{"id":25142,"date":"2024-09-12T09:04:04","date_gmt":"2024-09-12T17:04:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/09\/12\/news-18872\/"},"modified":"2024-09-12T09:04:04","modified_gmt":"2024-09-12T17:04:04","slug":"news-18872","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/09\/12\/news-18872\/","title":{"rendered":"City of Columbus tries to silence security researcher"},"content":{"rendered":"\n<p>The City of Columbus, Ohio is suing a security researcher for sharing stolen data.<\/p>\n<p>All the <a href=\"https:\/\/www.documentcloud.org\/documents\/25082253-complaint-240829\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">complaint<\/a> will accomplish, we imagine, is spotlight the ignorance of certain city officials in handling a common security matter.<\/p>\n<p>What happened is that the City of Columbus was <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/columbus-investigates-whether-data-was-stolen-in-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">attacked by a ransomware group<\/a> on July 18, 2024. Due to the timing, it was at first unclear whether the disruption in the public facing services was caused by the <a href=\"https:\/\/www.malwarebytes.com\/blog\/uncategorized\/2024\/07\/crowdstrike-update-at-center-of-windows-blue-screen-of-death-outage\">CrowdStrike incident<\/a> or if it was in fact an attack. The attack was later claimed by the Rhysida ransomware group on their leak site, where the group posts information about recent victims that are unwilling to pay.<\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"846\" height=\"430\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/09\/leak_site_pots.png\" alt=\"Rhysida lists the data stolen from City of Columbus, Ohio for sale\" class=\"wp-image-116846\" style=\"width:700px\" \/><\/figure>\n<p>The City of Columbus <a href=\"https:\/\/www.columbus.gov\/News-articles\/City-of-Columbus-Thwarted-Ransomware-Encryption-of-its-IT-Infrastructure\">said<\/a> that the city\u2019s Department of Technology quickly identified the threat and took action to significantly limit potential exposure. Due to the swift action no systems had been encrypted, but they were looking into the possibility that sensitive data might have been stolen in the attack.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cThe city is in the process of identifying individuals whose personal information was potentially exposed and will provide notice and additional guidance to all who are impacted in the coming weeks.\u201d<\/p>\n<\/blockquote>\n<p>Rhysida started an auction to buy the stolen data with a starting bid of about $1.7 million in bitcoin. When that didn\u2019t render any results, Rhysida published (please note the word &#8220;published&#8221; here, it\u2019s important) stolen data comprising 260,000 files (3.1 TB) which was almost half of what they claimed to have, on August 8, 2024.<\/p>\n<p>On that same day, the mayor of Columbus stated on local media that the disclosed information was neither valuable nor usable.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cThe fact that the threat actor\u2019s attempted data auction failed is a strong indication that the data lacks value to those who would seek to do harm or profit from it.\u201d<\/p>\n<\/blockquote>\n<p>This is where an external security researcher comes in. Security researcher David Leroy Ross, aka Connor Goodwolf, shared information with the media about the content of the stolen data. From what Goodwolf shared it became clear that the data contained unencrypted personal information of city employees and residents.<\/p>\n<p>So, the City of Columbus decided to sue Goodwolf for alleged damages for criminal acts, invasion of privacy, negligence, and civil conversion.<\/p>\n<p>The lawsuit claimed that downloading documents from a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2017\/07\/explained-dark-web\">dark web<\/a> site run by ransomware attackers amounted to him interacting with the ransomware group and that it required special expertise and tools.<\/p>\n<p>When all he did was use a special browser to visit a website, download a file, and disclose the nature of the data to the local press. These actions, mind you, indistinguishable from the work of many security researchers committed to stopping cyberattacks.<\/p>\n<p>Take, for instance, the means of access for Goodwolf. <\/p>\n<p>If you are willing to consider the Tor Browser to be a special tool, I\u2019ll grant you that one, although grudgingly. If you are a Firefox user, you may see a big resemblance with the Tor Browser, so the browser is not really that special. If visiting a website and downloading a file is a crime, we\u2019re all guilty of said crime. If disclosing that a public official told an untruth (even if it was out of ignorance) is wrong then you probably shouldn\u2019t want to live in a democratic country.<\/p>\n<p>But unfortunately, a Franklin County judge issued the coveted <a href=\"https:\/\/www.nbc4i.com\/wp-content\/uploads\/sites\/18\/2024\/08\/Motion-for-Ex-Parte-TRO-240829.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">temporary restraining order<\/a> barring Goodwolf from accessing, downloading, and disseminating the City&#8217;s stolen data. The order also requires the defendant to preserve all data that was downloaded to date.<\/p>\n<p>We want to make absolutely clear: Rhysida stole and published the data. And it was spokespeople from The City of Columbus that told everyone not to worry about other criminals using the data for further crimes, instead of warning the people that they should be wary of phishing attempts that could leverage the stolen data against them.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-protecting-yourself-after-a-data-breach\"><strong>Protecting yourself after a data breach<\/strong><\/h2>\n<p>There are some actions you can take if you are, or suspect you may have been, the&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2023\/09\/involved-in-a-data-breach-heres-what-you-need-to-know\">victim of a data breach<\/a>.<\/p>\n<ul>\n<li><strong>Check the vendor\u2019s advice.<\/strong>&nbsp;Every breach is different, so check with the vendor to find out what\u2019s happened, and follow any specific advice they offer.<\/li>\n<li><strong>Change your password.<\/strong>&nbsp;You can make a stolen password useless to thieves by changing it. Choose a&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/computer\/how-to-create-a-strong-password\" target=\"_blank\" rel=\"noreferrer noopener\">strong password<\/a>&nbsp;that you don\u2019t use for anything else. Better yet, let a&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\" target=\"_blank\" rel=\"noreferrer noopener\">password manager<\/a>&nbsp;choose one for you.<\/li>\n<li><strong>Enable two-factor authentication (2FA).<\/strong>&nbsp;If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication (2FA)<\/a>&nbsp;can be phished just as easily as a password. 2FA that relies on a FIDO2 device can\u2019t be phished.<\/li>\n<li><strong>Watch out for fake vendors.<\/strong>&nbsp;The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify the&nbsp;identity of anyone who contacts you&nbsp;using a different communication channel.<\/li>\n<li><strong>Take your time.<\/strong>&nbsp;Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.<\/li>\n<li><strong>Consider not storing your card details<\/strong>. It\u2019s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.<\/li>\n<li><strong>Set up identity monitoring.<\/strong>&nbsp;<a href=\"https:\/\/go.cyrus.app\/MN4j\/fkkekmw9\" target=\"_blank\" rel=\"noreferrer noopener\">Identity monitoring<\/a>&nbsp;alerts you if your personal information is found being traded illegally online, and helps you recover after.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"h-check-your-digital-footprint\"><strong>Check your digital footprint<\/strong><\/h2>\n<p>If you want to find out what personal data of yours has been exposed online, you can use our&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">free Digital Footprint scan<\/a>. Fill in the email address you\u2019re curious about (it\u2019s best to submit the one you most frequently use) and we\u2019ll send you a free report.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-7ba16f0b-04e8-4679-9512-2f21a0971dcf\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_fy25dfplaunch_171269600960&amp;utm_content=V1\"><\/a><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">SCAN NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identit<\/strong>y<\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Protect your\u2014and your family&#8217;s\u2014personal information by using <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\">identity protection<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/09\/city-of-columbus-tries-to-silence-security-researcher\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The City of Columbus filed a lawsuit against a researcher for trying to inform the public about the nature data stolen by a ransomware group <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[31844,31845,32,5897,31720,12337],"class_list":["post-25142","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-city-of-columbus","tag-goodwolf","tag-news","tag-privacy","tag-rhysida","tag-stolen-data"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25142"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25142\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}