Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Telesys Voice and Data at (800) 588-4430.


No comments yet
Already Registered? Login Here
Sunday, 22 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Internet Windows 10 Hosted Solutions Backup Ransomware Computer IT Services Software Managed Service Provider Network Security Smartphone Mobile Devices Android User Tips Managed IT services Google IT Support Workplace Tips Hardware Browser Communication Social Media Efficiency Outsourced IT Disaster Recovery Business Continuity App Innovation Data Management Smartphones Small Business Office Business Management Data Holiday Cloud Computing Upgrade Remote Monitoring Server Office 365 Data Backup Windows Miscellaneous WiFi Microsoft Office Facebook Artificial Intelligence Spam Gmail Big Data Internet of Things Network Encryption Robot Firewall Data Recovery Apps Phishing Hosted Solution Recovery Password Saving Money Unified Threat Management Remote Computing Employer-Employee Relationship Risk Management How To Government Word Save Money Paperless Office Passwords Hacker Money Chrome Infrastructure Work/Life Balance Apple Avoiding Downtime Content Filtering Tip of the week Productivity Customer Service Mobile Device Management Cybersecurity Office Tips IT Support Operating System Alert Managed IT Services VoIP Two-factor Authentication Data storage Presentation Business Growth Settings Computing Analytics IT Management Tech Term The Internet of Things Customer Relationship Management Computers Antivirus Outlook Virtual Reality Mobile Device Managed IT Bandwidth SaaS Data loss BYOD Education Applications Health Cybercrime Windows 10 Hacking Telephone Systems Mobile Computing Social Document Management Tech Support Vendor Management Website Data Security Wi-Fi Physical Security Virtual Private Network Going Green Humor YouTube Taxes Unified Communications Botnet Server Management Printing Analyitcs LiFi Samsung Licensing Maintenance Digital Payment Storage Specifications Computer Care Augmented Reality Project Management IBM Running Cable Training User Business Technology Tablet Retail Bring Your Own Device Search Upgrades Automobile Sports Budget IT service Best Practice Cortana End of Support Lithium-ion battery Virtualization Business Owner Administration Mouse HIPAA Marketing Collaboration IT solutions Mobile Security Scam Safety Legal Vulnerability Wireless Technology File Sharing Twitter Wireless Competition Politics Monitors VPN Travel Downtime communications Google Drive Identity Theft Information Technology Websites Automation Dark Web Domains Nanotechnology Motion Sickness Computing Infrastructure Techology 5G Access Control Google Docs Assessment Entrepreneur Environment Supercomputer Help Desk Chatbots data services Cyber Monday Writing Application Users Data Warehousing Personal Information Mail Merge Public Speaking IT Consultant Alerts Disaster Resistance SharePoint Consultation Troubleshooting IT Budget Statistics Identity Machine Learning User Error flu season Social Engineering Microsoft Excel Computer Repair Address Meetings Phone System Cleaning Cooperation Notifications Proactive IT Downloads Bluetooth Hard Drives Software Tips Relocation Laptop Fort Worth Virtual Desktop Blockchain Electronic Medical Records Redundancy Google Wallet Corporate Profile Webcam Staff Crowdsourcing IT Consulting Multi-Factor Security Dark Data Quick Tips Refrigeration Compliance Private Cloud Halloween flu shot Point of Sale Permissions Drones WannaCry Deep Learning Flexibility Data Breach Fun Google Calendar Time Management Cabling Regulations Error Scary Stories Fort Worth IT Fraud Operations Technology Laws Legislation Network Management iPhone Undo Social Networking DFW IT Service Web Server Net Neutrality Update Lenovo IP Address VoIP Staffing BDR Alt Codes Wearable Technology Unified Threat Management Touchscreen 3D Printing Shortcut Disaster Motherboard Administrator Smart Technology Cameras Internet Exlporer Chromebook Superfish Mobile Office Digital GPS Google Maps Typing Law Enforcement business communications systems Software as a Service Network Congestion Unsupported Software Patch Management Uninterrupted Power Supply Router Buisness Distributed Denial of Service CCTV Emoji Spyware Tracking PowerPoint Cryptocurrency IT Technicians Gadget Internet Protocol Knowledge Technology Tips Display Mobile Data Hacks Solid State Drive Consumers Modem Managed IT Service Hotspot Networking How To Bitcoin Mirgation VoIP streamlines Experience Comparison Heating/Cooling Current Events Hard Disk Drive Cookies Break Fix G Suite Language Processors Printer Firefox eWaste IT Sevices Windows 8 Migration business network infrastructure Black Friday Servers

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...