Anatomy of a Breach

Anatomy of a Breach: City of Atlanta — The $17 Million Ransomware Attack That Started with a $51,000 Demand

> series: anatomy_of_a_breach —— part: 112 —— target: city_of_atlanta —— ransom: $51,000 —— recovery_cost: $17,000,000<span class="cursor-blink">_</span>_

Hedgehog Security 30 April 2018 13 min read

$51,000 ransom. $17 million to recover. The economics of not paying.

On 22 March 2018, SamSam ransomware encrypted systems across multiple City of Atlanta departments, demanding approximately $51,000 in Bitcoin (6 BTC) for the decryption keys. The attack affected police records, court systems, utility billing, and internal communications. Officers wrote incident reports by hand. Residents could not pay water bills or parking tickets online. The municipal court could not process cases. Years of police dashboard camera footage was reportedly destroyed.

Atlanta chose not to pay the ransom. The recovery cost — including emergency IT contracts with Secureworks and other firms, new hardware, software licences, and consulting fees — exceeded $17 million. The SamSam operators — later identified as two Iranian nationals — had specifically targeted the city after reconnaissance revealed vulnerable, internet-facing Remote Desktop Protocol (RDP) services. The US Department of Justice indicted the operators in November 2018, charging them with attacks against over 200 victims including hospitals, municipalities, and public institutions.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

RDP. Brute force. Targeted deployment. Maximum damage.

SamSam differed from mass-distributed ransomware like WannaCry in a critical way: it was manually deployed. The operators identified vulnerable internet-facing RDP services, brute-forced the credentials, gained access to the network, performed reconnaissance to identify critical systems and backups, and then deployed the ransomware at a time calculated for maximum impact — typically late at night or over weekends. This targeted approach made SamSam far more devastating per victim than automated ransomware.

RDP: The Front Door
SamSam's primary entry vector was internet-facing RDP — the same remote access protocol that should never be exposed to the internet without MFA, VPN, or other protective controls. <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates MFA on all remote access. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> identifies exposed RDP services.
$51K Ransom vs $17M Recovery
The ratio — $17 million in recovery costs versus a $51,000 ransom demand — illustrates the economics of ransomware. While paying is not recommended (it funds further attacks and provides no guarantee), the cost of not paying underscores the need for prevention and preparation. Tested backups and incident response plans dramatically reduce recovery costs.
Local Government as Target
Atlanta was not unique — SamSam targeted over 200 municipalities, hospitals, and public institutions. <a href="/blog/sector-under-the-microscope-local-government">UK local government</a> faces the same risk: legacy systems, limited IT budgets, and internet-facing services create ideal conditions for targeted ransomware. <a href="https://www.socinabox.co.uk/sectors/local-councils">SOC in a Box for Local Government</a> provides the monitoring these organisations need.
Backups Targeted
SamSam operators specifically sought out and encrypted or deleted backup systems before deploying the ransomware payload — ensuring that victims could not recover without paying. Immutable, offline backups that cannot be reached from the production network are the only reliable defence. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> validates backup isolation.

Atlanta's lesson applies directly to UK councils.

The City of Atlanta attack is directly relevant to UK local government: similar legacy infrastructure, similar budget constraints, similar internet-facing services. For UK councils, the defence requires: removing RDP from the internet (or protecting it with MFA and VPN), maintaining tested offline backups, deploying continuous SOC monitoring, and maintaining incident response capability. Cyber Essentials certification addresses all of these baseline controls.


Atlanta: $51K ransom, $17M recovery. Could your council survive the same?

<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA on remote access. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> identifies exposed RDP. <a href="https://www.socinabox.co.uk/sectors/local-councils">SOC in a Box for Local Government</a> monitors 24/7.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles