The Port of San Diego was hit by a ransomware attack following another cybersecurity breach in today’s crypto news.
The IT department of the Port of San Diego established that their computers were attacked and that the attackers demanded to be fully paid in Bitcoin. The breach actually happened earlier in September according to the chief executive officer of the port and was used as a loophole to disrupt the entire IT system of the agency. It is still unknown how much bitcoins the attackers demanded.
The chief executive officer stated:
‘’As previously stated, the investigation has detected that ransomware was used in this attack. The Port can also now confirm that the ransom note requested payment in Bitcoin, although the amount that was requested is not being disclosed.’’
The agency has asked the U.S Department of Homeland Security and the FBI to help resolve the case. They are also cooperating with the U.S Coast Guard. The seriousness of the problem comes from the fact that the IT systems of the port handled more than 3 million tons of cargo every year.
The bigger issue is that ransomware attacks are still very popular and the rate of the attacks has only gone down by 2 percent. For example, a town in Canada already paid a ransom in bitcoin so they can get back the software from the hackers who infiltrated the system. The town argued that this was the only possible option.
buy vibramycin generic buy vibramycin online no prescription
Another example is the attack of the Professional Golfers Association servers where the attackers obtained decrypted files mostly consisted of digital marketing communications materials.
This is one of the reasons why regulators are very keen on implement stricter rules in order to protect individuals and companies of such attacks.
DC Forecasts is a leader in many crypto news categories, striving for the highest journalistic standards and abiding by a strict set of editorial policies. If you are interested to offer your expertise or contribute to our news website, feel free to contact us at [email protected]
Discussion about this post