Wednesday, April 16, 2025
HomeComputer SecurityHackers Demand $5.3 Million After Locking Massachusetts City Computers With RYUK Ransomware

Hackers Demand $5.3 Million After Locking Massachusetts City Computers With RYUK Ransomware

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals compromise the New Bedford, Massachusetts city computers with the Ryuk Ransomware and demanding $5.3 million to unlock the compromised computers.

July 5, 2019, City of New Bedford’s Management Information Systems (MIS) identified the ransomware that infected several computers.

Soon after detection the MIS staff disconnected the City’s computer servers and shut down systems.

- Advertisement - Google News

But the ransomware already infects 158 computer workstations which are 4 percent of the 3,532 computers used by city employees across all departments.

New Bedford Mayor Jon Mitchell said in a press conference “threat actors behind the Ryuk Ransomware demanding $5.3 million ransom in Bitcoin to provide a decryption key unlock the infected computers.

He says “I decided to make a counter-offer using insurance proceeds in the amount of $400,000, which I determined to be consistent with ransoms recently paid by other municipalities.”

Due to a low number of computers infected with the ransomware, City decided to restore the compromised system files from backup.

“Also, the attacker rejected that offer and made no counter demand. Rather than offer more, the city opted to recover its data on its own.” Mitchell said.

Ryuk first appeared in August 2018, and while not incredibly active across the globe.

Initially, Ryuk distributed via massive spam campaigns and exploit kits and there is some specific operation such as extensive network mapping, hacking, and credential collection required before each operation.

Few months before National Cyber Security Centre (NCSC) from the UK issued an alert for Ryuk ransomware attack that is actively targeting global organization and government networks.

Similarly, last march, Rural Jackson County, Georgia computer systems are infected with Massive Ryuk ransomware attack that leads to shutting down all the operations.

Unfortunately, they can’t restore the files so officials paid $400,000 as a ransom amount to cybercriminals in order to recover the infected system.

You can also read the Ransomware Attack Response and Mitigation Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking News update

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing...

10 Best Email Security Solutions in 2025

Email security solutions are critical for protecting organizations from the growing sophistication of cyber...

WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack

A new form of phishing attack is making waves among job seekers, as cybercriminals...

SOC Alert Fatigue Hits Peak Levels As Teams Battle Notification Overload

Security Operations Centers (SOCs) are facing a mounting crisis: alert fatigue. As cyber threats...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing...

10 Best Email Security Solutions in 2025

Email security solutions are critical for protecting organizations from the growing sophistication of cyber...

WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack

A new form of phishing attack is making waves among job seekers, as cybercriminals...