(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Patrick Agostino

Resolve I.T.™ has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware Can Just Be Devastating

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

Keep in mind that these numbers don’t come from the federal government or the Federal Bureau of Investigation, as they don’t track these attacks. As of May 10th, of this year, there have been 22 known attacks on the public sector, and there are likely even more than we don’t know about.

March 2019 Attacks

March saw a few ransomware attacks on municipalities, including the one on the sheriff’s office in Fisher County, Texas, which was infected and couldn’t connect to a state law enforcement database.

Albany, New York announced that it also has become victimized by a Saturday ransomware attack. This was a tactical choice by the hackers, as there was nobody around to actually fight back against the attack on a weekend. The city gave an understated account of the attack’s effect, but the real issues were considerable in nature--much worse than delayed marriage licenses and birth certificates.

Ransomware also hit the Albany Police Department’s systems, resulting in the entirely digitized systems being inaccessible. Officers were unable to access incident reports, crime reports, and schedules.

April 2019 Attacks

In April, Genesee County, Michigan’s tax department was completely shut down by ransomware for more of the month. The infection has been removed since.

May 2019 Attacks

The complete shutdown of Baltimore, Maryland was the highlight (if you can call it that) May attack. Caused by a ransomware called RobinHood, various issues kept the government from working as intended. Emails couldn’t be sent, payments couldn’t be processed, and real estate transactions had to be placed on hold. According to cybersecurity expert Avi Rubin, RobinHood utilized a notoriously powerful algorithm that even the National Security Agency couldn’t break. Furthermore, Baltimore was utilizing outdated hardware and software, which further exacerbated the problem.

Baltimore City Mayor Jack Young has gone on the record stating that the city will not be paying the ransom of 13 Bitcoins (approximately $100,000). The FBI and Secret Service have been called in to investigate, but the city is expecting a lengthy recovery time of at least a few months.

Rubin has provided some insight into why not paying the ransom was the right call, stating that if nobody ever paid these ransoms, then the attacks wouldn’t be as popular as they are in the first place. Unfortunately, companies often pay the ransom due to several factors, one of which is almost certainly the embarrassment factor that comes with falling victim to a threat like this. 45 percent of affected organizations pay the ransom to try to get their data back, while 17 percent of state and local governments pay up.

Resolve I.T.™ has some experience dealing with these attacks, and we agree with the decision made by organizations that refuse to pay the ransom. There’s no guarantee that you will save your data, even by paying the ransom, so why should you do so? After all, you’re only funding future ransomware attacks. It’s no different from investing in the hacking campaign.

We instead recommend implementing preventative measures to keep attacks like this at bay in the first place. To learn more, reach out to us at (978) 993-8038.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Microsoft Cloud Business Computing Hackers Google Malware Efficiency Internet Productivity Miscellaneous Smartphones Network Security Business Data User Tips Innovation Backup Software Mobile Devices Hosted Solutions Email Communication Productivity Workplace Tips Windows Computer Hardware Business Management IT Services Communications Android Smartphone Upgrade IT Support VoIP Social Media Browser Microsoft Office Cybersecurity Save Money Ransomware Holiday Windows 10 Outsourced IT Passwords Network Small Business Tech Term IT Support Alert Mobile Device Office Business Continuity Managed IT Services Quick Tips Managed IT Services Employer-Employee Relationship Apps Apple Marketing Windows 10 Remote Computing Server Users Collaboration Managed Service Provider Going Green Internet of Things Chrome Virtualization Disaster Recovery Health Bandwidth Automation Gadgets Hacking Gmail Mobile Device Management Big Data Data Backup Facebook Antivirus Mobile Computing Applications Data Recovery iPhone Wi-Fi Operating System Remote Monitoring History WiFi Saving Money Wireless IT Solutions Cloud Computing The Internet of Things Password Mobility Search... Settings Information App Analytics Business Intelligence Computers VPN Current Events Managed Service Application Excel Router Office Tips Retail Networking Company Culture Government Cybercrime Phishing Law Enforcement Twitter Blockchain Website Office 365 Spam Compliance BYOD Artificial Intelligence PowerPoint Maintenance Physical Security Laptop Tablet Data Management Access Control Recovery Safety Telephone Systems Net Neutrality Data Breach Value Patch Management Social Engineering Paperless Office Lithium-ion battery Environment Entertainment Word Mouse VoIP Wireless Technology Battery Virus Managed IT Service Biometrics Sports Proactive IT Save Time Google Drive Workers Memory Politics HIPAA Cost Management Printer Hiring/Firing Connectivity Voice over Internet Protocol Hard Drives Cleaning Printer Server DDoS Tech Support Phone System Programming Scam Humor Mobile Office Customer Relationship Management Wireless Charging People Files Robot Education Dark Web Employee-Employer Relationship Best Available Windows 8 End of Support Internet Exlporer Customer Service Virtual Assistant Wearable Technology Tip of the week Data storage Healthcare Streaming Media Remote Monitoring and Management Processor Data Protection BDR Fax Server Saving Time Licensing Outlook Risk Management Data Security Touchscreen Smart Technology Two-factor Authentication Online Currency RAM How To Tech Terms Human Resources Bluetooth Shortcut Avoiding Downtime Managing Stress Batteries Information Technology Bring Your Own Device G Suite Money eWaste Best Practice Budget Medical IT Cortana Hosted Solution Vulnerability Telephony Display User Error Payment Cards Downtime Tablets Uninterrupted Power Supply Storage Threats Debate Knowledge e-waste Techology Multi-Factor Security Document Management Certification eCommerce Workplace Windows Server 2008 R2 News Data loss Worker Windows 7 Social Error Scams Windows 8.1 Update Comparison disposal HaaS Digital Training Online Shopping Downloads Time Management LinkedIn Taskbar Telephone System Staff User Windows XP Social Networking Microsoft Office 365 Project Management Specifications Flexibility Copy Trends Edge Black Market Security Cameras Chrome OS Amazon National Security Websites USB Distributed Denial of Service Analyitcs Shadow IT Spotify Windows Media Player Authentication Insurance Conferencing Legal Paste Lead Generation A.I. Meetings Wearables Plug-In Updates Trending Remote Support Dongle IT Consultant Access Authorization File Management Piracy Content Filtering Database Movies IT budget Electronic Health Records Video Surveillance Advertising Printers Video Games Remote Control YouTube Webcam Troubleshooting Managed Services Provider User Tip Tactics WannaCry Unified Communications IT Management Monitor Automobile Encryption Employees Virtual Reality Analysis Benchmarks File Sharing Technology Tips Private Cloud Staffing Alerts Spam Blocking NarrowBand Update Vendor Telecommuting Internet Explorer Administration Hard Drive Reputation WIndows 7 E-Commerce Notifications Bloatware Recycling Statistics User Security Backup and Disaster Recovery Law Firm IT PDF Work/Life Balance Email Management Chromecast Unified Threat Management Profitability Social Network Millennials Threat Processors Microsoft Teams Solid State Drive Samsung Network Attached Storage Customers Personal Information SharePoint Payment Vendor Management Entrepreneur Reporting Business Technology SSD Google Maps Eliminating Downtime Printing Spyware Hard Disk Drive Travel Server Management SaaS instant Messaging Hacker Bitcoin Inventory Gadget Botnet Computer Accessories Wireless Internet Paper Hybrid Cloud Video Crowdfunding Live Streaming Machine Learning Vulnerabilities Science Worker Commute GDPR Sales Mobile Security Cabling HP Touchpad Managed IT Cameras Help Desk Voice over IP Ink Skype Cables OneNote WhatsApp Telecommute Relocation Consultant Running Cable Cryptocurrency

Mobile? Grab this Article!

QR-Code

Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...