Attacks/Breaches

3/6/2018
12:45 PM
50%
50%

Second Ransomware Round Hits Colorado DOT

A variant of SamSam sends CDOT employees back to pen and paper with two attack waves in two weeks.

Getting hit by ransomware is expensive and embarrassing. Getting hit twice in a two-week period makes it much worse. That's the situation in which the Colorado Department of Transportation (CDOT) finds itself after a second wave of SamSam ransomware hit while the department was still in the process of cleaning up from the first attack.

In the first attack, over 2,000 computers running Windows and McAfee security software were taken offline after their files were encrypted. Approximately 20% of those systems had been brought back into service when a variation of the original ransomware struck in a second wave of attacks. All affected computers were once again taken offline as employees of the department reverted to pen and paper to complete routine tasks.

In an interview with the Denver Post, Brandi Simmons, a spokeswoman for the state's Office of Information Technology said, "The variant of SamSam ransomware just keeps changing. The tools we have in place didn't work. It's ahead of our tools."

Dozens of staff members from Colorado's Office of Information Technology, the Colorado National Guard, and the FBI are working to get the systems back online. There is no current timeline for having all systems restored to service.

Read more here and here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6700
PUBLISHED: 2018-09-24
DLL Search Order Hijacking vulnerability in Microsoft Windows Client in McAfee True Key (TK) before 5.1.165 allows local users to execute arbitrary code via specially crafted malware.
CVE-2018-15615
PUBLISHED: 2018-09-24
A vulnerability in the Supervisor component of Avaya Call Management System allows local administrative user to extract sensitive information from users connecting to a remote CMS host. Affected versions of CMS Supervisor include R17.0.x and R18.0.x.
CVE-2018-6682
PUBLISHED: 2018-09-24
Cross Site Scripting Exposure in McAfee True Key (TK) 4.0.0.0 and earlier allows local users to expose confidential data via a crafted web site.
CVE-2018-17368
PUBLISHED: 2018-09-23
An issue was discovered in PublicCMS V4.0.180825. For an invalid login attempt, the response length is different depending on whether the username is valid, which makes it easier to conduct brute-force attacks.
CVE-2018-17369
PUBLISHED: 2018-09-23
An issue was discovered in springboot_authority through 2017-03-06. There is stored XSS via the admin/role/edit roleKey, name, or description parameter.