Alaska Dusts Off Its Typewriters

Government workers in a borough of Alaska have turned to typewriters to do their jobs, after ransomware infected their computer systems.

A spokeswoman for Matanuska-Susitna said the malware had encrypted its email server, internal systems and disaster recovery servers. She said staff had "resourcefully" dusted off typewriters and were writing receipts by hand.

The borough is in the process of rebuilding its systems.

Ransomware is malicious computer software that encrypts or scrambles data and demands a fee for it to be restored.

The borough said "nearly all" of its 500 desktop computers running Windows 7 and 10 had been infected and 120 computer servers were also affected.

According to technology news site Bleeping Computer, the ransomware attack spread on 24 July. However, the borough thinks it may have been dormant in its systems since May.

As well as infecting the borough's desktop computers and email server, it had also attacked its telephone system and door entry card system, said IT director Eric Wyatt.

He said anti-virus software had detected one component of the attack on 17 July but had missed other elements of the malware, which allowed it to spread.

The ransomware also infected and encrypted some of the borough's back-up data, although "some portion" had been saved.

"Though it initially appeared that our data was a complete loss, we have recently recovered data from the shared drives," said Mr Wyatt.

"Email does appear to be completely unrecoverable."

Some systems have been restored with "year-old data" and the borough is in the process of rebuilding each affected machine. "There is optimism for the recovery of additional data," said Mr Wyatt in a report.

"Encrypted data will be stored for months or years in hopes that the FBI will recover the decryption keys."

BBC

You Might Also Read: 

US City Of Atlanta Suffers An Attack:

« Dixons Carphone Data Breach Hits 10m Users
Digital Resilience Is A Step Up From Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

DOS

DOS

DOS is an Ecuadorian company with 3 decades of presence in the market and extensive experience in the planning, management and execution of IT Service Integration Projects.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

Cequence Security

Cequence Security

Cequence secures web, mobile, and API applications. We discover all apps, detect malicious bots, and stop attacks with an AI-integrated security platform.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

Accurics

Accurics

Accurics enables self-healing cloud native infrastructure by codifying security throughout your development lifecycle.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.