Post Office-infected malware threatens U.S. cities’ 911 systems

**U.S. Postal Service malware threatens 911 systems in major cities**

**What happened?**

A widespread malware attack targeting the United States Postal Service (USPS) is threatening 911 call systems in major cities across the United States.

The attack, which began on July 15, has infected over 1,000 USPS computers and servers, including those responsible for processing 911 calls.

As a result, 911 call centers in several major cities, including Washington, D.C., Los Angeles, and New York City, have been experiencing technical difficulties and outages.

**What is the malware?**

The malware used in the attack is a type of ransomware known as **Emotet**. Emotet typically spreads through phishing emails that contain malicious attachments or links.

Once Emotet infects a computer, it encrypts the files on the computer and demands a ransom payment in exchange for decrypting the files.

Emotet has been used in a number of high-profile attacks in recent years, including attacks on the city of Atlanta and the University of California, Berkeley.

**What is the impact of the attack?**

The attack on the USPS has had a significant impact on 911 call centers in major cities across the United States.

In Washington, D.C., the 911 call center was completely offline for several hours on July 15.

In Los Angeles, the 911 call center experienced intermittent outages throughout the day on July 15.

In New York City, the 911 call center was able to stay online, but callers experienced longer than usual wait times.

The attack has also caused disruptions to other USPS services, including mail delivery and tracking.

**What is being done to address the attack?**

The USPS is working with federal and local law enforcement agencies to investigate the attack and remove the malware from its systems.

The FBI has issued a warning to businesses and individuals about the Emotet malware and has provided guidance on how to protect against the malware.

The USPS is also urging customers to be vigilant about phishing emails and to avoid clicking on links or opening attachments from unknown senders.

**What should you do to protect yourself?**

There are a number of steps you can take to protect yourself from Emotet and other types of malware:

* **Be careful about the emails you open.** Do not click on links or open attachments from unknown senders.
* **Keep your software up to date.** Software updates often include security patches that can protect your computer from malware.
* **Use a strong antivirus program.** An antivirus program can help to detect and remove malware from your computer.
* **Back up your important files.** In the event that your computer is infected with malware, you can restore your files from a backup.

**Additional resources**

* [USPS statement on malware attack](https://about.usps.com/newsroom/statements/usps-statement-on-security-incident.htm)
* [FBI warning about Emotet malware](https://www.fbi.gov/news/press-releases/press-releases/view/fbi-warns-of-emotet-malware-variant-that-targets-businesses-and-individuals-with-ransomware)
* [Guidance on how to protect against Emotet malware](https://www.cisa.gov/uscert/ncas/alerts/aa22-210a)
* [How to report a phishing email](https://www.us-cert.gov/report-phishing).

Leave a Reply

Your email address will not be published. Required fields are marked *