Ransomware Strikes Lincoln County Sheriff's Office; Sheriffs Pay Up


It was only a week ago we found out that, when confronted with cybercrime, around 30 percent of victims would negotiate with attackers, offering payments in exchange for unlocked or returned files. The Lincoln County Sheriff's Office in Maine—along with four other towns in the area—paid $300 to a set of hackers who struck a shared system with a breed of ransomware.

The virus in question, referred to as a “megacode” was somehow downloaded into the shared system, and the computers—according to Lincoln County Sheriff Todd Bracket—were rendered unusable until the fees were paid. Moreover, Bracket noted, the hackers intended to completely wipe out the system's contents if the fee, to be paid in Bitcoin, wasn't received. The FBI came in to track the payment, which went to a Swiss bank account, and thus left no further trail.

Ransomware has shown its face around area systems before, according to reports, with the Houlton Police Department reporting a similar hit earlier in the week, and its computer systems were in turn locked up until the ransom was paid. Just last summer, the FBI and a coalition of private security firms and foreign governments got together to take out one operation in Russia that had included a ransomware scheme, among several other points. Officials had reportedly identified the individual behind the scheme, but hadn't apprehended him.

Thanks to the ThreatTrack study, we know that schemes like this generally have a good chance of paying off for those involved, as long as said operators put protections around payment structures, as this case seems to have done. With almost a third of cybercrime victims intending to negotiate, as the Lincoln County Sheriff's Office did, it becomes easier for criminals to put these schemes into use. But what is anyone to do in response to these issues? One possible point is to establish offline backup systems for critical systems; imagine the look on a hacker's face when he or she is told that it would be cheaper to buy a new computer than to pay off a ransomware demand. Granted, even air gap defenses aren't foolproof, but it takes a whole lot more to access a computer secured with the air gap than one that's online.

Image via Shutterstock

Of course there are also other protection methods; WeLiveSecurity notes that System Restore can help get systems back to a “known-clean” state, before the malware actually hit under the right conditions. Showing hidden file extensions and blocking .EXE files in email applications can also be of some benefit. Plus, the standards about updating software patches and running antivirus tools also apply.

Ransomware can be tough to spot, but some fairly basic protection measures can go a long way toward ensuring files are on hand without having to pay a random cybercriminal. With some fairly simple protections in mind, even if some of this malware finds a system, its impact can be mitigated and kept to a minimum.

Edited by Dominick Sorrentino
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing TechZone360 Writer

Related Articles

Tech Innovation in iGaming

By: Contributing Writer    11/29/2023

iGaming is one of the fastest growing industries on the internet. For those who may not be aware, iGaming refers to online casinos, online slots, poke…

Read More

8 Underrated Features of Your Mobile Device You Probably Didn't Know About

By: Contributing Writer    11/21/2023

It is easy to get lost in all the new phone releases when multiple happen yearly. Consequently, most new functions go unnoticed because people do not …

Read More

Navigating the Launch: A Step-by-Step Guide to Bringing Your Product to Market

By: Contributing Writer    11/15/2023

Embarking on the journey to bring a new product into the marketplace is an exhilarating adventure that blends the thrill of innovation with the meticu…

Read More

Running MySQL on AWS: Step by Step

By: Contributing Writer    11/15/2023

MySQL on AWS is the deployment of the MySQL database system on Amazon Web Services (AWS) cloud platform. MySQL is one of the most popular open-source …

Read More

4 Easy Responsive Image Techniques

By: Contributing Writer    11/15/2023

Responsive images are a fundamental component in responsive web design. They adapt to the size of the user's screen, delivering the best user experien…

Read More