Hoboken government recovering from ransomware attack as Conti-linked gang takes credit

Avatar

The city of Hoboken is still recovering from a recent ransomware attack that required it to bring in several federal law enforcement agencies for assistance. 

In an update on Wednesday afternoon, the New Jersey city of more than 60,000 said it was making progress in its recovery and asked for “continued patience” while it restores all of its systems. 

“The City is actively working with the Hoboken Police Department, federal law enforcement agencies, and IT specialists to thoroughly investigate the cause and extent of the incident,” it explained

“The Hoboken Parking Utility service window has resumed accepting credit card payments, and the majority of City staff and departments can now be contacted via email. Response times may be delayed.”

Other departments, including the Office of Vital Statistics, can only be contacted by phone. The city did not respond to requests for comment about whether a ransom would be paid or whether Wi-Fi and email services at City Hall had been restored. 

The attack was confirmed one day before the Thanksgiving holiday, continuing a longstanding trend of ransomware gangs specifically going after governments and businesses when IT staff members are typically on vacation. 

On Sunday, the city said many citizen services like temporary “no parking” signs and other permits were still available in spite of the attack. But many services could only be obtained using cash or check payments. 

The ThreeAM ransomware gang said Wednesday that it was responsible for the attack, posting the city on its leak site. The gang did not say what data was stolen or how much was taken. 

Recorded Future ransomware expert Allan Liska said the gang is likely tied to the Conti family of ransomware gangs. Conti was one of the most prominent cybercriminal operations but shuttered after drawing global infamy for the near total shutdown of the Costa Rican government in 2022. 

The gang’s ransomware is written in the Rust coding language and is not based on older code, according to Liska.

“It’s been around for about a year and the attackers seem to be skilled, but it is not huge, which may mean the group isn’t using a ransomware-as-a-service model,” he said. 

“But they have hit some big targets like Brunswick Hospital Center. In the last year and three months it has listed about 50 victims on its extortion site.”

Experts from Chainalysis saw blockchain evidence tying members of ThreeAM to the Royal ransomware gang — which is responsible for several notable attacks including an incident that severely damaged the city of Dallas last year. 

Researchers at Symantec also saw some hackers deploying ThreeAM ransomware after failing to deploy the LockBit ransomware, illustrating the often murky cross-pollination within the cybercriminal ecosystem.

CybercrimeGovernmentNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

British telecoms giant BT confirms attempted cyberattack after ransomware gang claims hack

Next Post

Russian state hackers hijacked rival servers to spy on targets in India, Afghanistan

Related Posts

U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe

The U.S. Treasury Department has announced that it's removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North Korea-linked Lazarus Group to launder their ill-gotten proceeds. "Based on the Administration's review of the novel legal and policy issues raised by use of financial sanctions against financial and commercial activity occurring
Avatar
Read More

Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

“A boxer derives the greatest advantage from his sparring partner…” — Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and—BANG—lands a right hand on Blue down the center. This wasn’t Blue’s first day and despite his solid defense in front of the mirror, he feels the pressure.
Avatar
Read More

Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds

Everybody knows browser extensions are embedded into nearly every user’s daily workflow, from spell checkers to GenAI tools. What most IT and security people don’t know is that browser extensions’ excessive permissions are a growing risk to organizations. LayerX today announced the release of the Enterprise Browser Extension Security Report 2025, This report is the first and only report to merge
Avatar
Read More