Tuesday, December 17, 2024
HomeComputer SecurityPowerful Ransomware Attack Hit on Port of San Diego

Powerful Ransomware Attack Hit on Port of San Diego

Published on

SIEM as a Service

The port of  San Diego computer system hit a massive cyber attack  On September 27, 2018, and it was confirmed by officials as a Ransomware attack.

The Port of San Diego serves the people of California as a specially created district, balancing multiple uses on 34 miles along San Diego Bay spanning five cities

A statement released by the port indicates that cybercriminals infiltrate the port’s computer network systems and infect it using unknown ransomware.

- Advertisement - SIEM as a Service

Ransomware works by encrypting the infected user data and the attacker holding the Private key until the demand ransom amount to be paid.

Port of San Diego Approach the FBI and Department of Homeland Security and they are started the further investigation to figure it out the way attackers were compromised the IT system.

Officials said, “Hackers breached the Port’s information technology systems on Tuesday and demanded payment in Bitcoin” and the demanded amount doesn’t disclose.

According to Port of San Diego CEO Randa Coniglio, Port employees continue to have limited functionality which may have temporary impacts on service to the public, especially in the areas of park permits, public records requests, and business services.

No further information is available at this time; updates will be provided as information is available,”

Also as previously stated, the Port has mobilized a team of industry experts and local, regional, state and federal partners to minimize impacts and restore system functionality, with priority placed on public safety-related systems.

You Can Also Read  Ransomware Attack Response and Mitigation Checklist.

Related Read

Arran Brewery Hits Massive Ransomware Attack – Warned Other Companies to Stay Safe

28-year-old Romanian Woman Pleads Guilty for Hacking 126 Computers Associated With Surveillance Cameras

Ransomware Attack Hits Bristol Airport, Flight Display Screens Went Offline

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which...

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used...