Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

City of Oakland Hit by Ransomware Attack

The City of Oakland has disclosed a ransomware attack that impacted several non-emergency systems.

The City of Oakland, California, on Friday announced that it was forced to take some systems offline after falling victim to a ransomware attack.

The cyberattack, the city’s administration says in an incident notification, started on Wednesday night and led to network outages as a result of systems being disconnected from the internet.

While voicemail and other non-emergency services are experiencing interruptions or have been taken offline, no critical or emergency services, such as 911 and fire departments, have been impacted.

Oakland’s IT team is currently working with the authorities to investigate the incident and restore the affected services, but no information has been provided on when the impacted systems will be fully functional.

While the city has disclosed that ransomware was used in the cyberattack, it did not provide information on the type of ransomware used, nor did it say whether the incident has resulted in any data theft.

However, ransomware attacks are typically doubled by data theft, as ransomware operators are looking to increase their chances of receiving a payment by threatening victims that the stolen information will be leaked online unless their ransom demands are met.

Ransomware attacks targeting US cities and counties are not new. Over the past several years, numerous such incidents have led to critical services being shut down and have also impacted election systems and school districts.

While some cities paid the ransom – including Florence City, Lake City, and Riviera Beach City – others chose not to pay, in some cases with disastrous results. The City of Atlanta, which refused to pay a $51,000 ransom, spent millions to recover the impacted systems.

Related: Iowa’s Largest City Cancels Classes Due to Cyber Attack

Related: Personal Information of 123K Individuals Exposed in City of Tucson Data Breach

Related: Cyber Insights 2023 | Ransomware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Ransomware

Dole was forced to shut down systems in North America due to a ransomware attack, which has reportedly led to salad shortages in some...

Cybercrime

More than 3,800 servers around the world have been compromised in recent ESXiArgs ransomware attacks, which also include an improved process.

Ransomware

The personal and health information of more than 3.3 million individuals was stolen in a ransomware attack at Regal Medical Group.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.