Anonymous ID: e2e48e Nov. 14, 2020, 4:30 p.m. No.11647999   🗄️.is 🔗kun   >>8082 >>8167 >>8202 >>8225

reminder from late September: https://qresear.ch/?q=tyler+technologies

 

Software vendor Tyler Technologies tells U.S. local government clients it was hacked

 

https://www.reuters.com/article/uk-tyler-tech-cyber-idUSKCN26F02S

Anonymous ID: e2e48e Nov. 14, 2020, 4:42 p.m. No.11648167   🗄️.is 🔗kun   >>8202 >>8225

>>11647999

 

this software is used to share election data

 

Tyler Technologies paid ransomware gang for decryption key

 

On September 23rd, Tyler Technologies suffered a cyberattack by the RansomExx ransomware operators, who were also behind recent attacks on Konica Minolta and IPG Photonics.

 

In response to the attack, Tyler Technologies immediately disconnected portions of their network to contain the ransomware's spread and limit their clients' exposure.

 

"Early this morning, we became aware that an unauthorized intruder had disrupted access to some of our internal systems. Upon discovery and out of an abundance of caution, we shut down points of access to external systems and immediately began investigating and remediating the problem," Tyler Technologies CIO Matt Bieri emailed clients.

 

The attack caused significant disruption to Tyler Technologies operations, it was contained locally and did not spread to their clients.

 

Sources in the public sector have told BleepingComputer that the ransomware attack severely impacted Tyler Technologies and that the company expected it would take thirty days to recover operations fully.

 

A source told BleepingComputer that Tyler Technologies paid the RansomExx ransom demand to recover encrypted data.

 

It is not known, though, how much was paid to receive a decryption key.

 

When the ransomware encrypted Tyler Technologies' files, they appended an extension similar to '.tylertech911-f1e1a2ac.'

 

To prove that the decryptor was valid, BleepingComputer was able to decrypt encrypted files [1, 2] uploaded to VirusTotal at the time of the ransomware attack.

 

When decrypted, the Arin.txt file contained a list of IP ranges used by the company.

 

RansomExx is also known to steal data before encrypting devices on a network. The ransomware operators then threaten to release this stolen data unless a victim paid the ransom.

 

As many school districts, court systems, and local and statement governments in the United States are Tyler Technologies customers, the risks of the public leaking of sensitive information and source code is concerning.

 

This concern may have been a driving factor in the decision to pay the ransom.

 

When asked about the decryptor, Tyler Technologies did not dispute the ransom payment, but told BleepingComputer that they could not disclose any further information at this time.

 

https://www.bleepingcomputer.com/news/security/tyler-technologies-paid-ransomware-gang-for-decryption-key/