Article Details
Scrape Timestamp (UTC): 2024-11-04 17:03:57.693
Source: https://www.theregister.com/2024/11/04/columbus_rhysida_ransomware/
Original Article Text
Click to Toggle View
Columbus, Ohio, confirms 500K people affected by Rhysida ransomware attack. Victims were placed in serious danger following highly sensitive data dump. The City of Columbus, Ohio, has confirmed half a million people's data was accessed and potentially stolen when Rhysida's ransomware raided its systems over the summer. In fact, the city noted in a filing that the number of people potentially affected was 500,000 exactly, an oddly round number for data break-in disclosures of this kind. It's the first time Columbus has confirmed the scale of the ransomware attack and associated data exposure. Rhysida said it dumped around 3 TB worth of stolen files on its blog after failing to net an extortion payment from the city, but as ever with these things, it's difficult to comb through all these records to determine exactly how many people were caught up in the attack. That said, we only know the scale because of the filing with Maine's attorney general. The letters sent to the potentially affected individuals, which were delivered on or around October 7, did not mention the number of other victims or detail the nature of the data that's now said to be accessible via the dark web. As ever with ransomware leaks, there is likely to be some variation when it comes to the types of data exposed to the criminals, but Columbus reckons the following personal information comprise the main ones: Perhaps more concerning was the source of the stolen data, however. Data points are one thing, but when these are combined with the specific source, they can reveal much more than just a name, for example. Security researcher Connor Goodwolf, whose legal name is David Leroy Ross, previously told CNBC that after downloading the 3 TB file from Rhysida, he found signs that the database belonging to the city's prosecutor was one of the sources of stolen data. Goodwolf said one of the first observations he made was that domestic violence victims were among the 500,000 affected individuals (The Register has not downloaded or reviewed the files to verify this). It goes without saying that if those victims had their names and home addresses leaked, their safety could be put in grave danger. Columbus sued Goodwolf following his remarks on the incident. It's rarely a good look when ransomware victims sue security researchers over their work, although the city said this was only done to prevent Goodwolf from disseminating the stolen data, which the complaint alleges he threatened to do. The civil complaint [PDF] made by the city confirmed the prosecutor's backup database was accessed, as was the backup crime database, which includes details of misdemeanor crimes dating back to 2015. "This data would potentially include sensitive personal information of police officers, as well as the reports submitted by arresting and undercover officers involved in the apprehension of the persons charged criminally by the City prosecutor's office," the complaint reads. "These databases also contain the personal information of crime victims of all ages, including minors, and witnesses to the crimes the City prosecuted from at least 2015 to the present." None of this was included in the letter sent to victims, although it was alluded to in an August press conference. Mayor Andrew Ginther was criticized by attendees for backtracking on earlier statements suggesting no data was compromised in the incident, only for him to reveal that, in fact, highly sensitive data was indeed stolen and leaked. It's worth noting, though, that data leak investigations can take time to determine with certainty the nature and scope of the incident. It's understandable that the mayor didn't want to raise any alarm unnecessarily, but after refusing to pay the criminals, it could be argued the city should have warned that the leaking of data was a possibility. Although the letter fell short of outlining the sensitive nature of the attack, it does state, however, that the city has no evidence suggesting the stolen data was misused in any way. Local media reporting soon after the July 18 attack noted that a number of city staff had their bank accounts broken into following the ransomware attack, but a link between the two has not been officially established. In a slightly unusual move, around the same time as these reports, the city offered all Columbus residents and victims of Rhysida's damage 24 months' worth of Experian credit monitoring. Typically this is offered to the victims only. "I'm angry and concerned that the city and our residents are victims of this cyberattack," said Ginther at the time. "My priority is to do everything we can to protect the residents of our city. That is why we are extending two years of free Experian credit monitoring to all of our residents to help protect them from potential fraud or identity theft."
Daily Brief Summary
Columbus, Ohio confirmed that 500,000 residents were affected by a ransomware attack by Rhysida, leading to a large-scale data breach.
Rhysida exposed around 3 TB of stolen files on the dark web after Columbus refused to pay the ransom.
Sensitive data from city prosecutor's and crime databases were accessed; included personal information of domestic violence victims, police officers, and crime witnesses.
Security researcher Connor Goodwolf downloaded the files, identifying domestic violence victims among the exposed, leading to legal action from the city.
The data breach comprised not only names but also addresses, potentially endangering the safety of the individuals involved.
Columbus offered all city residents two years of free credit monitoring through Experian following the breach.
Local authorities and Mayor Andrew Ginther have been criticized for their handling of the breach notification process.