Endpoint

12/7/2018
01:40 PM
50%
50%

Iranian Nationals Charged for Atlanta Ransomware Attack

The March attack used SamSam ransomware to infect 3,789 computers.

A federal grand jury has indicted two Iranian nationals for a massive ransomware attack against the city of Atlanta, Ga., earlier this year, the Department of Justice reported this week.

From around March 10 until March 22, Faramarz Shahi Savandi and Mohammed Mehdi Shah Mansouri executed a ransomware attack on Atlanta. They used SamSam ransomware to encrypt about 3,789 computers, servers, and workstations belonging to the city, and demanded .8 Bitcoin to decrypt each machine – or six Bitcoin to decrypt them all.

A ransom note instructed the city to access a Bitcoin address to pay the ransom, providing a domain only reachable on the Tor browser. In the days following the attack, the Web page containing the decryption key was inaccessible and Atlanta did not submit a ransom payment.

The attack "significantly disrupted" Atlanta's operations, interfered with governmental processes, and caused millions of dollars in losses, officials say. The attackers have been charged with intentional damage to protected computers located in Atlanta that caused losses exceeding $5,000, affected 10-plus protected devices, and threatened public health and safety.

They are also charged in the US District Court for the District of New Jersey, where they face charges including one count of conspiracy to commit wire fraud, one count of conspiracy to commit fraud and related activity in connection with computers, and two substantive counts of intentional damage to a protected computer located in New Jersey.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: New camera 2FA closed loop!
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20059
PUBLISHED: 2018-12-11
jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE.
CVE-2018-20056
PUBLISHED: 2018-12-11
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. There is a stack-based buffer overflow allowing remote attackers to execute arbitrary code without authentication via the goform/formLanguageChange currTime parameter.
CVE-2018-20057
PUBLISHED: 2018-12-11
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. goform/formSysCmd allows remote authenticated users to execute arbitrary OS commands via the sysCmd POST parameter.
CVE-2018-20058
PUBLISHED: 2018-12-11
In Evernote before 7.6 on macOS, there is a local file path traversal issue in attachment previewing, aka MACOSNOTE-28634.
CVE-2018-20050
PUBLISHED: 2018-12-10
Mishandling of an empty string on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via the ONVIF GetStreamUri method and GetVideoEncoderConfigurationOptions method.