A ransomware attack last month hit the City of Joplin forcing the IT staff to shut down the city’s government’s computer system to prevent the threat from spreading. While investigation into the security breach is still ongoing, the insurer for the City opted to pay a $320,00 ransom to avoid that the leak of the stolen info, Joplin City Manager Nick Edwards confirmed this week.
“Computer servers and programs that operated the city’s online services were closed down on July 7. Joplin’s internet-based telephone system was restored two days later.” states the Associated Press. “Cybersecurity firms hired to recover the city’s information technology systems have restored nearly every system needed to resume normal operations, including the city’s COVID-19 dashboard, online utility payments and court functions, Edwards said.”
At the time of this writing, forensic experts are working to discover how threat actors breached the City network and infected internal systems.
Representatives from the City of Joplin will not disclose any further details about the attack to prevent future attacks.
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Joplin)
[adrotate banner=”5″]
[adrotate banner=”13″]
Security Affairs Malware newsletter includes a collection of the best articles and research on malware…
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
This website uses cookies.