Endpoint

10/16/2018
01:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

NC Water Utility Fights Post-Hurricane Ransomware

North Carolina's Onslow Water and Sewer Authority was hit with an advanced attack in the wake of Hurricane Florence.

The Onslow Water and Sewer Authority (ONWASA), a critical water utility based in North Carolina, is responding to a sophisticated ransomware attack in the aftermath of Hurricane Florence, the violent and powerful storm that battered the East Coast last month.

ONWASA reports the attack targeted its internal computer system, including servers and personal machines, leaving it with "limited computer capabilities." Officials say customer data was not compromised and the area's environment and public water supply were both unharmed. However, they warn, many other databases must be fully re-created.

The incident started on Oct. 4, when ONWASA began detecting persistent attacks in the form of Emotet, a type of polymorphic malware. Emotet is known as an advanced banking Trojan that mainly works as a downloader for other banking Trojans. It's among the most expensive and destructive forms of malware to hit state and local governments, US-CERT reports.

ONWASA first believed the threat was under control; when it continued, the utility recruited external security experts to work on the problem alongside its internal IT staff.

The situation escalated in the early hours of Oct. 13, when the malware dropped Ryuk, a highly targeted ransomware strain that first appeared earlier this year. Ryuk, which has targeted global organizations, has relatively low technical capabilities but can spread major damage. Unlike most ransomware, which spread via spam, it's exclusively used for tailored attacks.

"In fact, its encryption scheme is intentionally built for small-scale operations, such that only crucial assets and resources are infected in each targeted network with its infection and distribution carried out manually by the attackers," Check Point researchers explain.

Fortunately, one of ONWASA's IT employees was working at 3 a.m. when Ryuk appeared. Staff immediately tried to protect systems by taking the organization offline, but the virus quickly spread, encrypting databases and files along the way. ONWASA reports its incident is similar in nature to cyberattacks affecting major cities, including Atlanta and Mecklenburg County, N.C.

The utility has heard from its attackers, who it says "may be based in a foreign country." It also says their email was consistent with ransomware attacks on other governments and corporations. ONWASA will "not negotiate with criminals nor bow to their demands," it says.

Instead, it will rebuild its databases and systems from the ground up. ONWASA is coordinating with the FBI, Department of Homeland Security, the State of North Carolina, and several cybersecurity companies to investigate the attack and move forward.

While it does, ONWASA says the lack of computing capabilities will affect the timeliness of service for several weeks. All plant and office locations will continue to operate manually. Customers can still pay via credit card over the phone or in person; however, things like service orders and account creation will use manual processes until computer systems are back up and running. Email service has been interrupted for most of the utility, it reports.

Related Content:

 

 

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
10/17/2018 | 1:07:27 PM
Restoratoin and backup protocols
AND HERE WE GO AGAIN.  Another organization that apparently lacks a plan to restore and rebuild in event of failure - not just ransomware BUT FAILURE of any kind or type.  I still content that an encrypted server is as dead as a hard drive fail server and new backups should restore data IF timely.   But nobody ever does that. 
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18913
PUBLISHED: 2019-03-21
Opera before 57.0.3098.106 is vulnerable to a DLL Search Order hijacking attack where an attacker can send a ZIP archive composed of an HTML page along with a malicious DLL to the target. Once the document is opened, it may allow the attacker to take full control of the system from any location with...
CVE-2018-20031
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2018-20032
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon t...
CVE-2018-20034
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2019-3855
PUBLISHED: 2019-03-21
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.