City of Baltimore Ransomware Attack: Lessons Learned


Submitted by: Daryl Haegley (CS)²AI Fellow and Director, Mission Assurance & Cyber Deterrence at the DOD



Original Source: https://heimdalsecurity.com/blog/baltimore-ransomware/?utm_medium=email&_hsmi=94871936&_hsenc=p2ANqtz-8bfE16LtUAM8jCoJXvguGFMILPYSaycrTV70sLvJMMgiq1aJ_PubditwliNduhDYsl5vS3Girg8-9ix-8KuAfTI4i1uw&utm_content=94871936&utm_source=hs_email

By ALINA GEORGIANA PETCU 9/8/20

“Nowadays, cybercriminals are becoming increasingly hooked on big game hunting. Public institutions ranging from educational facilities to governmental agencies seem to be their favorite targets. One of the most notable instances of the latter in recent history was the Baltimore ransomware attack.”

“Even though the attack took place in May 2019, there is a lot still to be learned from the Baltimore ransomware case today. In this article, I will present a timeline of the events that unfolded in the wake of the infection, as well as answer the most pressing question in any situation like this: did Baltimore city pay the ransom? Plus, if you want to learn how to prevent a ransomware attack in your institution, keep on reading. I’ll get into that as well.”