Birmingham Mayor Randall Woodfin’s office has officially acknowledged that the city’s computer systems fell victim to a cyberattack almost a month ago. The incident came to light in a memo sent to city employees, obtained by AL.com, confirming that hackers gained unauthorised access to the city’s networks.
Timeline of Events
The disruption was first noticed on March 6, prompting an immediate investigation into the unexpected activity that disrupted various computer systems. City officials are actively working to restore full functionality to the affected systems, although the investigation into the breach is ongoing. Rick Journey, the mayor’s communications director, emphasised the city’s commitment to ensuring the security of its network.
Impact on Operations
The cyberattack has caused significant disruptions, with employees resorting to pen and paper for tasks like timekeeping due to the network outage. Despite these challenges, critical public safety and public works services have remained unaffected. However, law enforcement agencies have faced limitations, including difficulties in accessing databases to check vehicle theft reports and outstanding warrants.
What Does It Mean for Employees?
Addressing concerns about payroll and employee compensation, city officials reassured employees that payroll processing will continue as scheduled. Payroll coordinators are available to address any individual questions or concerns regarding payment accuracy. Despite the disruption, city authorities are committed to ensuring that employees receive their salaries on time.
Response and Investigation
Following the breach, the city has enlisted the support of third-party specialists to investigate the extent of the disruption and its impact on operations. While specific details about the cyberattack remain limited due to the ongoing investigation, officials have stressed that the 911 emergency system remains fully functional.
A Potential Ransomware Attack
Multiple government sources have indicated that the cyberattack is likely a ransomware attack, wherein hackers demand payment in exchange for restoring access to the city’s data. Despite the severity of the incident, city officials have reiterated that emergency services have not been compromised.
This incident dials on the mounting challenges municipalities face in safeguarding against cybersecurity breaches. As authorities delve deeper into the matter, concerted efforts are underway to bolster cybersecurity measures, emphasising the critical need to strengthen defences against potential future threats.
The shift to remote work has been transformative for enterprises, bringing newfound flexibility but also a myriad of security challenges. Among the rising concerns, a prominent fear looms large - the potential for end-users to inadvertently become the cause of the next major breach.
What is Syncro?
Syncro is a highly integrated and easy-to-use remote access platform that allows Remote monitoring and management (RMM) and automation of tasks, streamlining users’ operations to get established, run, and grow their managed service provider (MSP) operations.
Syncro’s unified and customizable solutions allow users to conduct business operations, that could be streamlined with its integrated invoicing, billing, contract management, automated remediation, and much more so that one can focus on generating revenue. Additionally, their tool offers users a 21-day trial.
Prior to its most recent campaign, which researchers from Deep Instinct estimate started sometime in September, MuddyWater had employed a separate legitimate remote administration tool, named RemoteUtilities.
According to the latest report by Deep Instinct, which mentions details of the MuddyWater attacks that recently took place on an Egyptian data hosting company, as well as the Israeli insurance and hospitality industries.
"MuddyWater is not the only actor abusing Syncro […] It has also been observed recently in BatLoader and Luna Moth campaigns," the Deep Instinct team stated in the report.
Moreover, MuddyWater has now joined BatLoader and Luna Moth threat groups, which have also been using Syncro in order to take control of devices.
Security teams are cautioned by Deep Instinct which provided MuddyWater's indicators of compromise, to keep an eye out for unusual remote desktop apps inside their organisations.
The local real estate industry has been severely hampered by a breach, that caused the Suffolk County government servers to shut down for more than 20 days.
Since September 8, the cyberattack has prevented access to
county websites, servers, and databases, making it impossible to check property
titles or submit records. Consequently, obstructing most of the transactions
from going through.
According to Sheri Winter Parker, a Corcoran broker, confusion
over the situation and when it might end means “my phone is ringing with
nonstop texts and emails.”
According to The Suffolk Times, hacking group BlackCat claims
credit for the Suffolk cyberattacks and demands a ransom payment in order to
restore access to government servers. The BlackCat threat actors state that
they have access to around four terabytes of data including individual
residents, while much of the data is from the clerk.county.suf domain.
Although County officials have resorted to restoring some
records in person, online databases remain inaccessible. Furthermore, County email
addresses are offline too, resulting in a massive disruption for brokers,
lawyers, and title companies, along with buyers and sellers.
According to Michael
Gulotta, founding partner of Gulotta & Gulotta, a Ronkokoma-based law firm,
“Real estate transactions are on hold[...]About 45 percent of our business is
real estate. This has impacted our staff, clients, and affiliates in a major
way.”
Computer experts, on the
other hand, are raising concerns that Palo Alto, the cybersecurity company providing
the front-line firewall of Suffolk’s defense against cyberattacks, is serving
as the main forensic auditor to investigate what happened when the county’s
system was hacked.
Palo Alto and RedLand
(another cybersecurity company) are both responsible to safeguard Suffolk’s
computer system since 2019. Besides, both companies were awarded new contracts in
order to manage the county’s response to the attacks, analyse the breach and help
resolve the issue.
Suffolk is yet to announce
how exactly the threat actors breached its systems. However, the company has
not blamed RedLand or Palo Alto for the attacks.
Since the county is still
repairing damages from the attack, the police department, the Department of
Health Services, and the Traffic and Parking Violations Agency have all taken a
hit.