crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Integrated Business Technologies at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 18 December 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Business Computing Best Practices Microsoft Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Malware Backup Email Business Software Data Mobile Devices IT Support Hardware Network Small Business Server Smartphones Communication Upgrade Computer VoIP Business Continuity Efficiency Mobile Device Management Innovation Google Windows Data Backup Disaster Recovery Microsoft Office Virtualization Outsourced IT Tech Term Holiday Social Media Network Security Miscellaneous Mobile Office Vendor Management Productivity Gadgets Quick Tips Passwords BYOD User Tips Mobile Computing Android Browser Smartphone WiFi Bring Your Own Device Internet of Things Remote Monitoring Data Recovery Managed IT services Windows 10 Operating System Best Practice Users Spam Ransomware The Internet of Things Trending Apple Data Management Collaboration Remote Computing Artificial Intelligence Wireless Technology Alert Save Money Firewall Content Filtering Customer Relationship Management Unified Threat Management Office History Encryption Going Green Gmail IT Consultant Maintenance App Cloud Computing Antivirus Managed IT Big Data Router IT Support Printer Managed IT Services Tech Support Information Technology Current Events Analytics IT Solutions Lithium-ion Battery Facebook Employer-Employee Relationship Website Customer Service Hard Drives Document Management Two-factor Authentication Mobile Device Windows 8 Applications Humor Phishing Saving Time Bandwidth Wi-Fi Avoiding Downtime Paperless Office Fax Server Hacking Computers Outlook Health Digital Payment Healthcare VPN Marketing Excel Risk Management Automation Government Office Tips Retail Compliance IT service Chrome Phone System Apps Application Business Growth Project Management Virus Cybersecurity Help Desk Unified Communications Proactive IT Office 365 Computer Repair User Error Point of Sale Mouse Co-Managed IT Password Windows 10 Data Security Net Neutrality Social Downtime Presentation Infrastructure File Sharing Budget PowerPoint Social Networking Scam Inbound Marketing Tablet Recovery Vulnerability Money Information Blockchain Regulations Managed Service iPhone Running Cable Licensing BDR Wireless Files Administration Training Augmented Reality Remote Monitoring and Management Storage Mobility Smart Technology Robot Sports Mobile Security Printing Statistics IoT End of Support LiFi Computing Company Culture Twitter Competition Network Congestion Tip of the week eWaste IBM Search Virtual Desktop USB Wearable Technology Business Owner Conferencing Display Hacker Alerts Programming Remote Workers User Analyitcs Education Data loss Intranet Safety Specifications HIPAA Settings Business Intelligence Cost Management Recycling Redundancy Save Time Cybercrime Flexibility Hosted Solution Machine Learning Hiring/Firing Data storage Piracy IT Management Internet Exlporer communications Hacks Bookmarks Online Currency 5G PDF People Private Cloud SharePoint Test Scary Stories Connectivity Gaming Console Enterprise Content Management Computer Accessories Network Management Electronic Medical Records Business Technology Favorites WPA3 Migration Public Cloud Downloads Distributed Denial of Service RMM Domains Vulnerabilities Hotspot Networking Multi-Factor Security Instant Messaging Fun Fleet Tracking Chatbots Sync Star Wars Software Tips Managed IT Service Monitors Tech Terms Word Monitoring Public Speaking Geography Touchscreen Language Virtual Reality Deep Learning Mobile Device Managment Google Calendar Google Wallet Finance Cortana Asset Tracking Identity Utility Computing Break Fix Writing Theft Adminstration Consulting 3D High-Speed Internet Server Management Computing Infrastructure SaaS Techology Legislation Drones Authentication Knowledge OneNote Environment Dark Web Social Engineering Financial Buisness Identities Managed Services Provider Development Cooperation Samsung Chromebook Disaster Resistance Debate G Suite Backups Authorization Experience Employee-Employer Relationship Troubleshooting Motherboard Heating/Cooling Hard Drive Data Warehousing CIO Solid State Drive E-Commerce Cables Consumers Patch Management Staff PC Care Crowdfunding IT Consulting Travel Software as a Service Legal Employees Value Scheduling Modem Cache eBay Microsoft Excel Alt Codes Features IP Address Wires Remote Support Operations Leadership Politics Data Breach New Additions Meetings Technology Tips Zero-Day Threat Skype Streaming Media Cookies Print Server Refrigeration Management Text Messaging Disaster YouTube Typing Electronic Health Records Work Station Virtual Private Network Telephony Technology Laws Congratulations Comparison Google Drive Backup and Disaster Recovery LinkedIn Nanotechnology Law Firm IT Enterprise Resource Planning Video Surveillance Digital Signature How To Permissions How To Cryptocurrency Cyberattacks Windows 8.1 Update MSP IT Technicians Memory Unified Threat Management Identity Theft Black Friday Google Docs Human Error Best Available Laptop Screen Reader Mobile Assessment Fraud Bitcoin Read Only Proactive Macro Documents Mirgation Access Control Cyber Monday Permission Halloween Entrepreneur Smart Tech Bluetooth Undo Managing Stress

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...