Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Telesys Voice and Data at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Saturday, 20 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Business Computing Privacy Productivity Email Business Microsoft Internet Hosted Solutions Windows 10 Software Managed Service Provider Backup IT Services Ransomware Network Security Computer Mobile Devices Android Smartphone Managed IT services User Tips Browser IT Support Outsourced IT Workplace Tips Social Media Hardware Google Communication Disaster Recovery Innovation Efficiency Data Backup Business Continuity Data Data Management Smartphones App Business Management Holiday Upgrade Small Business Office Productivity Cloud Computing WiFi Internet of Things Facebook Microsoft Office Network Data Recovery Server Remote Monitoring Office 365 Windows Miscellaneous Phishing Encryption Tech Term Artificial Intelligence Gmail Spam Big Data Firewall Robot Apps Save Money Paperless Office Hosted Solution Recovery Password Customer Relationship Management Unified Threat Management Bandwidth Managed IT Services Chrome Passwords How To Content Filtering Apple Government Avoiding Downtime Money Work/Life Balance Mobile Device Management Infrastructure Wi-Fi Customer Service Office Tips Employer-Employee Relationship Saving Money Document Management Risk Management Tip of the week Remote Computing Cybersecurity Word Hacker Computing Education IT Management Cybercrime Health Virtual Reality Mobile Device Antivirus Project Management SaaS Hacking BYOD Managed IT Mobile Computing Social Data loss BDR Website Tech Support Operating System Telephone Systems Windows 10 File Sharing Two-factor Authentication Compliance Settings VoIP Business Growth Analytics Vendor Management Presentation The Internet of Things Computers Data Security Alert Applications IT Support Outlook Data storage Meetings Bring Your Own Device Search Router Sports Storage Mobile Security Digital Payment Retail IT service Maintenance Cortana Virtualization Best Practice Computer Care Administration Lithium-ion battery Business Owner Training IT solutions Safety Marketing Wireless Technology Tablet Automobile Upgrades Wireless Business Technology Budget Downtime End of Support Competition communications Mouse YouTube Information Technology Collaboration Unified Communications Legal Healthcare Humor Patch Management LiFi Analyitcs Scam Twitter Politics Monitors Vulnerability Travel Regulations Google Drive Identity Theft Websites Automation VPN Physical Security Augmented Reality Going Green Specifications Taxes Botnet IBM Running Cable Virtual Private Network Smart Technology Printing Assessment Samsung Licensing User HIPAA Server Management Mail Merge Distributed Denial of Service Computer Repair Vulnerabilities Undo Disaster Resistance Cleaning Consultation Notifications Relocation Software Tips Electronic Health Records iPhone IP Address IT Technicians Statistics Technology Tips Address Managed IT Service Webcam Alt Codes Electronic Medical Records Google Wallet Modem Dark Data Geography Proactive IT Hotspot User Error Crowdsourcing Private Cloud Cyberattacks Mobile Office Mirgation Bluetooth Comparison Cookies Redundancy Break Fix Point of Sale Corporate Profile Typing Drones Buisness Cables IT Consulting Language Quick Tips Printer Black Friday Error History Bookmarks Migration Nanotechnology Dark Web WannaCry Cryptocurrency Knowledge Wires Data Breach Computing Infrastructure PowerPoint Time Management Access Control Cyber Monday Cabling Favorites Chatbots IoT Consumers Data Warehousing Web Server Bitcoin Update Staffing Experience MSP Technology Laws Alerts Network Management SharePoint flu season Administrator 3D Printing Conferencing Identity Utility Computing Lenovo Microsoft Excel Cameras VoIP Windows 8 Chromebook GPS Law Enforcement Google Maps Network Congestion Proactive eWaste Domains Unified Threat Management Cooperation Touchscreen Downloads Entrepreneur Shortcut Fort Worth IT Sevices Disaster Unsupported Software 5G Application Superfish Blockchain CCTV Digital Emoji Tracking Gadget Users Display Remote Monitoring and Management Environment Public Speaking business communications systems Staff Multi-Factor Security flu shot Uninterrupted Power Supply Mobile Data Hacks Cost Management Permissions Spyware WPA3 Troubleshooting Internet Protocol Flexibility Google Calendar Fort Worth IT Solid State Drive Current Events Laptop Management Hard Drives Networking Fraud G Suite How To Processors Virtual Desktop Fleet Tracking VoIP streamlines Operations Phone System Heating/Cooling Legislation DFW IT Service Motion Sickness Hard Disk Drive Social Networking Halloween Google Docs Enterprise Resource Planning Refrigeration Net Neutrality Firefox Supercomputer Help Desk Writing Asset Tracking business network infrastructure Wearable Technology Servers Deep Learning Personal Information Fun Motherboard Scary Stories Mobile Techology Internet Exlporer IT Consultant IT Budget Machine Learning Social Engineering Remote Workers data services Software as a Service

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code