> series: anatomy_of_a_breach —— part: 112 —— target: city_of_atlanta —— ransom: $51,000 —— recovery_cost: $17,000,000<span class="cursor-blink">_</span>_
On 22 March 2018, SamSam ransomware encrypted systems across multiple City of Atlanta departments, demanding approximately $51,000 in Bitcoin (6 BTC) for the decryption keys. The attack affected police records, court systems, utility billing, and internal communications. Officers wrote incident reports by hand. Residents could not pay water bills or parking tickets online. The municipal court could not process cases. Years of police dashboard camera footage was reportedly destroyed.
Atlanta chose not to pay the ransom. The recovery cost — including emergency IT contracts with Secureworks and other firms, new hardware, software licences, and consulting fees — exceeded $17 million. The SamSam operators — later identified as two Iranian nationals — had specifically targeted the city after reconnaissance revealed vulnerable, internet-facing Remote Desktop Protocol (RDP) services. The US Department of Justice indicted the operators in November 2018, charging them with attacks against over 200 victims including hospitals, municipalities, and public institutions.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallSamSam differed from mass-distributed ransomware like WannaCry in a critical way: it was manually deployed. The operators identified vulnerable internet-facing RDP services, brute-forced the credentials, gained access to the network, performed reconnaissance to identify critical systems and backups, and then deployed the ransomware at a time calculated for maximum impact — typically late at night or over weekends. This targeted approach made SamSam far more devastating per victim than automated ransomware.
The City of Atlanta attack is directly relevant to UK local government: similar legacy infrastructure, similar budget constraints, similar internet-facing services. For UK councils, the defence requires: removing RDP from the internet (or protecting it with MFA and VPN), maintaining tested offline backups, deploying continuous SOC monitoring, and maintaining incident response capability. Cyber Essentials certification addresses all of these baseline controls.
<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA on remote access. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> identifies exposed RDP. <a href="https://www.socinabox.co.uk/sectors/local-councils">SOC in a Box for Local Government</a> monitors 24/7.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call