Malware

Albany County Airport authority hit by a ransomware attack

Officials at the Albany County Airport Authority revealed that New York airport servers were infected with ransomware on Christmas.

Officials at the Albany County Airport Authority announced this week that a ransomware attack hit the New York airport and its computer management provider LogicalNet over Christmas.

The news of the attack was disclosed after LogicalNet reported its own management services network had been breached. According to the experts, the ransomware encrypted files on the authority’s servers and its backup servers.

“Officials at the Albany County Airport Authority announced Thursday that the attack came to light after Schenectady-based LogicalNet reported its own management services network had been breached. From there, the virus spread to the authority’s servers and backup servers, encrypting files.” reported the Associated Press.

The infection was discovered on Christmas Day, the ransomware encrypted administrative files, but no personal or financial traveler data was exposed. Experts reported that the family of malware involved in the attack against LogicalNet was the Sodinokibi ransomware, the same malicious code that infected systems at the London-based Travelex currency exchange.

Operations at the Albany International Airport were not impacted by the attack, Transportation Security Administration and airline computers were not affected too.

The sad aspect of the story is that the airport authority decided to pay the ransom with the economical coverage of the insurance carrier. Officials did not reveal the amount of the ransom, they only revealed that it was “under six figures.”

“The authority’s insurance carrier authorized payment of the ransom, which airport CEO Philip Calderone only said was “under six figures.”” reported the Times Union. “The ransom was paid in Bitcoin. The airport authority will seek to recover the $25,000 deductible it paid on its insurance policy from LogicalNet. The airport’s insurer reimbursed the authority for the rest of the ransom payment. “

The authority paid the ransom on December 30, and crooks sent it the decryption key a few hours later.

“Thanks to the fast action by our IT department, airport operations during one of the busiest travel periods of the year were not impacted and no passenger or airline data was acquired or accessed,” Calderone said. “Within hours the authority was able to resume all administrative functions with systems functioning as normal. We are grateful for the assistance provided by the New York State Cyber Command, the FBI and our consultant ABS.”

The authority reported the incident to the local authorities and law enforcement, including New York State Cyber Command and the FBI.

Historical records show the VPN server used by Albany County Airport Authority ( http://vpn.albanyairport.com) was not using Pulse Secure – so unlike Travelex, it probably wasn’t the vector of compromise.” explained the popular researcher Troy Mursch from @bad_packets.”Regardless, organizations need to ensure they’ve applied the latest patches to their VPN servers as multiple threat actors continue to target vulnerable hosts. CISA published an advisory regarding the continued exploitation today here:  https://www.us-cert.gov/ncas/alerts/aa20-010a.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – ransomware, airport)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Palo Alto Networks fixed multiple privilege escalation flaws

Palo Alto Networks addressed multiple vulnerabilities and included the latest Chrome patches in its solutions.…

5 hours ago

Unusual toolset used in recent Fog Ransomware attack

Fog ransomware operators used in a May 2025 attack unusual pentesting and monitoring tools, Symantec…

8 hours ago

Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web

Resecurity researchers found 7.4 million records containing personally identifiable information (PII) of Paraguay citizens on…

22 hours ago

Apple confirmed that Messages app flaw was actively exploited in the wild<gwmw style="display: none; background-color: transparent;"></gwmw>

Apple confirmed that a security flaw in its Messages app was actively exploited in the…

1 day ago

Trend Micro fixes critical bugs in Apex Central and TMEE PolicyServer

Trend Micro fixed multiple vulnerabilities that impact its Apex Central and Endpoint Encryption (TMEE) PolicyServer…

1 day ago