crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Integrated Business Technologies at (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Business Management Privacy Managed Service Provider Internet Microsoft Cloud Saving Money Productivity Business Computing Workplace Tips Best Practices IT Services Backup Hackers Hosted Solutions Email Small Business IT Support Business Mobile Devices Malware Software Network Hardware Smartphones Data Communication Server Windows Upgrade Business Continuity Mobile Device Management VoIP Virtualization Efficiency Microsoft Office Google Disaster Recovery Mobile Office Vendor Management Computer Miscellaneous Gadgets Holiday Innovation Android Social Media Quick Tips Outsourced IT User Tips Smartphone Windows 10 Mobile Computing BYOD WiFi Best Practice Passwords Remote Monitoring Browser Bring Your Own Device Internet of Things Users The Internet of Things Network Security Wireless Technology Trending Operating System Apple Spam History Firewall Alert Managed IT services Content Filtering Going Green Remote Computing Managed IT Information Technology Current Events Ransomware Unified Threat Management Analytics Gmail IT Solutions Data Backup Lithium-ion Battery Save Money IT Consultant Printer Big Data Tech Support Office Data Management Artificial Intelligence Avoiding Downtime Maintenance Hard Drives App Customer Relationship Management Encryption Facebook Windows 8 Antivirus Humor Saving Time Apps Application Risk Management Automation Virus Office Tips Retail Fax Server Phishing Data Recovery Outlook IT service Health Phone System Business Growth Marketing Employer-Employee Relationship Excel Customer Service Hacking Computers Document Management Collaboration Two-factor Authentication Digital Payment Data Security Budget VPN PowerPoint Training Cybersecurity Tablet Recovery Money User Error iPhone Co-Managed IT Applications Running Cable Licensing Chrome Administration Augmented Reality Router Inbound Marketing Computer Repair Office 365 Proactive IT Project Management Password Mouse Social Net Neutrality Presentation Mobile Device Search Unified Communications Virtual Desktop File Sharing USB Printing Wearable Technology Business Owner End of Support Social Networking LiFi Computing Hacker Display Tip of the week Alerts Programming User Mobility Help Desk Analyitcs Government Education Safety Intranet Specifications Business Intelligence Settings Wireless Cybercrime Files Save Time Wi-Fi Hiring/Firing Piracy HIPAA Redundancy Scam Website Sports Statistics Bandwidth Point of Sale Managed IT Services Flexibility Hosted Solution Competition Network Congestion Data storage Paperless Office Downtime IBM Mobile Security Robot Distributed Denial of Service Knowledge Environment Travel Hotspot Multi-Factor Security Windows 10 Samsung Virtual Reality Debate Macro Managed IT Service Experience Techology Troubleshooting Conferencing Heating/Cooling Language Google Calendar Consumers Monitors Crowdfunding PC Care SaaS Deep Learning Break Fix Disaster Resistance Value eBay Google Wallet Computing Infrastructure Legislation IP Address Server Management Remote Support Writing Gaming Console Leadership Streaming Media New Additions Dark Web Skype IT Consulting Refrigeration Print Server Cloud Computing Disaster Text Messaging Drones Cooperation Buisness Work Station Social Engineering Telephony Congratulations Identities Data Warehousing LinkedIn Data Breach Cost Management Law Firm IT Software Tips Digital Signature Video Surveillance Backups Staff CIO Software as a Service Windows 8.1 Update Vulnerability Recycling Memory Solid State Drive Microsoft Excel Laptop Best Available Technology Laws Legal Adminstration Operations 3D Technology Tips Virtual Private Network Documents Compliance Entrepreneur Private Cloud Alt Codes Blockchain Halloween Unified Threat Management Undo Bluetooth Infrastructure People YouTube Comparison 5G Online Currency PDF Regulations Access Control Public Cloud Typing Permissions Scary Stories IT Support Computer Accessories Google Drive IT Technicians How To Black Friday SharePoint Sync Cryptocurrency Scheduling Fraud Domains Google Docs Mirgation Cyber Monday Fun Company Culture Business Technology Twitter Downloads Word Mobile Device Managment Bitcoin Internet Exlporer Public Speaking Data loss Touchscreen communications Smart Technology Cortana Networking eWaste Productivity Hacks IT Management

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code