> series: anatomy_of_a_breach —— part: 126 —— target: city_of_baltimore —— ransomware: robbinhood —— exploit: eternalblue_still —— years_since_patch: 2<span class="cursor-blink">_</span>_
On 7 May 2019, RobbinHood ransomware struck the City of Baltimore, encrypting systems across multiple departments and demanding 13 Bitcoin (approximately $76,000). The attack disabled email, voicemail, online payments, and real estate transaction systems. Residents could not pay water bills or property taxes online. The city's 311 non-emergency phone system went down. Baltimore's government was forced to revert to paper-based processes.
Baltimore refused to pay the ransom. The total recovery cost exceeded $18 million — including $4.6 million in direct incident response costs and $13.6 million in lost or delayed revenue. Investigators found that the EternalBlue exploit — the same NSA tool that powered WannaCry (May 2017) and NotPetya (June 2017) — was used for lateral movement through Baltimore's network. The MS17-010 patch had been available since March 2017 — over two years before the Baltimore attack. The city had not applied it to all systems.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Baltimore attack is the most damning indictment of patching failure in this entire series. MS17-010 was released on 14 March 2017. WannaCry struck on 12 May 2017. NotPetya struck on 27 June 2017. The global impact of EternalBlue was the dominant cybersecurity story of 2017. Yet in May 2019 — 26 months after the patch, 24 months after WannaCry, and after every security organisation in the world had warned about EternalBlue — a major US city was still running systems vulnerable to the exploit.
Baltimore proved that unpatched vulnerabilities do not expire — they persist until they are patched or exploited. EternalBlue, first exploited in the wild in May 2017, was still being exploited against unpatched systems in May 2019 — and continues to be exploited against unpatched systems today. Cyber Essentials Danzell's 14-day patching mandate exists because exploits do not have an expiry date.
Vulnerability scanning identifies EternalBlue-vulnerable systems. Infrastructure testing validates patching across the estate. Cyber Essentials mandates 14-day critical patching. SOC in a Box for Local Government monitors for exploitation attempts. And UK Cyber Defence provides incident response when patching has failed and the ransomware has arrived.
<a href="/vulnerability-scanning">Vulnerability scanning</a> finds what is missing. <a href="/cyber-essentials">Cyber Essentials</a> mandates 14-day patching. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for exploitation.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call