Baltimore’s budget office estimates a ransomware attack on city computers will cost at least $18.2 million — a combination of lost or delayed revenue and direct costs to restore systems.
The cost estimates were disclosed Wednesday at a City Council budget hearing as regular email service was restored for at least some Baltimore employees, the first public indication that the city’s technological recovery is showing signs of success.
The city’s information technology office has spent $4.6 million on recovery efforts since the ransomware struck May 7 and expects to spend an additional $5.4 million by the end of the year, officials said.
More
6 comments:
I'd have gambled on paying the ransom. Of course Baltimore isn't known for its collective intelligence.
Federal Government should not be responsible for delayed revenue. They will get this revenue and charge and adsorbent % for late fee. They should have a backup system any responsible Government / IT Dept would have that backup. This proves Baltimore is irresponsible and is attempting to rip off the Federal Government for their stupidity. No State / Federal tax dollars should bail them out for the hundredth time. Let Baltimore, the shit hole of MD, sink into the Harbor. Let the Drug Dealers and Gangs pay this difference.
Not covered by municipal insurance policies?
I can't help but wonder if this total lose of data might have had something to do with the Baltimore mayor being investigated. After all we know the Acid Wash of hard drives trick has already been done by Hillary. I am sure there were some things on record that the mayor did not want to have found.
Also as someone who works to remove virus' on a regular basis this virus infects all your shared drives. No one really aside from I.T. would have access to all drives. So basically the person who was dumb enough to click on the bait to infect the PC would have had their local drives along with their departmental drives encrypted by the virus but it more than likely would not have gone beyond that.
Now if someone was working directly off of the server (which never happens unless there is maintenance being performed.) Then it would have been able to infect all data. Even then there should be backup to go off of.
They could have paid the ransom and these crooks almost always release the data by providing the encryption key to unlock the data. They do this because they want that money and if word gets out that they don't give data back after they pay then no one would pay. I am not suggesting they should have paid it but a few grand compared to $18 million kinda makes it worth it.
Northwest Woodsman: I think they should revert to their culture’s tried and true means of communication, beating on drums and slapping sticks together. Would be great in case of an EMP attack.
5:44 That requires a separate Cybersecurity insurance policy. The Information Security Officer pushed to secure coverage, but his request was denied. Shocking, right?
Post a Comment