Skip to main content

Government in Indiana pays up after ransomware stifles operations

researchers use ambient light sensor data to steal browser exhausted man computer problems desk hacking hackers malware frust
Shutterstock
Of all the various forms of malware from which a person or organization can suffer, ransomware is likely the worst. It doesn’t just hijack a machine to engage in denial of service attacks, or even simply damage data and cause machines to become erratic and unreliable. No, ransomware is a particularly brazen form of malware.

Ransomware doesn’t just dole out random damage to whomever a hacker can reach with a virus or other nefarious code. It’s also not merely taking over a machine in the background and using it as a bot in denial of service attacks — those rely on keeping the infection invisible so that they can run without the user knowing it and doing something in response. As the county government in Madison County, Indiana, discovered last week, ransomware is a very in-your-face attack with very real and, quite often, unavoidable consequences, as Ars Technica reports.

The Madison County government was the victim of a ransomware attack that was spread throughout the county and forced almost all county services to shut down. The attack carried on into the weekend, and the government’s leadership was forced to concede to the demands of criminals running the ransomware operation.

The decision was clearly a simple dollars and cents calculation. As County Commissioner John Richwine put it: “We’re following the directions of our insurance carrier.” Presumably, the insurer had run the numbers and decided that whatever the ransom was — the county government did not disclose the amount — it was less than the potential costs from ongoing disruptions to services and the impact on equipment.

Fortunately, emergency services and the county’s voting systems were not affected. The county was forced to close the courts and a number of offices, with employees required to take personal time or use up their vacations due to lack of work. Madison County officials did not respond to requests for more information, likely because the officials would rather just put the episode behind them and move on with providing services to their constituents.

Editors' Recommendations

Mark Coppock
Mark has been a geek since MS-DOS gave way to Windows and the PalmPilot was a thing. He’s translated his love for…
Destructive hacking group REvil could be back from the dead
Person typing on a computer keyboard.

There was a period in 2021 when the computing world was gripped by fear of a dizzyingly effective hacking group fittingly named REvil -- until its website was seized by the FBI and its members arrested by Russia’s security services, that is. Yet like a malevolent curse that just can’t be dispelled, it now seems the group’s websites are back online. Has the group returned to spread discord and wreak havoc once again?

In case you missed them the first time around, REvil came to global attention by hacking into various high-profile targets, pilfering secret documents, then threatening their release unless a ransom was paid. In a notable case, the group stole and published files from Apple supplier Quanta Computer, including some that spilled the beans on unreleased product designs.

Read more
Hackers target U.S. government agencies as FBI investigates
Stock photo of laptop with code on its screen

Hackers have been accessing internal emails at the U.S. Treasury and also the Commerce Department, according to a Reuters report on Sunday.

Four people with knowledge of the incident told the news outlet that state-backed hackers from Russia may have been behind the operation.

Read more
World’s largest cruise line operator hit by cyberattack
worlds largest cruise line operator hit by cyberattack carnival corporation

The largest cruise line operator in the world has been hit by a ransomware attack, with customer data also believed to have been accessed.

Carnival Corporation, which operates more than 100 vessels across 10 different brands that include Carnival Cruise Line, Princess Cruises, and Costa Cruises, notified the U.S. Securities and Exchange Commission (SEC) this week after detecting the attack on August 15.

Read more