Real-Case Analysis #32: City of Columbus Ransomware Incident

Elisabeth Do
Elisabeth Do
calendar icon
August 4, 2024
3 min

On July 18, 2024, the City of Columbus, Ohio, had a serious cybersecurity incident when a ransomware attack was launched against its information technology infrastructure. The attack was blamed on an advanced threat actor operating overseas, eventually identified as the Rhysida ransomware organization.

Overview of the Ransomware Incident

On July 18, 2024, the City of Columbus was the victim of a ransomware attack. This type of cyber crisis occurs when bad actors encrypt an organization's data and demand a ransom to restore access. In this case, the attackers, known as the Rhysida ransomware group, sought to impair the city's IT infrastructure and possibly use ransomware to demand a ransom payment. Although the encryption attempt was unsuccessful, the attackers were able to exfiltrate a large amount of data, claiming to have taken 6.5 terabytes of important material.

An early attack A city employee identified vector as a file download from an internet domain, not a phishing email, as had been feared. This download enabled the attackers to obtain access to the city's internal network. The City of Columbus' Department of Technology rapidly discovered the issue and cut off internet connectivity to prevent additional exposure. This quick move helped prevent the ransomware from completely encrypting the city's data, although the attackers were still able to access some of it.

Timeline of the Attack:

  • July 18, 2024: The ransomware attack was initiated, and the city's IT systems were compromised.
  • July 19, 2024: The city disclosed the incident on social media, informing the public about the disruptions.
  • July 29, 2024: The City of Columbus provided an update, confirming that the attack was thwarted but acknowledging that data had been accessed. The city also began working with federal authorities, including the FBI and the Department of Homeland Security, to investigate the breach and secure its systems.
  • August 1, 2024: The Rhysida ransomware group claimed responsibility for the attack and threatened to leak the stolen data, which they claimed included sensitive information such as emergency services data and access to city cameras.

The perpetrators of the ransomware attack were identified as the Rhysida ransomware group, an advanced worldwide cybercriminal organization that targets a variety of entities, including governments, hospitals, and educational institutions. The group's primary objective is financial, as they requested a ransom payment of 30 Bitcoin (roughly $1.9 million) in exchange for not disclosing the stolen material. The Rhysida organization has a history of ruthless attacks, and they frequently sell stolen material on the dark web if their demands are not met.

Impact Analysis

Service Disruptions

To control the breach, various city systems were forced to go offline immediately following the attack, causing disruptions in a variety of city services. Critical services, such as 911 and 311, were operating during the event. Email services were restored after more than a week of downtime.

Data Compromise

The attackers claimed to have taken 6.5 gigabytes of data, which they then auctioned on the dark web. According to reports, this data includes databases, employee internal logins and passwords, emergency services software, and access to city video cameras. The Rhysida group uploaded screenshots that showed security camera footage, police dispatch information, and staff data tables.

Financial and Personal Data Risks

There have been reports of compromised personal funds among city employees, such as fraudulent credit card purchases and money missing from bank accounts. Although these occurrences have not been formally linked to the ransomware attack, the correlation raises serious concerns about the protection of sensitive information.

Operational and Security Enhancements

The city has been working with federal authorities and cybersecurity experts to enhance its information technology infrastructure in preparation for future attacks. This includes a deliberate approach to hardening systems before bringing them back online. The incident emphasizes the importance of ongoing cybersecurity advancements and personnel training to avoid similar breaches in the future.

Lessons Learned

Following the City of Columbus ransomware, here are the lessons learned:

Quick Detection and Response

The City of Columbus Department of Technology rapidly discovered the issue and took fast measures to restrict any exposure by cutting off internet access. This quick response was critical in stopping the attackers from encrypting the city's data, although they did manage to extract valuable information.

Importance of Collaboration

The city promptly contacted federal officials, including the FBI and Homeland Security, to help with the investigation and security of its networks. This collaboration demonstrates the need of involving specialist authorities in dealing with complex cyberthreats efficiently.

Employee Training and Awareness

The attack was launched after an employee downloaded a malicious file from a website, emphasizing the importance of ongoing cybersecurity training and awareness initiatives for all employees. Educating staff about safe online activities and detecting possible risks can assist to avoid such tragedies.

Communication and Transparency

The City of Columbus quickly communicated with the public about the event and the ongoing inquiry, giving updates and information to those who may have been affected. Transparent communication is critical for maintaining public trust and enabling impacted parties to take appropriate actions.

Support for Affected Individuals

The city provided credit monitoring services to affected employees and established hotlines to report breach-related issues. Providing assistance to persons affected by a cyber incident is critical for minimizing potential damage and aiding in rehabilitation.

Learning From Others

Mayor Ginther noted negotiations with other communities, like Cleveland, which had also experienced cyberattacks, to share knowledge and tactics for coping with such situations. Learning from other companies' experiences can provide significant insights and help to improve preparedness.

Vigilance Against Emerging Threats

The incident serves as a reminder of the ever-changing nature of cyberthreats, as well as the importance of maintaining monitoring and adapting cybersecurity measures. As fraudsters develop increasingly advanced techniques, enterprises must remain educated and proactive in their defensive strategies.