Apparently it's the library's turn to pay a fine.
Libraries in St Louis have been bought to a standstill after computers in all the city's libraries were infected with ransomware, a particularly virulent form of computer virus used to extort money from victims.
Hackers are demanding $35,000 (£28,000) to restore the system after the cyberattack, which affected 700 computers across the Missouri city's 16 public libraries. The hackers demanded the money in electronic currency bitcoin, but, as CNN reports, the authority has refused to pay for a code that would unlock the machines.
As a result, the library authority has said it will wipe its entire computer system and rebuild it from scratch, a solution that may take weeks.
(Score: 2) by nobu_the_bard on Wednesday January 25 2017, @03:49PM
Newer ransomwares attack backups if they can. They will search for shares on the network, even if the active user doesn't have an active link to the shared files. It will attempt to interfere with Shadow Copy and other services, if it can, as well. I've seen it in real time - backups vanishing one after another as they were gobbled up (in that case, it was just the Windows copies affected - as it happened, the machine in question was virtual and had regular images taken, stored on a physically isolated server, so it turned out to not be a big deal).
I've also heard rumors of ones that sniff network traffic to try to deduce other things they can access, but haven't seen one of these myself yet.
You need the backups to not be directly accessible from any of the machines they relate to backing up during work hours, where possible, to be sure they aren't endangered. If you really had a well done network you could do this with just permissions settings perhaps, but you really need to be on top of things. One errant administrator session and you're wrecked.
(Score: 3, Insightful) by Scruffy Beard 2 on Wednesday January 25 2017, @04:42PM
If it is not off-line, off-site, and verified, it is not a back-up.
(Score: 0) by Anonymous Coward on Wednesday January 25 2017, @11:36PM
Should be in all-caps and bold as well.
If your copy of your stuff can't survive a fire, flood, burglary, or hack, what you have is NOT a backup.
That the articles about this event doesn't include the names of the IT personnel responsible for the difficult-to-restore software/data infrastructure is just wrong.
This was fundamental incompetence.
Those chumps should be fired (and should never have been hired in the first place) and their names should be in the zeitgeist to alert any potential employers.
Those turkeys should have jobs that involve no more responsibility/skills than one that includes asking the question "Do you want fries with that?"
-- OriginalOwner_ [soylentnews.org]