Utility Provider in Michigan Hit by Ransomware Attack
The corporate network of the server of the Lansing Board of Water & Light (BWL) in Michigan was hit by a ransomware attack. According to reports, the attack left staff locked out of their computers, but fortunately, it only affected the BWL’s enterprise systems, leaving the supply of electricity and water to its clients uninterrupted.
Investigations revealed that the attack happened after an employee opened an email with a malicious attachment. The ransomware spread through the company's network from there, encrypting files on the computers on the network. To prevent the malware from spreading, BWL shut down its systems, including those used for accounting, email, and phone communications used for customer assistance and inquiries.
An FAQ Twitter post from BWL said that customer payment information is safe since credit card credentials are handled by a third party. Additionally, customers are still able to make online payments. Though customer service lines were restored, other systems have yet to return to normal. The incident is currently being investigated by BWL's incident response team, as well as the FBI and state police.
The current ransomware landscape has significantly evolved from merely issuing empty threats to the data-encrypting malware that can lock down files and systems. Recent ransomware attacks on different industries have revealed a range of newer and more sophisticated ransomware variants, compelling authorities to increase their efforts on combating the ongoing ransomware epidemic.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Email Threat Landscape Report: Cybercriminal Tactics, Techniques That Organizations Need to Know
- Preventing an Imminent Ransomware Attack With Early Detection and Investigation
- Inside the Halls of a Cybercrime Business
- Securing Cloud-Native Environments with Zero Trust: Real-World Attack Cases
- Exploring Potential Security Challenges in Microsoft Azure