Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Crime Government Security

When Ransomware Gets Paid By A City's Insurance Policies (news18.com) 131

Remember when the small town of Lake City, Florida paid $460,000 for a ransomware's decryption key?

As they slowly recover 100 years of encrypted municipal records, the New York Times looks at the lessons learned, arguing that cyberattackers have simply found a juicy target: small governments with weak computer protections -- and strong insurance policies. The city had backup files for all its data, but they were on the same network -- and also inaccessible... The city's insurer, the Florida League of Cities, hired a consultant to handle the negotiations with the hackers via the email addresses that had been posted on the city server. The initial demands were refused outright, and city technicians raced to find a workaround. "We tried a lot of different solutions," said Joseph Helfenberger, the city manager. None of them worked. "We were at the end of the day faced with either re-creating the data from scratch, or paying the ransom," he said.

The insurer's negotiator settled on a payment of 42 Bitcoins, or about $460,000, Helfenberger said, of which the city would pay a $10,000 deductible. After the payment, the hackers provided a decryption key, and recovery efforts began in earnest.

As it turned out, recovery would not be simple. Even with the decryption key, each terabyte has taken about 12 hours to recover. Much of the city's data, nearly a month after the onset of the attack, has still not been unlocked... In Lake City, the information technology director, blamed for both failing to secure the network and taking too long to recover the data, wound up losing his job.

Mark A. Orlando, the chief technology officer for Raytheon Intelligence Information and Services, tells the Times it's unrealistic to expect cities to never pay the ransom. "Anyone who said that has never been in charge of a municipality that has half their services down and no choice."

But does that create an ever-widening problem? The FBI knows of at least 1,500 reported ransomware incidents last year, according to the article, although the Illinois computer programmer offering free decryption help at ID Ransomware says he's receiving 1,500 requests for assistance every day.
This discussion has been archived. No new comments can be posted.

When Ransomware Gets Paid By A City's Insurance Policies

Comments Filter:
  • Lessons learned? (Score:5, Insightful)

    by Ol Olsoc ( 1175323 ) on Sunday July 07, 2019 @04:56PM (#58887234)
    No, there were no lessons learned.

    And now that the hackers know that insurance will pay for their hacks, we have a whole new growth industry.

    I wonder who the first billionhackaire will be.

    • by garcia ( 6573 ) on Sunday July 07, 2019 @05:00PM (#58887254)

      I really feel for the IT Manager who lost his gig. I guarantee, once the data are finally unencrypted, if someone were to research his requests for funding various lacking parts of his budget, you'd find he was repeatedly denied and ended up doing the best he could within the limits set by the politicians.

      This is a common issue within any organization, let alone the public sector, where those who know nothing about IT are put in charge of the purse strings and see it only as a cost center, meant to be limited as much as humanly possible.

      • I really feel for the IT Manager who lost his gig. I guarantee, once the data are finally unencrypted, if someone were to research his requests for funding various lacking parts of his budget, you'd find he was repeatedly denied and ended up doing the best he could within the limits set by the politicians.

        And don't forget the bean counters, who want the IT department's budget for themselves. My experience is that the bean counters metastasize, eventually demanding to hire 6 figure accountants to keep track of things like the 600 dollar pencil budget. You don't get to make smart financial moves like that with having IT people making money.... or existing.

      • I really feel for the IT Manager who lost his gig. I guarantee, once the data are finally unencrypted, if someone were to research his requests for funding various lacking parts of his budget, you'd find he was repeatedly denied and ended up doing the best he could within the limits set by the politicians.

        While that might be true, it could also be totally not what happened at all. I can tell from this kind of post you've never worked for any government in the USA. I did early in my career. I'm long gone from that job, but I really learned a lot. Here's a rough guide to how things were and probably still are.

        1) Federal government (where I worked) - There are really smart IT people there and some very good managers. People that take these jobs usually do for job security as pay is always going to

      • You are being too kind. If he had any evidence of requests and denies, he would have been able to fight to keep his job. Municipal emails are kept for 7 years so there should be "some" record of requests, even if they were denied.

        You are correct though. The data owners are very poor at making data security decisions.

    • I am seriously wondering how much the rise of bitcoin can be attributed to the market for cities (and companies) needing to buy bitcoin to pay off ransoms!

      • I am seriously wondering how much the rise of bitcoin can be attributed to the market for cities (and companies) needing to buy bitcoin to pay off ransoms!

        Good question. Kinda scary as well, because it's a positive feedback loop.

      • I am seriously wondering how much the rise of bitcoin can be attributed to the market for cities (and companies) needing to buy bitcoin to pay off ransoms!

        It shouldn't have much effect if the crooks are cashing out. The price will only stay high if they are holding them.

        Cities have to go public. Companies can keep it under the rug. So the problem may be bigger than it appears.

        At least the hackers are driving incentives for better security.

    • by ls671 ( 1122017 )

      I wonder how long our three letter agencies, with all their resources, would have taken to crack the key? I guess it depends on the key size. If ever realistically feasible, why wouldn't they offer such a service to tax payers?

      • I wonder how long our three letter agencies, with all their resources, would have taken to crack the key?

        Many times the age of the universe.

        If ever realistically feasible, why wouldn't they offer such a service to tax payers?

        It is completely infeasible.

    • Why on earth do you think such extortionists just learned this?

      There's a reason they do this: some targets pay. Enough targets pay enough money to make it worthwhile to the criminals.

      • Why on earth do you think such extortionists just learned this?

        You are way overparsing my sentence. Feel free to re-write it, I suppose. It was merely a way to segue to the third sentence

        My point was in the first sentence. The cities or businesses won't learn anything.

        There's a reason they do this: some targets pay. Enough targets pay enough money to make it worthwhile to the criminals.

        Right, which was the takeaway

    • And now that the hackers know that insurance will pay for their hacks, we have a whole new growth industry.

      I'm guessing that the ransomers are in cahoots with someone who works for the city, and gets the city employee gets a cut of the ransom for intentionally spreading the ransomware.

      But to hire some private detectives, to check out employees, would probably cost more than paying the ransom.

      • And now that the hackers know that insurance will pay for their hacks, we have a whole new growth industry.

        I'm guessing that the ransomers are in cahoots with someone who works for the city, and gets the city employee gets a cut of the ransom for intentionally spreading the ransomware.

        Highly possible. I think that local governments being only too happy to pay off people isn't going to end well when their insurance rates skyrocket.

        But to hire some private detectives, to check out employees, would probably cost more than paying the ransom.

        Kinda a "let's keep this as quiet as possible" instinct as well.

        So their insurance gets to pay out almost half a million dollars. To criminals, as ransom.

        Almost a dead lock that the insurance company will hire some forensic investigators. And I'd be really curious what the city's next insurance bill will be.

        And if they do insure the city, there's anoth

        • Almost a dead lock that the insurance company will hire some forensic investigators.

          . . . now to test how really "Ol" you are . . . did you ever watch Banacek [wikipedia.org] when you were younger than "Ol" . . . ?

          This case would have been perfect for him!

          • Almost a dead lock that the insurance company will hire some forensic investigators.

            . . . now to test how really "Ol" you are . . . did you ever watch Banacek [wikipedia.org] when you were younger than "Ol" . . . ?

            No- I never saw that show. Sounds like it might have been amusing, what with all of Peppard's strange sayings.

            I do watch "Mike Tyson Mysteries" on occasion, I'll bet he could straighten them out.

    • by ebvwfbw ( 864834 )

      I think we already know that. It's Bill Gates.
      In his day he was a hacker of the first order. A genius.

  • by fred911 ( 83970 ) on Sunday July 07, 2019 @04:59PM (#58887248) Journal

    'Even with the decryption key, each terabyte has taken about 12 hours to recover.'

      And who was blind enough not to see resources needed to encrypt their data? How could someone be so blind not to notice during the attack?

    • To be fair, the hacker would have optimized the encryption process to proceed as fast as possible to encrypt as many files as possible before it was detected and stopped.

      But, it's likely the hacker either did not provide a decryption tool at all, or provided only a bare minimum one, making the decryption process much slower. Why bother, since at that point the hacker has your money and no longer cares.

      • Why bother, since at that point the hacker has your money and no longer cares.

        They care because they want to maintain their reputation for good customer service. Once you pay, you are treated well. This means more people will pay in the future. They might even get a few repeat customers.

    • by AmiMoJo ( 196126 )

      My guess is that different client PCs had different keys, so they have to figure out which key was used to encrypt each file which makes the decryption process a lot slower than the encryption process.

      Also from TFA it sounds like it happened at night, so managed to hit a large amount of data before anyone noticed. Apparently as well as having no backups they didn't have any intrusion detection either.

  • Only one question is asked. Which one is cheaper?

    • Insurance premiums are sure to go up when more hackers discover this low hanging fruit. And the insurance does not cover the lost time of employees, or other damages. If it can be shown that the city's IT security is crap by reasonable standards, they could (and should) be held accountable for the results of any outage: bills not being paid, building permits not being issued, trash not picked up, and so on. It all adds up to quite a sum.

      Also consider: the next group of hackers might not be after Bitco
      • Yes, all those things are true, but the bean counters will take the path of least resistance. They decide how well the IT department is managed.

  • They will insist on a best-practices backup mechanism and will pay reasonable costs associated with downtime and restoration from those backups, but they will explicitly declare the entire policy void if any payment is made as a ransom or to any "recovery company" that isn't KNOWN to never pay ransoms.

  • Backups (Score:1, Insightful)

    by kos kos ( 5029961 )

    So they don't have offsite backups, no rotating backups or maybe just mirrored everything somewhere.
    Even no archives - old files could be manipulated as well.
    This is total incompetence, you can do DIY backups with second hand PC and free software like home system, storage is dirt cheap nowadays.

    Microsoft mono culture is also to blame- single system types, problems spread like a fire everywhere.

    • So they don't have offsite backups, no rotating backups or maybe just mirrored everything somewhere.
      Even no archives - old files could be manipulated as well.
      This is total incompetence, you can do DIY backups with second hand PC and free software like home system, storage is dirt cheap nowadays.

      Microsoft mono culture is also to blame- single system types, problems spread like a fire everywhere.

      Right. Because a Linux mono culture, with no backups, or backups on the same network, would be so much better.

      Dumbass.

      • Re: (Score:3, Insightful)

        Comment removed based on user account deletion
      • So "MS_certified_double_clicker" , who said Linux, and how the hackers will encrypt a filesystem which is kept on different file system separated by say rsync of FTP, not accessible to Windows workstations if you do _version_ backups or snapshots? Even Macs have version backups with hard links.
        But you don't know about these because MS schools don't teach them.

    • Yeah, monoculture = a good chunk of the problem. A snapshotting file server could have mitigated a good chunk of this. Good luck getting one of those from Microsoft though :-(

  • by joe_frisch ( 1366229 ) on Sunday July 07, 2019 @06:25PM (#58887544)

    We need strong laws against EVER paying ransom, combined with technical and financial assistance to help cities that are attacked.

    This market needs to be crushed ASAP or the cost of doing business will go way up for all governments. Its easy to say that they "should" have had better security, but that security requires hiring talented people and that cost comes out of taxes.

    I'm also worried that these attacks are a proving ground for large scale cyber attacks by foreign governments.

  • by grep -v '.*' * ( 780312 ) on Sunday July 07, 2019 @06:41PM (#58887614)
    From: Your Friendly Neighborhood Hacker

    Hi! Thanks for your recent transaction, I'm so glad we could be of help to you. I hear you're having a time-crunch problem with the key we provided you. We could easily provide you with a shorter key that would run much faster.

    All we'd need is you to forward THIS email to at least one of your friends. But don't worry, even after opening this email, _your_ systems are still safe -- after all, what are friends for?

    P.S. - do we need to pay state taxes on our recent transaction? No, I didn't think so.
  • "it's unrealistic to expect cities to never pay the ransom"

    Why would you ever have to pay a ransom if you had any kind of even half-robust backup policy? You might have some down time while you recover your data from a backup after an attack, but if you paid the ransom, you'd be having the same sort of downtime just decrypting your data anyways

    • Honest question: what does a half-robust backup policy look like to you? Half-robust to me sounds a lot like using Veeam to snapshot VMs to a NAS that is isolated from the workstation network, but obviously network accessible to all the servers, and then replicating the backups weekly to secondary storage. Robust would be getting it offsite.

      That process can still be corrupted due to the significant storage over-provisioning required to handle every file changing. If you have 100TB, and 2TB changes per day

      • by mark-t ( 151149 )
        A half-robust backup policy would be one that simply maintains a mirror of your data. You create an initial mirror of your data, and then beyond that only store diffs of the data during the regular backup process. At regular intervals separate from the backup process, you merge your diffs back into your mirror so that you can again use the storage where you were storing the diffs. This latter step can be done offline with respect to what the company workstations do, and ideally on a system running a diff
        • I would call that about 25% of a solution, and the issue is still having sufficient disk capacity and monitoring on your backup system to detect a problem in a day or two rather than two weeks later.

          We used to use the Synology BTRFS snapshots on our backup system, but it really wasn’t as bullet proof as I would hope, but there is at last a redundant archive of (file) data. But even with off-site storage you usually are going to have a cost-controlled data retention policy that could do you in.

          But havi

          • by mark-t ( 151149 )

            Having sufficient disk capacity should not be a problem... storage is cheap. You need twice the storage just to maintain the mirror, plus whatever additional space is required to keep track of diffs on the data files from day to day.

            Especially when you compare it to the costs of not keeping a backup when things go south.

            The malware dormancy can't be too long, or else it runs a risk of being detected before it can execute its primary payload, so even a very mundane scanning policy of checking for malwa

  • by JeffOwl ( 2858633 ) on Sunday July 07, 2019 @07:36PM (#58887768)
    I find it odd that the CTO of an organization like Raytheon IIS says it isn't realistic to expect to not pay terrorists, I have to wonder what sorts of solutions and services they provide if he thinks that is normal. I would think that a major defense and technology company would know how to secure a network and would know how to manage backups. Is it possible the CTO not only doesn't know how to do these things, but doesn't even know that it is possible? That he completely thinks paying ransom is just part of the cost of doing business?
  • The observed ratio of encryption to decryption speed is about 14:1. https://crypto.stackexchange.c... [stackexchange.com]

    This suggests if it takes 12 hours to decrypt a TByte, and they've been going at it a month (let's call that 30 days), then at the same ratio, assuming asymmetric cryptography using RSA e/d it means it took over 30 hours to encrypt the data in the first place. Assuming the "networked backups" they had contained the same data, but possibly taking up less space depending on file contents, I'm going to make u

    • The large difference between encryption and decryption is for public-key encryption such as RSA. Normally, you only use RSA to encrypt a key for a fast, symmetric cipher such as AES. At least, that's what happens with SSL, SSH, and various legit full-disk encryption schemes. Not sure what this particular ransomware does.

      Note that 1 TB in 12 hours is 23 MB/s, which requires 46 MB/s bandwidth at the disk if the decryption is to be done in-place. Doesn't seem unrealistic if there is a network in between and pe

  • Not a backup... (Score:4, Insightful)

    by ChoGGi ( 522069 ) <slashdot@cho[ ].org ['ggi' in gap]> on Monday July 08, 2019 @02:47AM (#58888850) Homepage

    "The city had backup files for all its data, but they were on the same network"
    If it's online (spinning rust or not), then it isn't a backup, it's a copy.

  • Seriously? People are expected to believe that?

    • by ebvwfbw ( 864834 )

      What? That's too small to believe?
      I bet a number of /. people have a petabyte spinning in their basement and that's just for their porn collection.

  • by johnsie ( 1158363 ) on Monday July 08, 2019 @08:14AM (#58889446)
    Is it legal to give money to criminals?
  • Now they paid criminals,
    they will pay for decryption labour and hardware,
    they will pay for cleanup the malware,
    will pay for consultants to design proper backup and
    pay for software and hardware for that implementation.
    They will pay for downtime, delayed payments, contracts, maybe salaries, projects, penalties...
    Eventually will pay for some litigation or class action from victims of the leaked data.
    Insurance from now on will go up as well.

    I don't know how they gonna trust that "recovered" data.

God doesn't play dice. -- Albert Einstein

Working...