The post Spanish municipality Sanxenxo City Council calls hackers bluff as malware takes over network appeared on BitcoinEthereumNews.com. The Sanxenxo City CouncilThe post Spanish municipality Sanxenxo City Council calls hackers bluff as malware takes over network appeared on BitcoinEthereumNews.com. The Sanxenxo City Council

Spanish municipality Sanxenxo City Council calls hackers bluff as malware takes over network

The Sanxenxo City Council, in Pontevedra, in the autonomous community of Galicia, is currently living through a cyberattack that has resulted in a standoff between the City Council and the hackers who have made their demands known. 

The city has signaled plans to move forward without paying the $5,000 BTC ransom required to release encrypted data in an attack that has compromised thousands of administrative documents from the Sanxenxo City Council in Spain.

What happened to Sanxenxo City Council in Pontevedra

According to recent reports, hackers got into the City Hall’s internal systems on January 26, 2026, locking it up and encrypting thousands of documents. This prevents access to essential information and makes it impossible for officials to work. 

The incident has been confirmed by the government itself and cited in local news reports. The hackers reportedly used malware to infiltrate the main network, and as a result of the attack, the municipal server became completely inoperative, affecting essential services for residents that are processed at the main office.

Fortunately, not all areas of the municipality were affected by the attack. The municipal companies Nauta and Turismo were unaffected by the attack, but this is reportedly because they operate on independent networks. 

The City Hall’s online portal also remained operational, allowing citizens to continue their procedures online. 

What the hackers want 

The attackers have demanded a ransom of $5,000 in Bitcoin (BTC) to restore the files, a meager amount considering the bargaining chip they have, which is relatively vanilla for an attack of this magnitude. This could mean the perpetrators are small time or one-off criminals rather than a sophisticated group that has been linked to greater exploits in the US. 

The demands have also mostly gone ignored by the municipality, whose officials refused to pay the ransom. They instead filed a formal complaint with the Civil Guard and activated daily backups. 

The backups are expected to restore the systems within the next few hours. However, Mayor Telmo Martín has revealed that despite hopes things can be restored in the next 24 to 48 hours, the process may take longer was originally anticipated. 

Ransomware attacks are targeting Spanish municipalities 

The incident in Sanxenxo is not a standalone case and is part of an increase in ransomware attacks targeting local governments in Spain. 

These ransomware attacks started becoming rampant in 2025, with similar incidents reported in municipalities such as Badajoz, Melilla, and Villajoyosa. The attack on Badajoz was particularly severe as it blocked administrative procedures for a population of nearly 150,000.

This year, aside from Sanxenxo, areas like Beniel, a municipality in the Region of Murcia, and Adeje, in Tenerife, also faced cyberattacks that rendered their digital systems inoperable.

In the town hall of Adeje, in Tenerife, the municipal website was temporarily shut down because unauthorized access was detected, and security protocols were activated. 

The major difference between the previous cases that have been reported and the most recent one, which targeted the Sanxenxo City Council’s City Hall, is that in Sanxenxo’s case, the hackers demanded $5,000 in ransom. 

Meanwhile, there have been no reports of ransom demands in Bitcoin from other municipalities. But this could represent a pivot from the established trend, which could open the floodgates for demands when the incident happens.

Don’t just read crypto news. Understand it. Subscribe to our newsletter. It’s free.

Source: https://www.cryptopolitan.com/sanxenxo-city-council-malware-takes-over/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags:

You May Also Like

The Future of Metalworking: Advancements and Innovations

The Future of Metalworking: Advancements and Innovations

The demand for precision and efficiency in manufacturing processes continues to rise, leading to groundbreaking advancements in metalworking. This sector constantly
Share
Techbullion2026/02/07 19:24
Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

The post Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum appeared on BitcoinEthereumNews.com. A crypto whale lost more than $6 million in staked Ethereum (stETH) and Aave-wrapped Bitcoin (aEthWBTC) after approving malicious signatures in a phishing scheme on Sept. 18, according to blockchain security firm Scam Sniffer. According to the firm, the attackers disguised their move as a routine wallet confirmation through “Permit” signatures, which tricked the victim into authorizing fund transfers without triggering obvious red flags. Yu Xian, founder of blockchain security company SlowMist, noted that the victim did not recognize the danger because the transaction required no gas fees. He wrote: “From the victim’s perspective, he just clicked a few times to confirm the wallet’s pop-up signature requests, didn’t spend a single penny of gas, and $6.28 million was gone.” How Permit exploits work Permit approvals were originally designed to simplify token transfers. Instead of submitting an on-chain approval and paying fees, a user can sign an off-chain message authorizing a spender. That efficiency, however, has created a new attack surface for malicious players. Once a user signs such a permit, attackers can combine two functions—Permit and TransferFrom—to drain assets directly. Because the authorization takes place off-chain, wallet dashboards show no unusual activity until the funds move. As a result, the assets are gone when the approval executes on-chain, and tokens are redirected to the attacker’s wallet. This loophole has made permit exploits increasingly attractive for malicious actors, who can siphon millions without needing complex hacks or high-cost gas wars. Phishing losses The latest theft highlights a wider trend of escalating phishing campaigns. Scam Sniffer reported that in August alone, attackers stole $12.17 million from more than 15,200 victims. That figure represented a 72% jump in losses compared with July. According to the firm, the most significant share of August’s damages came from three large accounts that accounted for nearly half…
Share
BitcoinEthereumNews2025/09/19 02:31
WHALE ALERT: $351 MILLION Bitcoin Dump Incoming

WHALE ALERT: $351 MILLION Bitcoin Dump Incoming

One crypto whale transferred 5,000 Bitcoin, which is worth about 351 million, to Binance. Ash Crypto reported this transfer. It happened only several days after
Share
Coinfomania2026/02/07 19:36