back to article US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware

US newspaper publisher Lee Enterprises is blaming its recent service disruptions on a "cybersecurity attack," per a regulatory filing, and is the latest company to avoid using the dreaded R word. Listed companies have become adept at describing ransomware without actually saying the word in recent times, Lee being one of them …

  1. amanfromMars 1 Silver badge

    Houston, you have a line managing problem..... unhappy bots.

    .... it said processes that were usually automated had to be completed manually. And Lee's CEO Kevin Mowbray thanked the company's journalists for working through the trying period, demonstrating "above-and-beyond efforts to continue reporting the news and maintaining our operations under challenging circumstances."

    Sounds just like something to be said whenever bots throw a strop and go walkabout contemplating the chaos to be inflicted and/or enjoyed in application and demonstration of a programming walkout/indentured systems meltdown.

  2. James O'Shea Silver badge

    Boyz, many years ago I worked for a newspaper. I was System Manager and Pre-Press; i ran all the computers, and in particular I ran the computers which talked to the imagesetter and the platemaker, and so created the film which was burned to plates which were hung on the press. In other words, without Pre-Press there ain't no paper. The imagesetter and platemaker were NOT on the main network; film for the imagesetter was $3/foot (100-foot film canisters, $300/canister) and we did NOT want some bozo in Editorial 'accidentally' sending something to film. We had a server, running A/UX (yeah, it was that long ago) and we had two primitive RAID arrays attached to it externally by SCSI and a DAT tape drive, also on the SCSI chain. And a SyQuest drive, on the SCSI chain, later replaced by a Zip and then a Jaz drive. Why? Because Editorial and Advertising and so on accessed files on the server, which were stored on the RAID arrays, and backed up on DAT tape... and when we needed to send files to file, we would copy the completed files onto a SyPest disk, later onto a Zip or a Jaz disk because everyone hated SyPest with the fury of 10,000 suns, and hand-walk it to the pre-press setup. This meant that we had three copies of all files in use: on the RAID (with an archive, compressed, so that's four copies), on tape, and on various SyPest, Zip, or Jaz disks. We had a fire-resistant file cabinet with tapes and SyPest, Zip, and Jaz disks, plus we sent older tapes/disks out to a 3rd party, so if there was a fire the older stuff would be safe. Literally the only things which would not be stored in multiple copies some of them offline would be the files being worked on that day. Everything else was backed up, including applications and system software. Doing a complete rebuild of the system from go would have been a matter of hours of effort, bringing up essential items and current work, followed by slowly restoring all the files on the RAIDs. Very important stuff was burned to CDs or DVDs and stored elsewhere, so that's five copies.

    I could do this 30 bloody years ago, well before there was such a thing as ransomware; I was thinking of fires, or floods, or theft. There was no cloud; when I started, there was one, just one, modem, running at 33.6 kb/s, replaced by two, just two, running at 56 kb/s, and finally by 500 kb/s 'broadband' to the network. What's these boyz problem why they don't have multiple copies and why they didn't go actively looking for malware or stick their stuff on something unlikely to attract malware, such as BSD? (How much ransomware is available for BSD, anyway?)

    1. PRR Silver badge
      Headmaster

      > many years ago I worked for a newspaper

      As did my Mom, maybe a decade before the era of which you speak. At a county-size daily. I wasn't allowed to see the back room where any tapes must have been, but the terminals in the city room sure pre-dated 33K modems. Much less CD-Rs.

    2. teebie

      "Boyz"

      I misread that as "Boz", which I misremembered as Charles Dickens' pseudonym (Bos) and thought this was a really old story of how journalism was done.

      1. collinsl Silver badge

        Well back in Mr Dickens's's's day they would have had to assemble printing out of character blocks (or possibly word blocks if they were lucky). Later on we got lead casting machines (linotype) which could print out whole lines of text to be assembled into a press much faster than by individual character

    3. Andrew Scott Bronze badge

      Had to move a system from one office to another and had the disk break down when i tried to bring the system back up. Got it booted in 10 minutes but had to restore all the accounts and data. Restored from dat and had a dean walk in at 1am expecting to log in and see all her data. Got it restored before she needed it, but didn't get to go home until 4am. Was back in the office at 8am and no one the wiser. Always tested my backups. Always had a plan for restoration, but like any plan you need flexibility when things fall apart. Problem was a bad solder joint on the molex power connection on a hard drive.

    4. jasonbrown1965

      Rare according to an article on BSD ransomware, see:

      https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/

  3. Eclectic Man Silver badge

    Sounds like ...

    ... Harold MacMillan's claim that several top treasury politicians resigning was

    "A little local difficulty."

    From https://en.wikipedia.org/wiki/Harold_Macmillan see section entitled 'Economy'.

    Hope they recover soon.

  4. Excused Boots Silver badge

    I wonder if that was a ‘sophisticated attach’?. I bet it was, it’s always a ‘Sophisticated Attack’, isn’t it? It’s never, ‘well one of our senior people opened an email from some impoverished Nigerian prince and our protections were about as useful as a tissue-paper condom!’

    No, it’ll be a ’sophisticated and probbaly ‘Nation State’ backed attack won’t it?

    1. Jou (Mxyzptlk) Silver badge

      The seniors who insisted that their single account has to have domain admin and backup admin rights, and ssh without auth (hey, that's what SSO is for...) and ALL=(ALL:ALL) NOPASSWD: ALL.

  5. Gene Cash Silver badge
    Headmaster

    Did they not ask for money?

    It's possible they just burned & pillaged, and didn't ask for money (ransom) in which case it wouldn't be a ransomware attack.

    I assume if they did pay something, they would have to mention it to the SEC and investors as a material fact, but I Am Not A Lawyer. Is that not the case?

  6. Anonymous Coward
    Anonymous Coward

    Comprehensive cybersecurity insurance policy - REALLY?

    I am surprised Lee Enterprises have comprehensive cybersecurity insurance policy. If I was a Cyber Security insurance company, I would be checking the requirements of compliance for their operations, especially in the production arena.

    I was once was a member of third party supplier that provided technical support for Lee E, and I can tell you the equipment to run production would never pass any cyber security checks. Just saying.

    AC for good reasons.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like