Tag Archive for: crippled

‘Akira’ ransomware behind Bucks Co. cyberattack that crippled emergency dispatch system – NBC10 Philadelphia


About a week after a cyberattack crippled Bucks County’s computer-aided emergency dispatch system, officials, on Friday, announced they believe they know who was behind the attack.

According to county officials, the ransomware group “Akira” is believed to have been responsible for the attack on a computer-aided emergency dispatch system that — according to the Department of Homeland Security — enables “dispatchers, call- takers, and 911 operators to prioritize and record incident calls, identify the status and location of responders in the field, and effectively dispatch responder personnel.”

“The County has shared with its local, state and federal partners that the ransomware “Akira” is involved so that they can have situational awareness and review their own systems,” county officials announced.

However, officials said, all 911 phone and radio systems remain operational as they investigate the cyberattack.

According to the Department of Health and Human Services, Akira is a Ransomware-as-a-Service (RaaS) group that started operations in March 2023.

“The group has targeted multiple sectors, including finance, real estate, manufacturing, and healthcare,” says the Dept. of Health and Human Services, noting that the group typically demands ransom payments in these cyberattacks.

Without this system, Bucks County officials said that the county has lost automated services powered by CAD and law enforcement officials cannot access databases for the Commonwealth Law Enforcement Assistance Network nor the National Crime Information Center.

Officials said they are working with state and federal partner agencies to assist in the investigation into the cybersecurity incident and, the county’s IT department is working to get the systems back online as soon as possible.

As of Sunday, officials still had no projected timeframe for when these services might resume.

Source…

DDoS attacks that crippled GitHub linked to Great Firewall of China

Earlier this week came word that the massive denial-of-service attacks targeting code-sharing site GitHub were the work of hackers with control over China’s Internet backbone. Now, a security researcher has provided even harder proof that the Chinese government is the source of the assaults.

In Tuesday’s story, Ars explained that the computers pummeling GitHub pages all ran a piece of JavaScript that surreptitiously made them soldiers in a massive DDoS army. The JavaScript was silently injected into the traffic of sites that use an analytics service that China-based search engine Baidu makes available so website operators can track visitor statistics. When everyday Internet users visited a site using the Baidu-supplied tracker, the injected code caused their browsers to constantly load two GitHub pages, one a mirror of anti-censorship site GreatFire.org the other a copy of the China edition of The New York Times.

Besides the motive of taking out pages the Chinese government doesn’t want its citizens to see, there was technical evidence supporting the theory the attack had the support of China’s leaders. To wit, the packets transmitting the malicious JavaScript had vastly different TTL, or time to live limits, from 30 to 229 compared with 42 for legitimate analytics code. This technical detail all but proved the DDoS code was coming from a sources inside China other than the visited website.

Read 5 remaining paragraphs | Comments


Ars Technica » Technology Lab