Incident: Cyber-Attack Paralyzes Alaskan Borough's Computer Systems, Causes Chaos

Published Date: 2018-08-01

Postmortem Analysis
Timeline 1. The software failure incident happened in July 2018 [Article 80136]. 2. The incident started on the morning of 23 July 2018 [Article 80136].
System 1. Windows 7 and 10 desktop computers and 120 computer servers [73774] 2. Email server, internal systems, disaster recovery servers, telephone system, door entry card system [73774] 3. Online booking system for swimming lessons [80136] 4. Library computers and printers, public wi-fi [80136] 5. Animal shelter staff computers, website for animal adoption photos [80136] 6. Systems for signing up children for swimming lessons [80136]
Responsible Organization 1. Malware creators responsible for the ransomware attack on the Matanuska-Susitna borough's computer systems [73774, 80136] 2. Potentially individuals involved in targeted phishing attacks that compromised an organization working with the borough, leading to the spread of malware [80136]
Impacted Organization 1. Government workers in a borough of Alaska, specifically Matanuska-Susitna, were impacted by the software failure incident reported in the news articles [73774, 80136].
Software Causes 1. Ransomware attack that encrypted email server, internal systems, and disaster recovery servers, affecting desktop computers, email server, telephone system, and door entry card system [Article 73774]. 2. Malware attack that spread across the borough's computer networks, disrupting various services, and locking employees out of their workstations [Article 80136]. 3. Unintended response triggered by launching a defense mechanism against malicious files, leading to further spreading and file encryption, demanding ransom payments, known as ransomware [Article 80136]. 4. Malware deposited data on victim computers, identified Mat-Su as the 210th victim of a particular version of the malware, possibly initiated through a targeted phishing attack [Article 80136].
Non-software Causes 1. The failure incident in the Alaskan borough of Matanuska-Susitna was caused by a ransomware cyber-attack that infected the computer systems, encrypting data and demanding a fee for restoration [73774, 80136]. 2. The ransomware attack was initiated through a targeted phishing attack, where an organization working with the borough was compromised, allowing the attackers to send a malicious email containing the malware to a Mat-Su employee [80136]. 3. The malware attack was found to have been on the borough's systems since May, indicating a potential long period of infiltration before the attack was detected [80136]. 4. The incident also highlighted the vulnerability of the borough's infrastructure to cyber-attacks due to its reliance on computers for various services, impacting activities such as online booking systems, communication, and data access [80136].
Impacts 1. Government workers in Matanuska-Susitna, Alaska, had to resort to using typewriters for their work after a ransomware attack encrypted their computer systems, affecting email servers, internal systems, disaster recovery servers, telephone systems, and door entry card systems [73774]. 2. The malware attack disrupted a wide range of services in the borough, including locking out employees from their workstations, causing libraries to turn off public PCs, disrupting online booking systems for swimming lessons, and impacting the animal shelter's ability to access data on medications for animals [80136]. 3. The cyber-attack led to a slowdown in various functions of the borough, with staff having to resort to pen and ink for filling out forms, using old electronic typewriters, and facing challenges in processing data related to construction sites and credit card payments [80136]. 4. The incident affected the operations of the Big Lake Public Library, where computers and printers had to be disconnected, public Wi-Fi turned off, and staff were unable to place books on hold or search for requested items [80136]. 5. The attack also impacted the local animal shelter, causing issues in tracking medications for animals, charging fees for collected pets, and updating the website with photos of animals up for adoption [80136]. 6. The disruption caused by the cyber-attack cost Matanuska-Susitna over $2 million and led to a significant recovery operation that lasted for 10 weeks, during which a dedicated team worked to bring affected services back online [80136].
Preventions 1. Regular software updates and patch management to ensure systems are protected against known vulnerabilities [73774]. 2. Enhanced cybersecurity measures such as multi-factor authentication and network segmentation to prevent the spread of malware within the network [80136]. 3. Employee training on recognizing and avoiding phishing attacks to prevent initial malware infiltration [80136].
Fixes 1. Enhancing cybersecurity measures such as implementing stronger anti-virus software and regular system checks to detect and prevent malware attacks [73774, 80136]. 2. Conducting thorough investigations to identify the source and method of the cyber-attack, such as targeted phishing attacks, to prevent future incidents [80136]. 3. Implementing cybersecurity training for employees to recognize and avoid potential threats like malicious emails containing malware [80136]. 4. Following the FBI's advice not to pay ransom demands in response to ransomware attacks [80136].
References 1. Interviews with government workers and IT director Eric Wyatt at Matanuska-Susitna borough in Alaska [73774, 80136] 2. Statements from borough manager John Moosey [80136] 3. Insights from librarian Peggy Oberg at Big Lake Public Library [80136] 4. Comments from local residents and critics like Nancy Driscoll Stroup [80136] 5. Information from investigations conducted by IT director Eric Wyatt and his team [80136] 6. Details from the FBI investigation, including comments from supervisory special agent William Walton [80136]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: - The software failure incident involving a ransomware attack on the Matanuska-Susitna borough in Alaska occurred in 2018 [73774]. - The incident involved malware infecting the computer systems of the borough, encrypting data, and disrupting various services. - The attack affected desktop computers, email servers, telephone systems, door entry card systems, and back-up data. - The ransomware attack spread on 24 July, but it was suspected to have been dormant in the systems since May. - The incident led to the temporary use of typewriters for tasks and the loss of some data, including unrecoverable email data. - The borough incurred significant costs due to the incident and had to rebuild affected systems and recover data [73774]. (b) The software failure incident having happened again at multiple_organization: - The article mentions that ransomware outbreaks have occurred worldwide, causing temporary shutdowns in hospitals, halting production in factories, disrupting operations at major ports, and causing chaos in offices [80136]. - Ransomware attacks have cost companies several billion dollars annually, indicating a widespread and recurring issue across various organizations. - The incident in Matanuska-Susitna, Alaska, is highlighted as part of a larger trend of ransomware attacks affecting communities and businesses that rely heavily on computer systems for their operations [80136]. - The incident in Matanuska-Susitna is described as unsettlingly common, suggesting that similar attacks have occurred in other communities and businesses reliant on computer technology [80136].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase: - The software failure incident in Matanuska-Susitna, Alaska, was caused by a ransomware attack that encrypted the borough's email server, internal systems, disaster recovery servers, telephone system, and door entry card system [73774, 80136]. - The ransomware attack was able to spread and infect the borough's systems due to missed elements of the malware by the anti-virus software, allowing it to spread within the network [73774]. - Investigators found evidence that the malware had been on the borough's systems since May, indicating a potential design flaw or vulnerability that allowed the malware to remain undetected for an extended period [80136]. (b) The software failure incident related to the operation phase: - The ransomware attack disrupted a wide range of services in Matanuska-Susitna, including locking out hundreds of employees from their workstations, disrupting services at local libraries, affecting the animal shelter's ability to access data on medications, and causing issues with online booking systems [80136]. - Staff had to resort to using typewriters, pen and ink, and temporary webmail services as a result of the attack, showcasing the operational impact of the software failure incident [80136]. - The incident led to significant operational challenges, such as the need to disconnect all computers and printers in libraries, slowing down various functions of the borough, and impeding communication and service delivery across different departments [80136].
Boundary (Internal/External) within_system (a) The software failure incident reported in the articles was primarily within the system. The failure was caused by ransomware infecting the computer systems of the Matanuska-Susitna borough in Alaska. The malware encrypted the email server, internal systems, disaster recovery servers, desktop computers, and computer servers within the borough's network [73774, 80136]. The ransomware attack spread within the system, affecting various services and disrupting operations across different departments within the borough [80136]. The incident involved the unintentional triggering of a larger or second stage attack when the IT department attempted to defend against the malware, leading to further spread and file encryption demands [80136]. The malware was found to have been dormant in the systems since May, indicating an internal origin of the attack [80136]. The recovery efforts involved extensive cleaning of infected devices and systems within the borough's network [80136].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: - The software failure incident in the Matanuska-Susitna borough of Alaska was caused by a ransomware attack that infected their computer systems, encrypting email servers, internal systems, and disaster recovery servers [73774]. - The ransomware attack spread on 24 July, but it was suspected to have been dormant in the systems since May, indicating that the malware was introduced without direct human participation at the time of the attack [73774]. - The malware encrypted data and demanded a fee for restoration, indicating that the failure was initiated by the malicious software without direct human intervention [73774]. - The malware spread to various systems within the borough, affecting desktop computers, email servers, telephone systems, and door entry card systems, showcasing the automated nature of the attack [73774]. - The incident involved the unintentional triggering of a larger or second stage attack when the IT team attempted to defend against the malware, suggesting a chain reaction caused by the malware itself rather than human actions [80136]. (b) The software failure incident occurring due to human actions: - The malware attack on the Matanuska-Susitna borough was suspected to have started with a targeted phishing attack, where an organisation working with the borough was compromised, allowing the malware to be sent through a malicious email to a Mat-Su employee [80136]. - The malware creators used social engineering tactics to trick individuals into clicking on links or downloading attachments, leading to the spread of the malware within the network, indicating a level of human involvement in the initial introduction of the malware [80136]. - The incident highlighted the importance of cybersecurity awareness and training to prevent employees from falling victim to phishing attacks and inadvertently introducing malware into the system [80136].
Dimension (Hardware/Software) hardware, software (a) The software failure incident occurring due to hardware: - The software failure incident in Matanuska-Susitna, Alaska, was primarily caused by a cyber-attack involving ransomware that infected the computer systems of the borough. This attack led to the encryption of email servers, internal systems, disaster recovery servers, telephone systems, and door entry card systems [73774, 80136]. - The malware attack affected nearly all of the 500 desktop computers running Windows 7 and 10, as well as 120 computer servers in the borough [73774]. - The incident resulted in the impounding of over 700 devices, including printers and computers, for checking and scrubbing to remove the malware [80136]. - The attack disrupted various services and activities in the borough, such as employees being locked out of their workstations, libraries having to turn off public PCs, and the animal shelter losing access to data on medications for animals [80136]. - The malware attack also impacted the online booking system for swimming lessons, land registry data access for estate agents, and communication channels for library services [80136]. (b) The software failure incident occurring due to software: - The ransomware attack that hit Matanuska-Susitna was a result of malicious computer software encrypting or scrambling data and demanding a fee for restoration [73774]. - The malware was able to spread within the borough's systems due to missed elements by the anti-virus software, allowing it to infect various devices and servers [73774]. - The incident involved a targeted phishing attack where an employee received a malicious email containing the malware, which then spread across the network [80136]. - The malware creators used tactics like cloaking the attack within seemingly innocuous messages to increase the chances of users clicking on links or downloading attachments that spread the malware [80136]. - The recovery process involved a dedicated team gradually bringing back the affected services online over a period of 10 weeks, indicating the software failure's complexity and impact [80136].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in the articles was malicious in nature. It was a cyber-attack involving ransomware that infected the computer systems of the Matanuska-Susitna borough in Alaska. The malware encrypted data and demanded a fee for restoration, affecting various systems including desktop computers, email servers, telephone systems, and door entry card systems [73774, 80136]. The attack was sophisticated and targeted, with evidence suggesting it may have originated from a targeted phishing attack that compromised an organization working with the borough, leading to the spread of malware through malicious emails [80136]. Additionally, the incident resulted in significant disruptions to various services, such as employees being locked out of their workstations, libraries having to disconnect computers and printers, animal shelters losing access to medication data, and online booking systems going down [80136]. The attack caused financial losses exceeding $2 million and impacted the daily operations of the borough, highlighting the malicious intent behind the software failure incident [80136].
Intent (Poor/Accidental Decisions) accidental_decisions (a) The intent of the software failure incident was not due to poor decisions but rather an accidental decision. The incident in Matanuska-Susitna, Alaska, was caused by a malware attack that spread across the borough's computer networks, disrupting various services [80136]. The attack was initiated through a targeted phishing attack, where an organisation working with the borough was compromised, allowing someone to send a malicious email containing the malware to a Mat-Su employee [80136]. This accidental decision to click on the malicious email led to the spread of the ransomware throughout the borough's systems, causing significant disruptions and financial losses [80136].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident in the Alaskan borough of Matanuska-Susitna was primarily due to development incompetence. The incident was caused by a ransomware attack that infected the borough's computer systems, encrypting data and disrupting various services. The malware had been dormant in the systems since May, indicating a lack of effective detection and prevention measures [73774, 80136]. (b) Additionally, the accidental aspect of the failure can be seen in how the initial response to the malware attack triggered unintended consequences, leading to a larger spread of the attack and further locking down of employees' files. This unintended response highlighted the complexity and unpredictability of dealing with cyber-attacks, showcasing accidental factors contributing to the incident [80136].
Duration temporary The software failure incident reported in the articles was temporary. The incident involved a ransomware attack that infected the computer systems of the Matanuska-Susitna borough in Alaska, causing disruptions to various services and operations. The incident began in July 2018 and the borough was still trying to recover from the attack months later [Article 80136]. The malware attack led to the temporary shutdown of systems, loss of access to data, disruption of services like online booking systems and communication channels, and the need to resort to manual processes such as using typewriters [Article 73774, Article 80136]. The incident required extensive efforts to clean the infected systems, recover data, and gradually bring affected services back online over a period of 10 weeks [Article 80136].
Behaviour crash, omission, value, other (a) crash: The software failure incident described in the articles can be categorized as a crash. This is evident from the fact that the ransomware attack on the Matanuska-Susitna borough in Alaska caused significant disruption to the computer systems, leading to the loss of access to various services and data for employees and residents. The incident resulted in the borough's infrastructure being knocked offline, with employees locked out of their workstations, disruption of services like online booking systems for swimming lessons, and the need to resort to using typewriters for tasks [73774, 80136]. (b) omission: The software failure incident can also be classified as an omission. This is seen in the disruption caused by the malware attack, where the system omitted to perform its intended functions at various instances. For example, the incident led to the loss of access to data on medications at the animal shelter, disruption of online booking systems, inability to update the website with photos of animals up for adoption, and the inability to place books on hold at libraries [80136]. (c) timing: The timing of the software failure incident can be considered as a factor in the overall impact. While the system may have initially been infected with the ransomware in May, the attack spread and caused significant disruption starting in July 2018. The incident occurred suddenly, catching the borough employees off guard and leading to a rapid response to mitigate the effects of the attack [80136]. (d) value: The software failure incident can be linked to the value category as well. This is evident from the fact that the malware attack encrypted or scrambled data on the borough's systems, demanding a fee for its restoration. The incident resulted in the loss of access to critical data, affecting services like the animal shelter's ability to charge for services, the inability to update the website with adoption information, and disruption in various administrative functions [73774, 80136]. (e) byzantine: The software failure incident does not align with the byzantine behavior category, as there is no mention of inconsistent responses or interactions in the articles. (f) other: The software failure incident can be further categorized under the "other" behavior due to the unique aspects of the attack. The incident involved a ransomware attack that not only encrypted data but also spread across various systems, affecting desktop computers, email servers, telephone systems, and door entry card systems. The attack was sophisticated, with elements of the malware going undetected by anti-virus software, leading to a widespread impact on the borough's operations [73774, 80136].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, delay, non-human (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident in Matanuska-Susitna, Alaska, resulted in significant property damage as the ransomware attack encrypted data on the borough's email server, internal systems, disaster recovery servers, telephone system, and door entry card system [73774, 80136]. The attack affected nearly all of the borough's 500 desktop computers and 120 computer servers, leading to the loss of email data and encryption of back-up data [73774]. Additionally, the incident disrupted various services such as online booking systems, land registry data access for estate agents, animal shelter records, library services, and communication channels within the borough [80136]. The recovery process involved extensive efforts to restore data and services, costing the borough over $2 million [80136].
Domain construction, government (a) The failed system was intended to support the information industry, specifically the government sector. The software failure incident affected the government workers in a borough of Alaska, disrupting their computer systems, email server, internal systems, disaster recovery servers, telephone system, and door entry card system [73774, 80136]. (l) The failed system was also related to the government industry, as it impacted the operations of a borough in Alaska. The incident disrupted various government services, such as processing data on construction sites, credit card payments at the local landfill, land registry data access for estate agents, and online booking systems for swimming lessons [73774, 80136].

Sources

Back to List