Keizer's computer system in the United States was compromised on June 10, and officials were able to regain access to the data by paying the hackers $ 48.000 in ransom.
At this point, sensitive data does not appear to have been accessed or abused. On Wednesday, June 17, city officials finally regained access to all e-mail and their files.
"We are working to resolve the situation as soon as possible as we realize the seriousness," city officials said in a statement. The breach was discovered when city officials could not access certain data and programs on the morning of June 10th.
The city worked with the appropriate authorities to recover the data, but it soon became clear that the only way to regain access to information stored on the city's computers was to pay a ransom to the hackers. The specific method used to invade computers of the city is the well-known ransomware, which encrypts data.
"We have been given a request for ransom required to obtain the necessary keys decryption", Said the official statement of the city. "We believe the investigation could provide critical information for the defense against future attacks," the statement said.
Part of a growing trend
When the city of Keizer was the subject of a hacking attack last week by an unknown person or group, it became the latest victim of such attacks nationally.
Until August 2019, according to a report by New York Times, at least 40 cities faced such a violation in the first eight months of the year. To some extent, 22 cities in Texas alone have been affected. Then the hackers ask ransom to "release" the data.
However, the ransom required by hackers from a city is only part of the cost of restoring. In addition to the ransom, Keizer had to sign a contract with a cybersecurity company to negotiate with hackers, and now it will have to spend even more on future security backups and possibly additional consultants to oversee it. reset of the system.
In a report published by World Economic Forum, cities of all sizes are required to prepare for future digital violations.
The report mentions human error and the failure to implement optimal ones practices as the main reasons for the success of such attacks.
Many attacks could be avoided with relatively simple actions such as "software repair, proper wall protection, frequent backups, and the use of multi-factor authentication for connections," the report concludes.