From Networked World:
After a law enforcement server shared by three city (town) police departments and a sheriff’s office was infected with ransomware and the cops in Maine chose to pay a bitcoin ransom to decrypt the files, what moral of the ransomware story did the sheriff learn? Lincoln County Sheriff Todd Brackett told the Boothbay Register, “Next time, we’ll just pay the ransom on the first day and be done with it. It’s like a jail — it’s very safe and secure, but that can mean nothing if you leave the door unlocked.”….
Sheriff Brackett said he was “initially reluctant to pay the ransom” as it “goes against the grain,” but he authorized the payment [of around $300] “on the advice of specialists who were familiar with the ransomware and worked with other users it infected.”….
Looking for a bright side, Sheriff Brackett said the affected law enforcement departments are now “aware of such scams” and “how to deal with them.” More training is on the horizon, he said. “We’ll have more virus protection training where we go over how to tell if something might be a virus. Sometimes, it’s hard to tell, but you’ve got to keep an eye out for some of these documents that people (email) you. Sometimes it can be hard to tell if it contains a virus.”
Tracking down the cyberthugs behind megacode is allegedly a low priority for the FBI, which would neither confirm nor deny if it was investigating the ransomware dubbed a “common virus” by the sheriff who told WCSH6 that the FBI traced the bitcoin ransom payment to a deposit in a Swiss bank account before the “trail went cold.”