• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

City of Baltimore Held Hostage by Ransomware for Weeks

A ransomware attack on the city of Baltimore is ongoing, and has held up the city’s infrastructure for two weeks.

May 22, 2019 Jonathan Blackwood Leave a Comment

Internet of Things

Two weeks ago we wrote about a Baltimore ransomware attack in our weekly installment of “Who Got Hacked.” As a result of the ransomware attack, the city of Baltimore shut down most of its services. It was the city’s second malware attack of the year, with the first affecting Baltimore’s 911 system.

Unfortunately, Baltimore is still in the midst of this round’s ransomware attack. Initially, hackers seized 10,000 Baltimore government computers and demanded a $100,000 ransom in bitcoins to free them up. Likely to avoid the potential of that number rising again, not taking the criminals for their word, city officials decided not to pay the ransom. As a result, according to Vox, Baltimore has been held hostage for two weeks and counting.

City employees have been locked out of email accounts while residents of the city have been unable to access services. City websites for paying water bills, property taxes, and parking tickets are among the services that residents cannot access while the ransomware attack continues.

The particular ransomware in this case is called RobbinHood, which locks a server down without a digital key owned by the hackers. The hackers demanded 3 bitcoins per system, for a total of 13 bitcoins to unlock all systems. While the hackers threatened to erase all information if the ransom was not paid in 10 days, that deadline has come and gone without repercussion.

City officials are working on restoring the locked systems, engaging cybersecurity experts and working with the FBI.

This attack brings up one of many nightmare scenarios for every organization. Cybersecurity is a hot issue because we see so many of these attacks. When a ransomware attack occurs, it can be difficult to stand your ground as Baltimore is doing. However, with proper technology in place beforehand, restoration is absolutely accomplishable. Still, it’s hard to play a game of chicken when all of your information is on the line, and there’s no telling if a hacker that holds your company for ransom will follow through on threats of deletion.

The best strategy is preventative – get the right technology in place to detect these attacks, and back up systems correctly to restore information that might be stolen. We’ll continue to monitor the situation in Baltimore to see how this plays out.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Cyber Attacks

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.