Public Sector Incident Cost: City Ransomware, Federal Breaches, and Election Infrastructure in 2026
Public sector reports the lowest IBM CODB 2025 sector average at $2.70M per breach, but the headline aggregates two very different regimes. Routine breaches at small agencies sit far below the mean, while municipal ransomware events at cities and counties have repeatedly cleared $17M-$70M in publicly disclosed cost, and federal-scale incidents (OPM 2015, MOVEit 2023, the 2020 SolarWinds federal exposure) routinely run into the hundreds of millions to over a billion. The funding response (Infrastructure Investment and Jobs Act 2021 State and Local Cybersecurity Grant Program, CIRCIA implementation, Federal Zero Trust mandate) has reshaped public-sector security spending materially since 2022.
The Municipal Ransomware Benchmark Set
City and county ransomware events became a defining cost benchmark between 2018 and 2023. The events are well documented because municipal financial reporting is public and city councils typically debate response cost openly. The pattern is consistent: refusing the ransom often costs 20-50x the ransom amount in recovery cost, while paying does not guarantee operational restoration and creates long-tail compliance risk under OFAC sanctions guidance.
| Municipality | Year | Ransom Demanded | Decision | Total Cost |
|---|---|---|---|---|
| Atlanta, GA | Mar 2018 | $51K (BTC) | Refused | ~$17M |
| Baltimore, MD | May 2019 | $76K (BTC) | Refused | ~$18M |
| New Orleans, LA | Dec 2019 | undisclosed | Refused | ~$7M+ |
| Lake City, FL | Jun 2019 | $460K (BTC) | Paid | ~$1.1M total |
| Jackson County, GA | Mar 2019 | $400K (BTC) | Paid | ~$700K total |
| Albany, NY | Mar 2019 | undisclosed | Refused | ~$1M direct |
| Suffolk County, NY | Sep 2022 | undisclosed | Refused | ~$25M+ |
| Dallas, TX | May 2023 | undisclosed | Refused | $8.5M+ direct |
| Oakland, CA | Feb 2023 | undisclosed | Refused | $17M+ disclosed |
| Knoxville, TN | Jun 2020 | undisclosed | Refused | ~$700K direct |
Sources: city council disclosures, post-incident audits, news reporting cross-referenced with city financial statements. Total cost figures include direct response, system replacement, and disclosed productivity loss; they exclude long-tail litigation.
The OFAC Sanctions Issue
OFAC issued advisories in October 2020 and updated guidance in September 2021 making clear that paying a ransom to a sanctioned entity (which includes many of the most prolific ransomware operators) can be a violation of the International Emergency Economic Powers Act and the Trading With the Enemy Act. Penalties reach $311K per violation or twice the value of the underlying transaction, whichever is greater. The advisory does not prohibit ransom payment outright, but it does require attribution due-diligence and creates strict-liability exposure if the operator is later determined to be sanctioned.
For municipal entities specifically, the OFAC issue is acute because city councils must approve ransom payments publicly, which forecloses the path of paying quietly. This has shifted the municipal decision toward refusing to pay (visible across the post-2020 cohort in the table above) and absorbing the much higher recovery cost. The federal preference is clear: the FBI and CISA both formally discourage ransom payment, and CIRCIA reporting requirements (effective once final rule is implemented under 6 USC 681) will require disclosure of paid ransoms, eliminating the option of quiet payment.
Federal-Scale Incidents
Federal-agency incidents operate at a different cost magnitude entirely. The cost stack includes incident response, system replacement, mandated independent forensics (often via a CISA-coordinated firm), Congressional-hearing preparation cost, Inspector General reviews, and credit-monitoring services for affected federal employees that frequently extend to lifetime monitoring for security-clearance-holders.
| Incident | Year | Cumulative Cost | Notes |
|---|---|---|---|
| OPM (PII and SF-86 data) | 2014-2015 | $750M+ | 22M federal employee and applicant records; lifetime monitoring offered |
| SolarWinds (federal scope) | 2020 | undisclosed; estimated $100M+ federal-only | Treasury, Commerce, State, DHS, Energy, Justice all affected |
| Microsoft Storm-0558 (federal email) | 2023 | undisclosed | 25 federal organisations affected; CSRB investigation |
| MOVEit Transfer (federal scope) | 2023 | $400M+ aggregate (federal+state) | CISA, OPM, DOE, USDA, others affected; Cl0p ransomware operator |
| SEC EDGAR breach | 2016 (disclosed 2017) | $10M+ direct | Test filings exfiltrated; insider-trading exposure |
The Funding Response
Public-sector security spending has been reshaped since 2021 by federal funding programs created in response to the municipal-ransomware wave and the federal-incident set. The most material programs:
- State and Local Cybersecurity Grant Program (SLCGP). $1B over four federal fiscal years (FY22-FY25) administered by CISA. Allocations to states by formula, with 80% required to flow to local entities. Average grant per local entity has been $50K-$2M.
- Tribal Cybersecurity Grant Program. $18.2M FY23 baseline, expanding annually. Tribal entities have historically been least funded and most vulnerable.
- FEMA Homeland Security Grant Program. Cyber-eligible categories under SHSP and UASI; aggregate cyber spend $200M+/yr.
- Federal Zero Trust Architecture mandate (OMB M-22-09). Applied to all federal civilian agencies; estimated cumulative implementation cost across CFO Act agencies $2-$5B.
- CISA Cybersecurity Performance Goals (CPG). Voluntary baseline used by underwriters and contracting officers as de-facto required.
The funding has compressed but not eliminated the municipal-incident cost premium. SLCGP grants are typically applied to baseline hygiene (MFA deployment, asset inventory, EDR coverage) rather than incident-response capability. Municipal entities below a $50M annual budget remain under-resourced for credible IR capability, and 2024-2025 incident counts at small towns and rural counties have continued to climb.
Costa Rica: National-Scale Incident Cost
The April 2022 Conti ransomware attack on the Government of Costa Rica is the cleanest national-government-scale incident benchmark available. Conti exfiltrated approximately 670 GB of data from at least 27 government bodies, including the Ministry of Finance. President Rodrigo Chaves declared a national emergency. The Ministry of Finance was effectively offline for weeks; tax-collection systems, customs, and import/export workflows were disrupted. Costa Rican government estimates put direct economic cost at approximately $30M per day during the active incident, with cumulative cost above $200M over the multi-month resolution.
The Costa Rica incident is referenced regularly in CISA, ENISA, and World Bank assessments because it is the first publicly documented case of ransomware producing national-emergency-level economic disruption. It has informed subsequent OECD recommendations on ransomware-payment policy and the 2023-2024 Counter Ransomware Initiative joint statements.