Monday, February 17, 2025
HomeComputer SecurityPowerful Ransomware Attack Hit on Port of San Diego

Powerful Ransomware Attack Hit on Port of San Diego

Published on

SIEM as a Service

Follow Us on Google News

The port of  San Diego computer system hit a massive cyber attack  On September 27, 2018, and it was confirmed by officials as a Ransomware attack.

The Port of San Diego serves the people of California as a specially created district, balancing multiple uses on 34 miles along San Diego Bay spanning five cities

A statement released by the port indicates that cybercriminals infiltrate the port’s computer network systems and infect it using unknown ransomware.

Ransomware works by encrypting the infected user data and the attacker holding the Private key until the demand ransom amount to be paid.

Port of San Diego Approach the FBI and Department of Homeland Security and they are started the further investigation to figure it out the way attackers were compromised the IT system.

Officials said, “Hackers breached the Port’s information technology systems on Tuesday and demanded payment in Bitcoin” and the demanded amount doesn’t disclose.

According to Port of San Diego CEO Randa Coniglio, Port employees continue to have limited functionality which may have temporary impacts on service to the public, especially in the areas of park permits, public records requests, and business services.

No further information is available at this time; updates will be provided as information is available,”

Also as previously stated, the Port has mobilized a team of industry experts and local, regional, state and federal partners to minimize impacts and restore system functionality, with priority placed on public safety-related systems.

You Can Also Read  Ransomware Attack Response and Mitigation Checklist.

Related Read

Arran Brewery Hits Massive Ransomware Attack – Warned Other Companies to Stay Safe

28-year-old Romanian Woman Pleads Guilty for Hacking 126 Computers Associated With Surveillance Cameras

Ransomware Attack Hits Bristol Airport, Flight Display Screens Went Offline

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Warns of Active Exploitation of Apple iOS Security Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of...

Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries

Threat actors are leveraging a modified version of the SharpHide tool to create hidden...

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations

A security researcher recently uncovered a high-risk Insecure Direct Object Reference (IDOR) vulnerability in...

Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues

Linus Torvalds has announced the release of Linux Kernel 6.14-rc3, marking a critical milestone...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Warns of Active Exploitation of Apple iOS Security Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of...

Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries

Threat actors are leveraging a modified version of the SharpHide tool to create hidden...

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations

A security researcher recently uncovered a high-risk Insecure Direct Object Reference (IDOR) vulnerability in...