Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Telesys Voice and Data at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Monday, 20 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Hackers Privacy Business Computing Productivity Malware Business Microsoft Email Windows 10 Internet Backup Computer Hosted Solutions IT Services Software Ransomware Network Security User Tips Smartphone Workplace Tips Managed Service Provider Android Google Social Media Business Continuity Hardware IT Support Mobile Devices App Efficiency Browser Communication Managed IT services Disaster Recovery Office Smartphones Upgrade Remote Monitoring Data Innovation Windows Miscellaneous WiFi Data Management Facebook Microsoft Office Office 365 Big Data Network Hosted Solution Recovery Password Small Business Gmail Spam Internet of Things Holiday Robot Apps Phishing Work/Life Balance Customer Service Mobile Device Management Office Tips Tip of the week Employer-Employee Relationship Server Productivity Cloud Computing Risk Management Artificial Intelligence Word Unified Threat Management Hacker Firewall Outsourced IT Data Backup How To Content Filtering Apple Save Money Avoiding Downtime Encryption Hacking Social Data Recovery Operating System Telephone Systems Business Management Settings Saving Money Remote Computing Presentation Business Growth Cybersecurity Computers IT Support Alert Customer Relationship Management Outlook Managed IT Services Data storage Computing Chrome Passwords Education Cybercrime Health Money SaaS BYOD Tablet Wireless Technology Mobile Computing Automobile Upgrades Wireless Budget Downtime End of Support Competition Website Tech Support communications Wi-Fi Mouse YouTube Information Technology Windows 10 Collaboration Legal Humor File Sharing LiFi Two-factor Authentication Analyitcs Twitter Politics Monitors VoIP Analytics Vendor Management Google Drive Websites The Internet of Things Going Green Virtual Private Network Physical Security Taxes Running Cable Botnet IBM Printing Samsung Bandwidth User Search Maintenance Bring Your Own Device Sports IT Management IT service Retail Cortana Virtualization Best Practice Computer Care Antivirus Administration Lithium-ion battery Business Owner Virtual Reality Government Mobile Device Training IT solutions Safety Marketing Paperless Office Data loss Unified Threat Management PowerPoint Network Management Downloads Infrastructure Experience Consumers Superfish Web Server VoIP Bitcoin Update Staffing BDR business communications systems Touchscreen Multi-Factor Security Shortcut Administrator Disaster 3D Printing Scam Cameras Digital Windows 8 Chromebook GPS Law Enforcement Google Maps Network Congestion eWaste Domains Internet Protocol Google Calendar Entrepreneur Patch Management IT Sevices Uninterrupted Power Supply Unified Communications Unsupported Software 5G Application Networking CCTV Spyware Emoji Tracking Legislation Gadget Users Display Environment Public Speaking VoIP streamlines Vulnerability Solid State Drive Mobile Data Hacks Data Security How To Document Management Heating/Cooling Troubleshooting business network infrastructure VPN Travel Hard Disk Drive Current Events Processors Identity Theft Laptop Hard Drives Techology G Suite Firefox Servers Virtual Desktop Automation data services Phone System Augmented Reality Motion Sickness Supercomputer Halloween Google Docs Specifications Refrigeration Disaster Resistance Assessment Server Management Help Desk Writing User Error Fun Mail Merge Deep Learning Personal Information IT Budget Scary Stories Proactive IT IT Consultant Consultation Statistics Machine Learning Licensing Social Engineering Printer Address Meetings Computer Repair Notifications Digital Payment Storage Undo IT Consulting Cleaning Bluetooth Relocation Software Tips iPhone IP Address Google Wallet Project Management Webcam Corporate Profile Alt Codes Electronic Medical Records Crowdsourcing Dark Data Data Breach Quick Tips Access Control Private Cloud Mobile Office Drones Business Technology Point of Sale WannaCry Typing Buisness Technology Laws Time Management SharePoint Managed IT Error Cabling Knowledge Lenovo Cryptocurrency

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code