Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

2019 Baltimore ransomware attack

From Wikipedia, the free encyclopedia
Massive ransomware attack against the government of the City of Baltimore

This articlemay be excessively based oncontemporary reporting. Please use newersecondary sources; articles on events that lacklasting impact may bemerged,redirected, ordeleted.(November 2025) (Learn how and when to remove this message)
This article needs to beupdated. The reason given is: Missing impact & subsequent legal developements. Please help update this article to reflect recent events or newly available information.(November 2025)
2019 Baltimore ransomware attack
Date7 May 2019
Time8:54 a.m.[1] (EDT)
LocationBaltimore,Maryland,United States
TypeCyberattack
ThemeRansomware encrypting files with $76,280 demand[1]
Cause
  • Robbinhood Ransomware
OutcomeMultiple municipal services down for months, including databases and applications
City spends $18 million in recovering services

During theBaltimore ransomware attack of May 2019, theAmerican city ofBaltimore,Maryland had its servers largely compromised by a variant ofransomware called RobbinHood. Baltimore became the second U.S. city to fall victim to this new variant of ransomware afterGreenville, North Carolina and was the second major US city with a population of over 500,000 people to be hacked by ransomware in two years, afterAtlanta wasattacked the previous year.

Background

[edit]

Baltimore had been targeted by ransomware once prior to the May 2019 attack in 2018, though that attack was smaller in comparison and took down the city's emergency dispatch system for a short duration.[2] On May 2, just days before the first infection, mayorCatherine Pugh resigned amidst a corruption scandal and was ultimately convicted and sentenced to 3 years in prison.[3] She was replaced byJack Young.

Attack

[edit]

On May 7, 2019, most of Baltimore's government computer systems were infected with the aggressiveransomware variant RobbinHood. All servers, with the exception of essential services, were taken offline. In a ransom note, hackers demanded 13 bitcoin (roughly $76,280) in exchange for keys to restore access. The note stated that if the demands were not met within four days, the price would increase and within ten days the city would permanently lose all of the data.[4][5][6][7][8][9][10] On May 25, security expert Nicole Perlroth speculated that the stolenNSA exploitEternalBlue was used to infiltrate the city's network vulnerabilities and initiate the attack,[11] though in a memoir published in February 2021, Perlroth recanted her original statement after concluding that the exploit was not in fact responsible.[12]

Baltimore was susceptible to such an attack due to its IT practices, which included decentralized control of its technology budget and a failure to allocate money itsinformation security manager wanted to fund cyberattack insurance.[13] The attack has been compared to aransomware attack onAtlanta the previous year, and was the second major use of the RobbinHood ransomware on an American city in 2019, asGreenville, North Carolina was also affected in April.[14]

Aftermath

[edit]

The attack had a negative impact on the real estate market as property transfers could not be completed digitally due to the system being down,[15][16] as the city's card payment system and debt checking application were rendered inaccessible. In addition, city employees were unable to use their email system and resorted to creatingGmail accounts as workaround. Google automatically blocked their accounts due to the large number of accounts created in that timespan, though the company later restored the Gmail accounts.[17]

The recovery, initially estimated to take several more weeks on May 20,[13] ultimately lasted until September.[18] Frank Johnson, Baltimore's IT director, was put on unpaid leave following the ransomware attack. Since becoming the city's IT director during the Pugh administration, Johnson had been criticized for not having a written disaster recovery plan and for his handling of the 2019 attack, which was estimated to cost the city $18 million.[18] He was replaced by deputy director Todd Carter, who later became the permanent IT director in February 2020 after Johnson left the role in October.[19]

References

[edit]
  1. ^ab"The Curious Case of the Baltimore Ransomware Attack: What You Need to Know".Heimdal Security Blog. September 8, 2020. RetrievedApril 17, 2022.
  2. ^"Baltimore's 911 emergency system hit by cyberattack".NBC News. March 28, 2018.
  3. ^"Catherine Pugh: Baltimore mayor resigns over book scandal".BBC.com. May 2, 2021.
  4. ^"A ransomware attack is holding Baltimore's networks hostage".Engadget. May 8, 2019.
  5. ^Song, Victoria (May 8, 2019)."Baltimore's Government Held Hostage by Ransomware Attack".Gizmodo.
  6. ^Gallagher, Sean (May 8, 2019).""RobbinHood" ransomware takes down Baltimore City government networks".Ars Technica.
  7. ^Chokshi, Niraj (May 22, 2019)."Hackers Are Holding Baltimore Hostage: How They Struck and What's Next".The New York Times.ISSN 0362-4331. RetrievedMay 29, 2019.
  8. ^Liptak, Andrew (May 25, 2019)."Hackers reportedly used a tool developed by the NSA to attack Baltimore's computer systems".The Verge. RetrievedMay 29, 2019.
  9. ^"Cyber-spies tight-lipped on Baltimore hack".BBC. May 27, 2019. RetrievedMay 29, 2019.
  10. ^"Microsoft sounded alarm two years ago about NSA hacking tool that reportedly hit Baltimore".Baltimore Brew. RetrievedMay 29, 2019.
  11. ^Perlroth, Nicole; Shane, Scott (May 25, 2019)."In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc".The New York Times.
  12. ^Perlroth, Nicole (February 9, 2021).This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. Bloomsbury.
  13. ^abGallagher, Sean (May 20, 2019)."Baltimore ransomware nightmare could last weeks more, with big consequences".Ars Technica. RetrievedMay 21, 2019.
  14. ^Duncan, Ian; Zhang, Christine (May 17, 2019)."Analysis of ransomware used in Baltimore attack indicates hackers needed 'unfettered access' to city computers".The Baltimore Sun. Archived fromthe original on May 28, 2019. RetrievedMay 28, 2019.
  15. ^Duncan, Ian."Home sales are held up; Baltimore ransomware attack cripples systems vital to real estate deals".baltimoresun.com.
  16. ^Stewart, Emily (May 21, 2019)."Hackers have been holding the city of Baltimore's computers hostage for 2 weeks".Vox. RetrievedMay 21, 2019.
  17. ^Lecher, Colin (May 23, 2019)."Google shut out Baltimore officials using Gmail after ransomware attack".The Verge. RetrievedApril 17, 2022.
  18. ^abDuncan, Ian (September 10, 2019)."Baltimore IT director who was at helm during ransomware attack and city's recovery is on leave".Baltimore Sun. RetrievedApril 17, 2022.
  19. ^staff, Stephen Babcock / (February 13, 2020)."Todd Carter named director of Baltimore City Office of Information and Technology".Technical.ly. RetrievedApril 17, 2022.

External links

[edit]
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=2019_Baltimore_ransomware_attack&oldid=1323204217"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp