crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Integrated Business Technologies at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 23 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Privacy Tip of the Week Managed Service Provider Business Management Microsoft Internet Saving Money Cloud Productivity Business Computing Workplace Tips IT Services Best Practices Backup Hackers Hosted Solutions IT Support Business Network Mobile Devices Hardware Malware Email Small Business Software Smartphones Data Communication Server Upgrade Windows Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Disaster Recovery Google Efficiency Computer Miscellaneous Mobile Office Vendor Management Gadgets Quick Tips Innovation Holiday Social Media WiFi Windows 10 BYOD User Tips Mobile Computing Bring Your Own Device Passwords Remote Monitoring Smartphone Best Practice Spam Android Wireless Technology Browser Trending Operating System Users Apple Content Filtering Remote Computing History Alert Going Green Internet of Things The Internet of Things Managed IT services Unified Threat Management Printer Big Data Office Information Technology Current Events Outsourced IT Data Management IT Solutions Save Money Lithium-ion Battery Firewall IT Consultant Network Security Ransomware Customer Relationship Management Windows 8 Gmail Managed IT Tech Support Humor Saving Time Analytics Avoiding Downtime Facebook Maintenance App Hard Drives Outlook Health Phishing IT service Digital Payment Artificial Intelligence Business Growth Marketing Risk Management Excel Employer-Employee Relationship Customer Service Hacking Computers Data Backup Phone System Apps Application Collaboration Virus Fax Server Office Tips Antivirus Retail Running Cable Social Mobile Device VPN PowerPoint Router Inbound Marketing Tablet Password iPhone Administration Presentation Training Two-factor Authentication Budget Automation Proactive IT Computer Repair User Error Mouse Co-Managed IT Recovery Analyitcs Money Education Document Management Data Recovery Safety Specifications Net Neutrality IBM Settings Licensing Wireless Chrome Hosted Solution Cybercrime Save Time File Sharing Data storage Social Networking Hiring/Firing Cybersecurity Display Project Management Robot Printing Mobility End of Support Website Office 365 Statistics LiFi Computing Intranet Competition Business Intelligence Network Congestion Downtime Files Augmented Reality Applications Search Piracy Virtual Desktop USB Business Owner Help Desk Sports Encryption Hacker User Programming Point of Sale Tip of the week IP Address Company Culture Technology Laws Twitter Regulations YouTube Typing Comparison Mobile Device Managment Disaster Touchscreen Google Drive Refrigeration Unified Threat Management How To Bandwidth Cryptocurrency Black Friday Productivity Adminstration Digital Signature Virtual Private Network 3D Google Docs Cost Management Access Control Memory Flexibility Bitcoin Laptop Cyber Monday Travel Wearable Technology Redundancy Wi-Fi Documents SharePoint Conferencing communications Hacks Scam Halloween Entrepreneur Alerts PC Care Undo 5G PDF Downloads People Value SaaS Scheduling Unified Communications eBay Scary Stories Networking Remote Support Leadership Skype Multi-Factor Security Streaming Media Government New Additions Text Messaging Print Server Software Tips Data Security Work Station Monitors Domains Fun LinkedIn Google Calendar Telephony Congratulations Deep Learning Video Surveillance Google Wallet Word Law Firm IT Windows 8.1 Update Techology Recycling Writing Public Speaking Cortana eWaste Best Available Legislation IT Support Drones Disaster Resistance Social Engineering Macro Buisness Identities Knowledge Environment Private Cloud Managed IT Services Backups Bluetooth Online Currency IT Consulting Samsung CIO Solid State Drive Experience Troubleshooting Software as a Service Debate Public Cloud Data loss Gaming Console Computer Accessories Legal Heating/Cooling Consumers Data Breach Crowdfunding Compliance Alt Codes Technology Tips Sync

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...