DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Cornelia, Georgia hit by ransomware attack on the day after Christmas

Posted on December 30, 2020 by Dissent

Posted on: December 29, 2020 by the City of Cornelia:

City of Cornelia Ransomware Incident

The City of Cornelia is dealing with a ransomware incident that began on December 26. We have anticipated situations such as this and, out of an abundance of caution, we have taken down our network while we investigate and restore our data. We have alerted law enforcement and we are cooperating with their investigation.

First responders and emergency phone lines are unaffected. City operations such as garbage pickup and utility work are proceeding normally.  City Hall phones and emails are currently working.  However, City administrative software is currently offline so we cannot look up the balance of your bills and cannot accept credit card payments for services at this time.

Ransomware is, unfortunately, fairly common and no entity is immune. We have engaged external experts to help us resolve the matter.  According to the them, the business model of those behind the ransomware is typically NOT to profit off of selling the personal information of city employees or our citizens on the Internet – it is to extract a payment from the City itself.

We will provide more information and updates as our investigation progresses. Members of the public with non-emergency requests are asked to contact City Hall @ 706-778-8585.

Of note, it was slightly more than one year ago that it was reported:

GA: Cornelia fends off third ransomware attack of the year, upgrades firewall.  So they had upgraded their firewall, invested in a full-time IT employee and support services, and they were still successfully attacked this week.

Cornelia is a small city doing the best they can, it seems. It’s a shame they have to devote so much of limited resources to dealing with fending off these attacks.

Additional details are reported by Joy Purcell on Now Habersham.

h/t, @Chum1ng0


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Kaufman County's data breach was their second one in three weeks
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Government SectorMalwareU.S.

Post navigation

← EXCLUSIVE: Conti describes how they attacked Leon Medical Centers; shows DataBreaches.net almost 2 million patient-related files
FR: Grand Annecy hit by malware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.