Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Data Breach

Gloversville hit by ransomware attack, paid ransom – DataBreaches.Net

Cyberinchief by Cyberinchief
October 27, 2025
Reading Time: 4 mins read
0
Gloversville hit by ransomware attack, paid ransom – DataBreaches.Net


RELATED POSTS

UK Hospital Asks Court to Stymie Ransomware Data Leak

These five countries recorded the most third-party data breaches last year

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

WNYT reports:

The city of Gloversville’s computer system was hit by a ransomware attack, which compromised the personal information of employees past and present.

The attack was discovered by the finance commissioner back in March, the city announced on Saturday. There was a ransomware note on the server. Gloversville reported the attack to the FBI. State Police and the Department of Homeland Security’s Incident Response Team.

The attackers, who are believed to be from Eastern Europe, stole employees’ personal information, including all payroll records and account numbers, according to the city.

The city hired consultants to negotiate the ransomware demand, which was $300,000.

The City Council approved paying $150,000 in exchange for the return of the stolen data.

The FBI is working to track down the suspects and possibly recover the ransom money, according to city officials.

DataBreaches is reproducing the city’s notice below because it is has some statements that raise questions. Specifically:

  1. They write, “Since this was an active criminal investigation, it remained confidential, on a need-to-know basis, per the recommendation of State and Federal law enforcement agencies assisting the city. (FBI, Dept of Homeland Security, US Secret Service, NYS Police).” A  “recommendation” is not the same as law enforcement obtaining a court order or certifying in writing that an entity is not to disclose an incident. Did they have an actual court order or certification to justify delaying notification?
  2. They paid the attackers to get a decryptor, and presumably, to get data deleted. Did they have any usable backup stored safely prior to the incident, and if not, why not?

It seems another entity has again rewarded threat actors by paying their ransom demands. That’s a shame.

 

October 25, 2025The city computer network sustained a Ransomware Attack which was discovered by our Finance Commissioner, Tammie Weiterschan on Friday morning March 14, 2025. A ransom note was found on the server with instructions on how to negotiate with the Threat Actor Group later believed to be from Eastern Europe. She immediately notified the Mayor, Police Chief Michael Garavelli and all members of the city council. That same morning, the police chief and the finance commissioner reported the incident to: 1. The NYS Dept of Homeland Security' Cyber Incident Response Team (CIRT) 2. The NYS Police Cyber Analysis Unit (CAU) 3. The FBI CIRT met with city officials that afternoon regarding the appropriate response to the incident. Since this was an active criminal investigation, it remained confidential, on a need-to-know basis, per the recommendation of State and Federal law enforcement agencies assisting the city. (FBI, Dept of Homeland Security, US Secret Service, NYS Police) The City IT provider and the Police Department IT provider immediately began remediation and recovery efforts that continued non-stop through the weekend and into the following weeks. Tuesday, March 18 CIRT strongly recommended that the city retain a Cyber Incident Response and Security Firm and a legal firm that specialize in handling these incidents. The following day, the City contacted and subsequently retained both a Cyber Security and Forensic Technology Firm and the legal firm of Harter, Secrest and Emery, LLP. to assist in investigation and recovery. Our consultants immediately began negotiations with the Threat Actor Group to reach a settlement which would recover the stolen data since the attack compromised the personal identifying information of all city employees, current and retired, including payroll records, direct deposit information and account numbers. Meanwhile, the city took steps immediately to safeguard and secure any other sensitive information from further compromise and made all notifications in accordance with the law. The city sent out over 3,000 letters notifying all current and former employees and any members of the
Page 1 of the city’s press release. Source: Gloversville Facebook Account.
general public that were at risk of having their personal information compromised. These notifications offered credit monitoring services and Identity Theft Protection for one year at no cost to the affected individuals. The city also notified the Attorneys General of nine states asrequired by law. Based on the recommendations of our legal and cyber security experts, the decision was made and approved by the City Council to pay the ransom to the Threat Actor Group and recover the data. The original demand from the Threat Actor Group was $300,000. The amount paid was $150,000. The stolen data was de-encrypted and fully recovered. The city was advised that the FBI had been able to track these transactions in the past. This incident possessed certain characteristics that might allow it to be tracked, the ransom recovered, and the suspects caught. Accordingly, there is still an open investigation into this incident along with the incidents suffered by several other cities and businesses in the region that were perpetrated by the same group.
Page 2. of notice. Source: Gloversville Facebook account.



Source link

Buy JNews
ADVERTISEMENT
Tags: attackDataBreaches.NetGloversvilleHitpaidransomRansomware
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

UK Hospital Asks Court to Stymie Ransomware Data Leak
Data Breach

UK Hospital Asks Court to Stymie Ransomware Data Leak

December 8, 2025
These five countries recorded the most third-party data breaches last year
Data Breach

These five countries recorded the most third-party data breaches last year

December 8, 2025
LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net
Data Breach

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

December 7, 2025
Rethinking the CIO-CISO Dynamic in the Age of AI
Data Breach

Rethinking the CIO-CISO Dynamic in the Age of AI

December 6, 2025
NHS supplier hit with £3m fine for security failings that led to attack
Data Breach

NHS supplier hit with £3m fine for security failings that led to attack

December 6, 2025
HHS Outlines AI Road Map Amid Major Department Overhaul
Data Breach

HHS Outlines AI Road Map Amid Major Department Overhaul

December 5, 2025
Next Post
My Honest Thoughts on The Cyber Security Job Market in 2025

My Honest Thoughts on The Cyber Security Job Market in 2025

Are you a Cyber Crime Victim?. Lodge a complaint to your local police station now.

Are you a Cyber Crime Victim?. Lodge a complaint to your local police station now.

Recommended Stories

Top Cybersecurity Skills To Learn Before 2030 (START HERE!)

Top Cybersecurity Skills To Learn Before 2030 (START HERE!)

December 2, 2025
Google Cyber Security Internship 2025 – 10,000 Seats! | Free 2-Month Online Program

Google Cyber Security Internship 2025 – 10,000 Seats! | Free 2-Month Online Program

November 2, 2025
Nigeria and organized crime and cybercrime

Nigeria and organized crime and cybercrime

December 7, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested