CRIME City of Tulsa hit with ransomware attack.

Millwright

Knuckle Dragger
_______________
Per 740AM news.

The mayor says many online systems are down, but they don't believe any personal info was snatched.

He's being very tight-lipped about it.

I get the feeling that they were ahead of it, but different systems are being isolated until they can be checked out.
 

Pebbles

Veteran Member
Had the same thing happen here in our town of Kingman. City of Kingman was hit by the same thing. It took them at least two months to get back up to speed.
 

Repairman-Jack

Veteran Member
Baltimore had a major attack in 2019, believe it cost them over $20 million..they didn't pay the ransom.

City of Washington PA had one a few years ago as well.
 

von Koehler

Has No Life - Lives on TB
This world is too computer dependent

My local water department was basically an one man operation-by a world war two vet.

Everything was done manually, admittedly just for a very small community.

When the city realized he was going to retire soon, they hired an IT company to automate the water plant. Rather then train a human to take the old man's place

At the time, no one heard of ransomware.
 

Josie

Has No Life - Lives on TB
DS works for an auto parts place. They got hit by ransomware a couple of years ago. They contacted the FBI. Agent told them it was not an isolated incident in this city. Other businesses had also been attacked but kept it under wraps. They ended up paying the ransom, just to get back to business.
 

Nowski

Let's Go Brandon!
Windows - The most successful virus of all time.

This is why, you should be running some version of Linux.

I have (2)Linux Mint machines, and (1)Windblows 8.1 media edition,
which I have to run programs that work best on windblows,
mostly ham radio related programs. I also have Kindle on there,
and the ASUS tablet has ran mostly problem free.

Remember, when da windblows, winders rattle.

I was a systems analyst for 25 years, and Windblows won because
they have the best marketing out there. Everyone else just basically
was asleep at the wheel(good band by the way), and Microcrap walked
away with it all.

Also did a lot of network services, including virus mitigation.
Had wireless security certifications, and was studying for the
Certified Information Systems Security Professional certification,
when I basically decided, it was my time to retire.

A former co-worker is a CISSP, and recently obtained the
GIAC Penetration Tester (GPEN) certification. We used to talk a lot
about the shitz that is going on right now, 10 years ago.

It is only going to get worse, much worse, as you would not believe at
how wide open, the vast majority of networks are, to a good team of hackers.

I did some wireless hacking during that time, as a test of client's wireless networks.
Did my part in locking them down, as best possible.

Please be safe everyone.

Regards to all.

Nowski
 
Last edited:

et2

Has No Life - Lives on TB
We’re moving into the 4th industrial revolution. Moving away from computers isn’t going to happen, but a lot more reliance on them. Artificial intelligence will be running business and more, collaborating with other AI systems within their organization maybe states or countries apart. Controlling many things right down to the machining center on the shop floor, as well as many other tasks.

It is coming
 

Jez

Veteran Member
It doesn't help that cities and companies don't take Cybersecurity seriously until AFTER they've been hit. If they're talking about it now it must be bad because no one likes to admit they've been hit and they almost always downplay the severity.
 

rob0126

Veteran Member
This is why, you should be running some version of Linux.

I have (2)Linux Mint machines, and (1)Windblows 8.1 media edition,
which I have to run programs that work best on windblows,
mostly ham radio related programs. I also have Kindle on there,
and the ASUS tablet has ran mostly problem free.

Remember, when da windblows, winders rattle.

I was a systems analyst for 25 years, and Windblows won because
they have the best marketing out there. Everyone else just basically
was asleep at the wheel(good band by the way), and Microcrap walked
away with it all.

Also did a lot of network services, including virus mitigation.
Had wireless security certifications, and was studying for the
Certified Information Systems Security Professional certification,
when I basically decided, it was my time to retire.

A former co-worker is a CISSP, and recently obtained the
GIAC Penetration Tester (GPEN) certification. We used to talk a lot
about the shitz that is going on right now, 10 years ago.

It is only going to get worse, much worse, as you would not believe at
how wide open, the vast majority of networks are, to a good team of hackers.

I did some wireless hacking during that time, as a test of client's wireless networks.
Did my part in locking them down, as best possible.

Please be safe everyone.

Regards to all.

Nowski

Linux for sure. MX Linux looks to be somewhat decent. Very customizable.
 

Matt

Veteran Member
This is escalating asymmetric warfare.

The Colonial issue is too effective to be nonstate actors. I expect a hit on some power distribution... most likely out west and a major strike on the EBT SNAP programs. That would truly release the Kraken on the US.
 

Repairman-Jack

Veteran Member
There are two types of companies:

Those that have been hacked.
Those that don't know they've been hacked.

Most don't invest in cybersecurity until after an incident.

In my 27+ years in IT I've been involved in recovery/mitigation of 2 major incidents, 1st one many
years ago was enough to involve FBI. The second one in 2018, was huge in comparison, and was 18 months of 12+ hours days and involved both FBI and Bundesnachrichtendienst.

Cyber incidents are a daily thing, companies (especially ones that have publicly trad stocks) will downplay them as much as possible, and it is not uncommon for them to have employee's who are actively involved in one sign legal docs prohibiting public discussion.

The Solarwinds and Exchange incidents were just the tip of the iceberg.
 

Knoxville's Joker

Has No Life - Lives on TB
It doesn't help that cities and companies don't take Cybersecurity seriously until AFTER they've been hit. If they're talking about it now it must be bad because no one likes to admit they've been hit and they almost always downplay the severity.

Most of the issues have to do with token hires and people that really have no place in certain departments. It is really bad employees, bad management, and greedy bean counters that are causing most of the issues. The other factor is that too many utility and support systems require expensive upgrades to get to the latest OS and those are becoming the achilles heel of things especially as the push comes ever bigger to make everything always online. What will end up happening is that they will have to learn how to segregate networks physically and ensure the weak points never go online. But more importantly they need to get idiots out of jobs that keep falling for the latest phishing expeditions by hackers...
 

ChicagoMan74

ULTRA MAGA
Windows - The most successful virus of all time.
Yeah OK. If I'm not mistaken...ransomware usually involves some sort of user error where some kind of malicious software is downloaded...then BOOM.

The major issue here is a lack of awareness about security threats from most users, with many people unaware of what threats look like, and what they should avoid downloading or opening on the internet or in emails. This lack of security awareness helps ransomware to spread much more quickly.

And lets be intellectually honest...in the enterprise, Windows still has more than a %90 market share...so any kind of dumbass move by a user that results in a security event like a ransomware attack...9 times out of ten it will be a dumbass move made on a Windows machine, not for any other reason than shear numbers.
 

Southside

Has No Life - Lives on TB
Ransomware is easy to defeat if you know what to do.
BUT! If you press the wrong button first, it's gonna cost.
A LOT!

And THIS!
And lets be intellectually honest...in the enterprise, Windows still has more than a %90 market share...so any kind of dumbass move by a user that results in a security event like a ransomware attack...9 times out of ten it will be a dumbass move made on a Windows machine, not for any other reason than shear numbers.
 

FaithfulSkeptic

Carrying the mantle of doubt
The perpetrators of this should be hunted down and publicly executed. The guillotine comes to mind. Do that a few times and this would stop.
 

raven

TB Fanatic
I assure you, based on over 20 years managing IT,
the people that work on your computer have less expertise than you believe
will look and copy all your naked selfies and post them to the internet
and will read all your email.

it amazes me at just how easily people hand over their computers to IT.
 
Most of the issues have to do with token hires and people that really have no place in certain departments. It is really bad employees, bad management, and greedy bean counters that are causing most of the issues. The other factor is that too many utility and support systems require expensive upgrades to get to the latest OS and those are becoming the achilles heel of things especially as the push comes ever bigger to make everything always online. What will end up happening is that they will have to learn how to segregate networks physically and ensure the weak points never go online. But more importantly they need to get idiots out of jobs that keep falling for the latest phishing expeditions by hackers...
Can we be far from beginning the regression back to corporate end-user command-line terminals?

Physically banning/deleting (internal corporate infrastructure) ALL outside connectivity via the internet?

Only the hairdresser knows for sure . . .

The laxity in IT security and best-practices is both intentional and appalling. It became a severe issue the minute that end-user access to the internet first showed up on corporate LANs (local area networks), circa ~1995 - and has not improved, per se. As you alluded to, lots of expensive and complex security devices/appliances are being deployed with an often poor understanding of their limits by ignorant/undertrained corporate IT personnel - yet relied upon/sold to the CxO suite as if these security appliances are the magic bullet to all of corporate's IT security woes - now, and into the future. Doesn't work that way, at all.


intothegoodnight
 
Last edited:

West

Senior
Yeah OK. If I'm not mistaken...ransomware usually involves some sort of user error where some kind of malicious software is downloaded...then BOOM.

The major issue here is a lack of awareness about security threats from most users, with many people unaware of what threats look like, and what they should avoid downloading or opening on the internet or in emails. This lack of security awareness helps ransomware to spread much more quickly.

And lets be intellectually honest...in the enterprise, Windows still has more than a %90 market share...so any kind of dumbass move by a user that results in a security event like a ransomware attack...9 times out of ten it will be a dumbass move made on a Windows machine, not for any other reason than shear numbers.

IDK, I ran windows OS for over a decade from the mid 90s to around 2007. In that time I spent $1000s of extra dollars in antivirus programs and 100s of hours in keeping my systems clean/to date, etc...

Since I switched to running mostly linux OS I haven't spent a day or two in time to stay updated, etc. And I don't think I've paid any in antivirus programs etc..

Proof is in the pudding. Windows is a virus!

In less windows has gotten much better since 2008?

Does windows still recomend virus cleaners/programs etc.?..

:D
 
Last edited:
Top