crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Integrated Business Technologies at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 20 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Best Practices Productivity Workplace Tips IT Services Hosted Solutions Backup Hackers Email Malware Mobile Devices Software IT Support Business Small Business Hardware Network Data Server Smartphones Communication Upgrade Business Continuity VoIP Windows Mobile Device Management Efficiency Microsoft Office Disaster Recovery Computer Google Virtualization Miscellaneous Innovation Mobile Office Vendor Management Social Media Holiday Gadgets Outsourced IT Mobile Computing Quick Tips Passwords Android Smartphone BYOD User Tips Network Security WiFi Data Backup Browser Windows 10 The Internet of Things Managed IT services Best Practice Ransomware Bring Your Own Device Spam Remote Monitoring Internet of Things Users Trending Operating System Apple Tech Term Remote Computing Wireless Technology Alert Data Management Firewall Content Filtering Data Recovery Artificial Intelligence History Gmail Going Green Save Money IT Consultant Encryption App Customer Relationship Management Unified Threat Management Managed IT Printer Tech Support Information Technology Big Data Current Events Office Analytics IT Solutions Lithium-ion Battery Facebook Maintenance Hard Drives Cloud Computing Antivirus Document Management Applications Windows 8 Paperless Office Router Employer-Employee Relationship Humor Saving Time Avoiding Downtime Fax Server Compliance Automation Outlook Office Tips Retail Health Phishing IT service Mobile Device Digital Payment Marketing Chrome Excel Business Growth VPN Risk Management Managed IT Services Website Customer Service Hacking Computers Apps Phone System Application Collaboration Virus Cybersecurity Two-factor Authentication Budget User Error Data Security Co-Managed IT Computer Repair Proactive IT Regulations Recovery Mouse Money Bandwidth Running Cable Social Net Neutrality Licensing Infrastructure PowerPoint Inbound Marketing Social Networking Wi-Fi Unified Communications Tablet Office 365 iPhone Password Project Management Government Training Administration Presentation Augmented Reality Search Mobile Security Virtual Desktop USB Piracy Help Desk Files Mobility Business Owner Sports Hacker User Point of Sale Programming Tip of the week Twitter Company Culture Analyitcs Education Safety Specifications Hosted Solution IBM Settings Flexibility Cost Management Wireless Data storage Cybercrime File Sharing Save Time Scam Wearable Technology Robot Hiring/Firing Vulnerability Productivity Printing Display Alerts End of Support LiFi HIPAA Computing Statistics Data loss Redundancy Intranet Business Intelligence Competition Network Congestion Recycling Downtime Internet Exlporer eWaste Smart Technology Enterprise Content Management Network Management Knowledge Environment CIO Downloads Solid State Drive Bluetooth Networking Migration IoT Distributed Denial of Service Legal Online Currency Gaming Console Samsung Debate Windows 10 Hotspot Experience Troubleshooting Machine Learning Multi-Factor Security Heating/Cooling Alt Codes Computer Accessories Chatbots Star Wars Managed IT Service Consumers Crowdfunding YouTube Language Private Cloud Google Calendar Typing Techology Identity Utility Computing Software Tips Break Fix IP Address Google Drive Server Management Computing Infrastructure How To Public Cloud Legislation Refrigeration Cryptocurrency Disaster Adminstration Touchscreen Disaster Resistance Healthcare Dark Web Google Docs 3D Cooperation Sync Bitcoin Digital Signature IT Consulting Motherboard Memory Hard Drive Data Warehousing communications Patch Management Staff Laptop Mobile Device Managment Software as a Service Hacks Modem Conferencing Cache IT Support Microsoft Excel Documents Entrepreneur Scheduling Operations Halloween Data Breach PC Care Technology Tips Undo Cookies Value People Management Blockchain 5G PDF eBay Virtual Private Network Scary Stories Virtual Reality Technology Laws Leadership Travel Comparison Remote Support Nanotechnology Streaming Media Enterprise Resource Planning New Additions Permissions Monitors Skype Deep Learning Print Server Text Messaging IT Technicians SaaS Unified Threat Management BDR Black Friday Domains Google Wallet Work Station Screen Reader Mobile Congratulations Assessment Fraud Fun Writing LinkedIn Word Law Firm IT Video Surveillance Mirgation Access Control Identity Theft Cyber Monday Public Speaking Drones Windows 8.1 Update Smart Tech Managing Stress Macro IT Management Cortana Social Engineering Best Available Buisness Identities Business Technology Storage Telephony SharePoint Connectivity Backups

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...