{
	"id": "eef0963d-b0fb-4686-a40b-b80691164aa3",
	"created_at": "2026-04-24T02:19:32.013249Z",
	"updated_at": "2026-04-25T02:18:25.248908Z",
	"deleted_at": null,
	"sha1_hash": "86335c9572668f437ca024213ca808baedb54bab",
	"title": "Ransomware attacks airport authority's servers",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 936167,
	"plain_text": "Ransomware attacks airport authority's servers\r\nBy Eric Anderson\r\nPublished: 2020-01-09 · Archived: 2026-04-24 02:13:19 UTC\r\nA crypto virus that attacked the Albany County Airport Authority's computer management provider\r\nduring the Christmas holiday period ended up infecting the authority's servers as well, encrypting\r\nfiles and demanding a ransom payment.\r\nPaul Buckowski/Times Union\r\nCOLONIE — A crypto virus that attacked the Albany County Airport Authority's computer management provider\r\nduring the Christmas holiday period ended up infecting the authority's servers as well, encrypting files and\r\ndemanding a ransom payment.\r\nWatch More\r\nThe authority's insurance carrier authorized payment of the ransom, which airport CEO Philip Calderone only said\r\nwas \"under six figures.\"\r\nArticle continues below this ad\r\nGet Digital Access and Stay Informed With Trusted Local News.\r\nGet Digital Access and Stay Informed With Trusted Local News.\r\nhttps://www.timesunion.com/business/article/Ransomware-attack-cripples-airport-authority-s-14963401.php\r\nPage 1 of 3\n\nONLY 25¢\r\nThe attack came to light after Schenectady-based LogicalNet reported its own management services network had\r\nbeen breached. From there, the virus spread to the authority's servers, including its backup servers. The\r\nLogicalNet contract included providing security for the airport's system, Calderone said Thursday.\r\n\"We have severed our relationship with LogicalNet,\" he added. LogicalNet did not immediately respond to a\r\nrequest for comment.\r\nThe ransom was paid in Bitcoin. The airport authority will seek to recover the $25,000 deductible it paid on its\r\ninsurance policy from LogicalNet. The airport's insurer reimbursed the authority for the rest of the ransom\r\npayment.\r\nMake the Times Union a Preferred Source on Google to see more of our journalism when you search.\r\nAdd Preferred Source\r\nAirport officials said no personal or travelers' information, including credit card numbers and other data, had been\r\naccessed. The attack also didn't affect airport operations and no TSA or airline computers had been breached.\r\nArticle continues below this ad\r\nThe safety and security of the traveling public, airport officials said, was never in jeopardy. Rather, the encrypted\r\nfiles included such items as Excel spreadsheets of budgets and other administrative items, including archived files.\r\nThe authority said it immediately notified the New York State Cyber Command, the FBI, and enlisted assistance\r\nfrom computer systems contractor ABS Solutions. ABS is redesigning the authority's computer system to prevent\r\nfuture attacks.\r\nThe Sodinokibi ransomware implicated in the LogicalNet attack is familiar to investigators. It was used in an\r\nattack discovered on New Year's Eve on London-based Travelex, a worldwide foreign exchange services provider.\r\nIn that ongoing case, the hackers are demanding $6 million in ransom to return five gigabytes of sensitive\r\ncustomer information, which they had been downloading in the past six months, or the information would be sold\r\nonline, the BBC reported.\r\nArticle continues below this ad\r\n\"To date, the company can confirm that whilst there has been some data encryption, there is no evidence that\r\nstructured personal customer data has been encrypted,\" Travelex said in a statement on its website Thursday\r\nevening.\r\nhttps://www.timesunion.com/business/article/Ransomware-attack-cripples-airport-authority-s-14963401.php\r\nPage 2 of 3\n\nThe airport authority's attack, which came to light Christmas Day, wound down by Monday. The Bitcoin ransom\r\nwas paid on Dec. 30, and an encryption key was received two hours later, allowing the airport authority to begin\r\nrestoring its data.\r\n\"Thanks to the fast action by our IT department, airport operations during one of the busiest travel periods of the\r\nyear were not impacted and no passenger or airline data was acquired or accessed,\" Calderone said. \"Within hours\r\nthe authority was able to resume all administrative functions with systems functioning as normal. We are grateful\r\nfor the assistance provided by the New York State Cyber Command, the FBI and our consultant ABS.\"\r\nJan 9, 2020|Updated Jan 10, 2020 6:52 a.m.\r\nFormer Business Editor\r\nEric Anderson is the former editor of the Times Union's business section. Eric also writes the Traveling Man\r\ncolumn for the Times Union's Upstate magazine. \r\nSource: https://www.timesunion.com/business/article/Ransomware-attack-cripples-airport-authority-s-14963401.php\r\nhttps://www.timesunion.com/business/article/Ransomware-attack-cripples-airport-authority-s-14963401.php\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.timesunion.com/business/article/Ransomware-attack-cripples-airport-authority-s-14963401.php"
	],
	"report_names": [
		"Ransomware-attack-cripples-airport-authority-s-14963401.php"
	],
	"threat_actors": [],
	"ts_created_at": 1776997172,
	"ts_updated_at": 1777083505,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/86335c9572668f437ca024213ca808baedb54bab.pdf",
		"text": "https://archive.orkl.eu/86335c9572668f437ca024213ca808baedb54bab.txt",
		"img": "https://archive.orkl.eu/86335c9572668f437ca024213ca808baedb54bab.jpg"
	}
}