2019 Baltimore ransomware attack

Source: Wikipedia, the free encyclopedia.

2019 Baltimore ransomware attack
Date7 May 2019
Time8:54 a.m.[1] (EDT)
LocationBaltimore, Maryland, United States
TypeCyberattack
ThemeRansomware encrypting files with $76,280 demand[1]
Cause
  • Robbinhood Ransomware
OutcomeMultiple municipal services down for months, including databases and applications
City spends $18 million in recovering services

During the Baltimore ransomware attack of May 2019, the

attacked
the previous year.

Background

Baltimore had been targeted by ransomware once prior to the May 2019 attack in 2018, though that attack was smaller in comparison and took down the city's emergency dispatch system for a short duration.[2] On May 2, just days before the first infection, mayor Catherine Pugh resigned amidst a corruption scandal and was ultimately convicted and sentenced to 3 years in prison.[3] She was replaced by Jack Young.

Attack

On May 7, 2019, most of Baltimore's government computer systems were infected with the aggressive ransomware variant RobbinHood. All servers, with the exception of essential services, were taken offline. In a ransom note, hackers demanded 13 bitcoin (roughly $76,280) in exchange for keys to restore access. The note stated that if the demands were not met within four days, the price would increase and within ten days the city would permanently lose all of the data.[4][5][6][7][8][9][10] On May 25, security expert Nicole Perlroth speculated that the stolen NSA exploit EternalBlue was used to infiltrate the city's network vulnerabilities and initiate the attack,[11] though in a memoir published in February 2021, Perlroth recanted her original statement after concluding that the exploit was not in fact responsible.[12]

Baltimore was susceptible to such an attack due to its IT practices, which included decentralized control of its technology budget and a failure to allocate money its information security manager wanted to fund cyberattack insurance.[13] The attack has been compared to a ransomware attack on Atlanta the previous year, and was the second major use of the RobbinHood ransomware on an American city in 2019, as Greenville, North Carolina was also affected in April.[14]

Aftermath

The attack had a negative impact on the real estate market as property transfers could not be completed digitally due to the system being down,[15][16] as the city's card payment system and debt checking application were rendered inaccessible. In addition, city employees were unable to use their email system and resorted to creating Gmail accounts as workaround. Google automatically blocked their accounts at first due to the large number of accounts created in that timespan, though the company later restored the Gmail accounts.[17]

The recovery, initially estimated to take several more weeks on May 20,[13] ultimately lasted until September.[18] Frank Johnson, Baltimore's IT director, was put on unpaid leave following the ransomware attack. Since becoming the city's IT director during the Pugh administration, Johnson had been criticized for not having a written disaster recovery plan and for his handling of the 2019 attack, which was estimated to cost the city $18 million.[18] He was replaced by deputy director Todd Carter, who later became the permanent IT director in February 2020 after Johnson left the role in October.[19]

References

  1. ^ a b "The Curious Case of the Baltimore Ransomware Attack: What You Need to Know". Heimdal Security Blog. September 8, 2020. Retrieved April 17, 2022.
  2. ^ "Baltimore's 911 emergency system hit by cyberattack". NBC News. March 28, 2018.
  3. ^ "Catherine Pugh: Baltimore mayor resigns over book scandal". BBC.com. May 2, 2021.
  4. ^ "A ransomware attack is holding Baltimore's networks hostage". Engadget.
  5. ^ Song, Victoria (May 8, 2019). "Baltimore's Government Held Hostage by Ransomware Attack". Gizmodo.
  6. ^ Gallagher, Sean (May 8, 2019). ""RobbinHood" ransomware takes down Baltimore City government networks". Ars Technica.
  7. ISSN 0362-4331
    . Retrieved May 29, 2019.
  8. ^ Liptak, Andrew (May 25, 2019). "Hackers reportedly used a tool developed by the NSA to attack Baltimore's computer systems". The Verge. Retrieved May 29, 2019.
  9. ^ "Cyber-spies tight-lipped on Baltimore hack". BBC. May 27, 2019. Retrieved May 29, 2019.
  10. ^ "Microsoft sounded alarm two years ago about NSA hacking tool that reportedly hit Baltimore". Baltimore Brew. Retrieved May 29, 2019.
  11. ^ Perlroth, Nicole; Shane, Scott (May 25, 2019). "In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc". The New York Times.
  12. ^ Perlroth, Nicole (February 9, 2021). This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. Bloomsbury.
  13. ^ a b Gallagher, Sean (May 20, 2019). "Baltimore ransomware nightmare could last weeks more, with big consequences". Ars Technica. Retrieved May 21, 2019.
  14. ^ Duncan, Ian; Zhang, Christine (May 17, 2019). "Analysis of ransomware used in Baltimore attack indicates hackers needed 'unfettered access' to city computers". The Baltimore Sun. Retrieved May 28, 2019.
  15. ^ Duncan, Ian. "Home sales are held up; Baltimore ransomware attack cripples systems vital to real estate deals". baltimoresun.com.
  16. ^ Stewart, Emily (May 21, 2019). "Hackers have been holding the city of Baltimore's computers hostage for 2 weeks". Vox. Retrieved May 21, 2019.
  17. ^ Lecher, Colin (May 23, 2019). "Google shut out Baltimore officials using Gmail after ransomware attack". The Verge. Retrieved April 17, 2022.
  18. ^ a b Duncan, Ian (September 10, 2019). "Baltimore IT director who was at helm during ransomware attack and city's recovery is on leave". Baltimore Sun. Retrieved April 17, 2022.
  19. ^ staff, Stephen Babcock / (February 13, 2020). "Todd Carter named director of Baltimore City Office of Information and Technology". Technical.ly. Retrieved April 17, 2022.

External links