Fortuna Police Report Cyber Attack and Warn the Community to Prepare for Ongoing Cyber Attacks & Cyber Security Measures

Cyber crimePress release from Fortuna Police Department:

As the conflict in the Ukraine grows, US government officials report that economic sanctions targeting the Russian Federation have resulted in retaliatory cyber-attacks on the US homeland, and US entities.

Based on information from numerous open intelligence sources, it is expected that these cyber-attacks will continue to intensify in an effort to cripple our communities, and our nation economically.

The City of Fortuna saw a number of attempted cyber intrusions three weeks ago, in the form of email attachments which originated from a foreign source.

These emails were directed at our City by actors using foreign proxy servers.

We are confident that attachments are most likely some form of virus, or ransomware that would be activated when the attachment is opened.

These attempts were immediately reported to City of Fortuna officials, and the City’s IT provider, the Northern California Intelligence Center, the Federal Bureau of Investigation, and our partners in the four northern counties.

Samples of these attachments were saved and forwarded for forensic examination to these agencies.

The fact that these emails were addressed as originating from people on recipients’ contact lists indicates that security credentials on the system have been compromised.

The US Cybersecurity and Infrastructure Security Agency (CISA) reports that similar intrusion attempts have been reported recently, throughout the US, in an effort to cripple our country’s critical infrastructure (Financial, Food Supply, Health Care, Public Works, Water Supply, etc. systems.)

We encourage you to take the following steps:

    • Ensure that your software and operating system are updated regularly, and that security patches are installed on your machine(s).
    • Check the security and privacy settings on your computer and cell phone to ensure that the default settings (that usually allow information sharing with third parties) are set to the safest level.
    • Be extremely cautious of, or avoid using free applications, and outdated or unlicensed software.
    • Clean your computer of cookies and trackers regularly.
    • Disable auto-play on your devices, which allows programs to play or run as soon as the media devices get attached to the computer (this feature is turned on by default in Windows).
    • If you notice any unusual behavior of your hardware (computer turning on and off automatically, etc..), or anything that may seem minor at the time; please report it to CISA : https://www.cisa.gov/uscert/report.
    • Something seemingly minor may be a sign of something more serious that could easily, and rapidly spread beyond one computer.
    • Do not open any attachments that may seem the least bit unusual, even if it appears to come from a trusted source. Many recent malicious attachments have been sent out appearing to come from trusted contacts on recipients’ computer systems. If possible, call and verify that the attachment was sent by the person, and ensure that it is legitimate before clicking on any attachment.
    • Use trusted and up-to-date anti-virus software on your computer, cell phone, tablet and other devices.
    • Use a Virtual Provider Network (VPN) when connecting your phone, tablet or computer to public Wi-Fi (restaurant, coffee shop, hotel, etc.). Public systems may allow a third party to access your private information, including passwords.
    • Avoid connecting portable storage (USB drives, portable drives, etc..) from unknown sources. They could easily contain malware.
    • Be sure that you carefully read the address line of your browser to ensure that you are being directed to a legitimate site. Many times, cyber criminals use people’s impatience against them by creating sites that mimic legitimate ones by changing one character of the address line.
    • Hover over links before clicking (the actual address that you will be directed to will be found in the bottom left corner of your screen).
    • As always, be wary of anyone asking for immediate payment from you, especially if the call or email is unsolicited (you didn’t contact them first).
    • Be sure to share information about any suspicious emails, or attempted computer intrusions with friends, business associates and law enforcement.

For more information and updated advisories go to: https://www.cisa.gov/shields-up

 

Facebooktwitterpinterestmail

Join the discussion! For rules visit: https://kymkemp.com/commenting-rules

Comments system how-to: https://wpdiscuz.com/community/postid/10599/

Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

23 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
The king
Guest
The king
2 years ago

Should the local airport hub be in fortuna? Eureka airport is 20 minutes north of actual eureka, deep in the fog. Why not 20 minutes south, away from the fog? I am thinking, plenty of runway space. Seems to simple I suppose.

Permanently on Monitoring
Guest
Permanently on Monitoring
2 years ago

City of Fortuna attacked by Russians!

There is so much malware, so many viruses, so much software generating junk into user accounts, that it may be time to dump your smartphone, get an Apple, and use SAAS, instead of loading apps…

I am also distressed by the installation of “cookies” by almost any website accessed…

Clear your cookies, your browsing history, use secure passwords generated by a password service or your browser itself…

Watch your bank accounts and your investment accounts carefully, and never give out personal information over your devices…

There is no longer privacy, and as soon as you buy a cell phone, a TV, or subscribe to content, or use a browser, everything about you becomes known…

The latest assault: Junk Texts!

Don’t answer your phone. Ever. Unless you can clearly see who is calling.

If it’s a real caller, they will leave a voicemail.

mlr the giant squirrel in Eureka
Guest
mlr the giant squirrel in Eureka
2 years ago

Russia targeting Fortuna city emails? Seems unlikely. What’s the evidence it’s Russia and not Ukraine or China or Kenya or a host of other possibilities?

Flash Gordon
Guest
Flash Gordon
2 years ago

Wow. How long have you been working for Putin?

Thesteve4761
Guest
Thesteve4761
2 years ago

How do you think saas systems operate? Right. With cookies.

In my experience, real callers don’t leave voicemails. They text.

BigRick
Guest
2 years ago

Someone has been hacking into the computer system at my work for the past four years now. We keep finding background pictures from my computer ending up as the background picture on a computer on the other end of town which isn’t even connected to our network but can only be possibly connected through name of the business owner.

Super suspicious because it seems to happen after I login to Amazon. I even have a password that’s about thirty characters long with letters numbers and symbols which is completely impossible to remember kept on a flash drive.

Its not russia, its somebody else and its been happening for about 4 years.

Winston1984
Member
Winston1984
2 years ago
Reply to  BigRick

You’re right, it’s not Russia. But Russia will be blamed for the coming cyber attacks and hacks that will severely disrupt our lives.

ABA
Guest
ABA
2 years ago
Reply to  Winston1984

If they’re responsible for them, which they probably will be.

mlr the giant squirrel in Eureka
Guest
mlr the giant squirrel in Eureka
2 years ago
Reply to  BigRick

Sounds like an internal prank by another employee that’s working

Donald
Guest
Donald
2 years ago
Reply to  BigRick

If your on Windows it automatically happens if you have both computers with the same Microsoft Profile, it doesn’t have to be on the same network.

BigRick
Guest
2 years ago
Reply to  Donald

Thank you Donald! I will look into this next week!!

Todd
Guest
Todd
2 years ago

It’s becoming more and more clear why Humboldt is bought and paid for by the United Nations there’s something to this county that we don’t know about

TM May
Guest
TM May
2 years ago
Reply to  Todd

Wow. Missed you at the Q meeting the other night. Hope you talk to someone -real- soon.

grey fox
Member
2 years ago

Well, Fortuna is an international hub for finance and global political positioning, so of course Russia will attack there first. Or it could be a bored 13 year old with hacking skills…

Jim Brickley
Guest
Jim Brickley
2 years ago
Reply to  grey fox

They don’t call it the “Friendly City” for nothing!

Non-Native
Guest
Non-Native
2 years ago
Reply to  grey fox

Best comment award! 😂😂

Derek Howard
Member
Derek Howard
2 years ago
Reply to  grey fox

Unfortunately, modern attacks can be highly automated. For instance, the recent Hafnium exploit for Microsoft Exchange email servers saw over 30,000 different US organizations infiltrated by a hacker group sponsored by the CCP. This wasn’t some concentrated meticulous attack on each one; it was all automated. Tell your attack to use a new exploit and target all 1,541,605,760 USA IP addresses, and bam.

In this case, it’s just an email campaign coming from a foreign address with some virusy attachments. My organization has been getting the same thing for a month now (totaling probably over 10,000 virus emails) but we have successfully blocked them from reaching our users after being alerted to the situation.

Donald
Guest
Donald
2 years ago

Just use Linux.

Green Shirt
Guest
Green Shirt
2 years ago

Ubuntu does not seem to be very popular here, although a simple switch from Windows would save so many people from so many unnecessary expenses and headaches.

Free and Open Source software has come a long way from the days when your weird “geek” friend stayed up all night with a bottle of No Doz and Slackware on floppy disks.

The Trinidad and Tobago Computer Society has put together 90 of the most popular Free and Open Source programs for the use of any home or business that uses Microsoft Windows on their computers, right here:

https://www.ttcs.tt/osswin/

Or you can run the Gnu/Linux operating system off of your optical drive or a USB stick:

https://www.knopper.net/knoppix/index-en.html

to stay safe online during this crisis.

It’s kind of silly not to.

Brandon
Guest
Brandon
2 years ago

Thanks to Putin’s lap dog Trump who weakened Americas global internet cyber security program. Expect more of this, your bank accounts to be empty and all credit and debit cards to cease working.

Last edited 2 years ago
NotConvinced
Guest
NotConvinced
2 years ago
Reply to  Brandon

TDS much?

Derek Howard
Member
Derek Howard
2 years ago
Reply to  NotConvinced

No worse than ODS or BDS, to be honest.

Alan Edwards
Guest
2 years ago

To keep track of the evolution of the threat landscape, Fortuna’s Cyber Policy Initiative updates this timeline with data provided by the Cyber Threat Intelligence unit of BAE Systems.