Alaska Dusts Off Its Typewriters

Government workers in a borough of Alaska have turned to typewriters to do their jobs, after ransomware infected their computer systems.

A spokeswoman for Matanuska-Susitna said the malware had encrypted its email server, internal systems and disaster recovery servers. She said staff had "resourcefully" dusted off typewriters and were writing receipts by hand.

The borough is in the process of rebuilding its systems.

Ransomware is malicious computer software that encrypts or scrambles data and demands a fee for it to be restored.

The borough said "nearly all" of its 500 desktop computers running Windows 7 and 10 had been infected and 120 computer servers were also affected.

According to technology news site Bleeping Computer, the ransomware attack spread on 24 July. However, the borough thinks it may have been dormant in its systems since May.

As well as infecting the borough's desktop computers and email server, it had also attacked its telephone system and door entry card system, said IT director Eric Wyatt.

He said anti-virus software had detected one component of the attack on 17 July but had missed other elements of the malware, which allowed it to spread.

The ransomware also infected and encrypted some of the borough's back-up data, although "some portion" had been saved.

"Though it initially appeared that our data was a complete loss, we have recently recovered data from the shared drives," said Mr Wyatt.

"Email does appear to be completely unrecoverable."

Some systems have been restored with "year-old data" and the borough is in the process of rebuilding each affected machine. "There is optimism for the recovery of additional data," said Mr Wyatt in a report.

"Encrypted data will be stored for months or years in hopes that the FBI will recover the decryption keys."

BBC

You Might Also Read: 

US City Of Atlanta Suffers An Attack:

« Dixons Carphone Data Breach Hits 10m Users
Digital Resilience Is A Step Up From Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

CSIRT.CZ

CSIRT.CZ

CSIRT.CZ is the National Computer Security Incident Response Team of the Czech Republic.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.