DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NY: Gloversville hit by ransomware attack, paid ransom

Posted on October 27, 2025 by Dissent

WNYT reports:

The city of Gloversville’s computer system was hit by a ransomware attack, which compromised the personal information of employees past and present.

The attack was discovered by the finance commissioner back in March, the city announced on Saturday. There was a ransomware note on the server. Gloversville reported the attack to the FBI. State Police and the Department of Homeland Security’s Incident Response Team.

The attackers, who are believed to be from Eastern Europe, stole employees’ personal information, including all payroll records and account numbers, according to the city.

The city hired consultants to negotiate the ransomware demand, which was $300,000.

The City Council approved paying $150,000 in exchange for the return of the stolen data.

The FBI is working to track down the suspects and possibly recover the ransom money, according to city officials.

DataBreaches is reproducing the city’s notice below because it is has some statements that raise questions. Specifically:

  1. They write, “Since this was an active criminal investigation, it remained confidential, on a need-to-know basis, per the recommendation of State and Federal law enforcement agencies assisting the city. (FBI, Dept of Homeland Security, US Secret Service, NYS Police).” A  “recommendation” is not the same as law enforcement obtaining a court order or certifying in writing that an entity is not to disclose an incident. Did they have an actual court order or certification to justify delaying notification?
  2. They paid the attackers to get a decryptor, and presumably, to get data deleted. Did they have any usable backup stored safely prior to the incident, and if not, why not?

It seems another entity has again rewarded threat actors by paying their ransom demands. That’s a shame.

 

October 25, 2025The city computer network sustained a Ransomware Attack which was discovered by our Finance Commissioner, Tammie Weiterschan on Friday morning March 14, 2025. A ransom note was found on the server with instructions on how to negotiate with the Threat Actor Group later believed to be from Eastern Europe. She immediately notified the Mayor, Police Chief Michael Garavelli and all members of the city council. That same morning, the police chief and the finance commissioner reported the incident to: 1. The NYS Dept of Homeland Security' Cyber Incident Response Team (CIRT) 2. The NYS Police Cyber Analysis Unit (CAU) 3. The FBI CIRT met with city officials that afternoon regarding the appropriate response to the incident. Since this was an active criminal investigation, it remained confidential, on a need-to-know basis, per the recommendation of State and Federal law enforcement agencies assisting the city. (FBI, Dept of Homeland Security, US Secret Service, NYS Police) The City IT provider and the Police Department IT provider immediately began remediation and recovery efforts that continued non-stop through the weekend and into the following weeks. Tuesday, March 18 CIRT strongly recommended that the city retain a Cyber Incident Response and Security Firm and a legal firm that specialize in handling these incidents. The following day, the City contacted and subsequently retained both a Cyber Security and Forensic Technology Firm and the legal firm of Harter, Secrest and Emery, LLP. to assist in investigation and recovery. Our consultants immediately began negotiations with the Threat Actor Group to reach a settlement which would recover the stolen data since the attack compromised the personal identifying information of all city employees, current and retired, including payroll records, direct deposit information and account numbers. Meanwhile, the city took steps immediately to safeguard and secure any other sensitive information from further compromise and made all notifications in accordance with the law. The city sent out over 3,000 letters notifying all current and former employees and any members of the
Page 1 of the city’s press release. Source: Gloversville Facebook Account.
general public that were at risk of having their personal information compromised. These notifications offered credit monitoring services and Identity Theft Protection for one year at no cost to the affected individuals. The city also notified the Attorneys General of nine states asrequired by law. Based on the recommendations of our legal and cyber security experts, the decision was made and approved by the City Council to pay the ransom to the Threat Actor Group and recover the data. The original demand from the Threat Actor Group was $300,000. The amount paid was $150,000. The stolen data was de-encrypted and fully recovered. The city was advised that the FBI had been able to track these transactions in the past. This incident possessed certain characteristics that might allow it to be tracked, the ransom recovered, and the suspects caught. Accordingly, there is still an open investigation into this incident along with the incidents suffered by several other cities and businesses in the region that were perpetrated by the same group.
Page 2. of notice. Source: Gloversville Facebook account.
Category: Government SectorMalwareU.S.

Post navigation

← UN Cybercrime Convention to be signed in Hanoi to tackle global offences
On Reports of an Alleged Data Breach Involving G-Xchange, Inc. (GCash) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.