mayor LaToya Cantrell, warned that the emergency was potentially ongoing and that the incident “could result in the endangerment of property” in the city. City officials later confirmed that the attack involved ransomware but that no information has been compromised. NOLA Ready, New Orleans’ emergency preparedness campaign, further noted that many of the city’s computers were shut down “out of an abundance of caution.”

The city also activated its emergency operations center and enlisted the help of “cybersecurity resources” from the Louisiana State Police, the FBI, the state’s National Guard, and the US Secret Service. Louisiana Governor. John Bel Edwards had only just declared a state of emergency late last month after numerous state agencies were similarly targeted by hackers.

The attacks are part of a growing trend across the country in which attackers attempt to cripple major government entities with malware in order to receive a large payoff. Earlier this year other major cities including Baltimore and Greenville, North Carolina, were hit with ransomware as well. In both instances, officials refused to pay a ransom to the hackers in order to have their computers’ data restored.

Officials later confirmed that all of the systems connected to their network were shut down. This led to the closure of some offices, and the city's official website was taken offline, but it was also supposed to isolate any potentially compromised devices.

TomsHardware:      DailyDot:          Endgadget

You Might Also Read:

Hackers Demand Ransom After Stealing Johannesburg's Data:

 

« Microsoft Warning: Avoid Reusing Passwords
Insiders Are Cyber Criminals Favourite Connection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.