The City of Gloversville, New York, has fallen victim to a ransomware attack, discovered on October 27, 2025. The attack disrupted municipal computer systems and resulted in the exfiltration of sensitive data, including payroll records and bank account numbers for current and former city employees. The unidentified threat actors initially demanded a $300,000 ransom. After negotiations, the city council approved a payment of $150,000 to secure the return of the stolen information. This incident is another example in a long trend of financially motivated cyberattacks targeting local governments, which are often perceived as having limited cybersecurity resources and a high incentive to pay to restore critical services.
The attack was a classic double-extortion ransomware incident. The threat actors gained unauthorized access to the city's network, exfiltrated sensitive data (T1041 - Exfiltration Over C2 Channel), and then encrypted systems to disrupt operations (T1486 - Data Encrypted for Impact). The appearance of a ransom note on a city server on October 27 was the first sign of the compromise.
The theft of payroll data, including employee bank account numbers, significantly increased the pressure on the city to pay. This data could be used for identity theft and financial fraud against employees, creating a duty of care for the city to prevent its public release. The decision to pay a partial ransom reflects a difficult calculation made by many victim organizations, weighing the cost of the ransom against the potential costs of data recovery, regulatory fines, lawsuits, and long-term harm to affected individuals.
The specific ransomware group and initial access vector have not been disclosed. However, attacks on municipalities commonly exploit one of several weaknesses:
T1566 - Phishing): An employee is tricked into opening a malicious email attachment or clicking a link, leading to credential theft or malware installation.T1133 - External Remote Services): Attackers exploit vulnerabilities in public-facing services like Remote Desktop Protocol (RDP) or VPNs that are not properly secured or patched.Once inside the network, the attackers would have performed reconnaissance to locate the most valuable data (payroll records) and critical systems before deploying the ransomware.
D3FEND Technique: Early detection of ransomware precursors can be achieved through
D3-PA - Process Analysisand monitoring for unusual file access withD3-RAPA - Resource Access Pattern Analysis.
D3FEND Countermeasure: The most effective mitigation against ransomware's impact is a robust backup and recovery strategy, falling under the
Restorecategory.
The most effective defense against being forced to pay a ransom is having tested, offline, and immutable backups.
Segmenting the network can prevent ransomware from spreading from one compromised system to all critical assets.
Mapped D3FEND Techniques:
Regular security awareness training helps employees recognize and report phishing attempts, a common initial access vector.
Enforce MFA on all remote access points to protect against attacks using stolen credentials.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats