30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to BNMC at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, October 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Computing Software Network Security Computer Internet Microsoft Tech Term IT Services Hosted Solutions Business Google Mobile Devices Ransomware User Tips Small Business Android Backup Efficiency Managed IT Services Smartphone Productivity Data Recovery Browser Internet of Things Innovation IT Support Saving Money Data Management Business Continuity Hardware Cloud Computing Windows Cybersecurity Communication Managed IT Services App Data Backup Windows 10 Data Facebook Server Windows 10 Business Management Microsoft Office Remote Monitoring Encryption Gmail Artificial Intelligence Passwords Smartphones Productivity Network Chrome Managed Service Provider Money Applications IT Support Phishing Workplace Tips Infrastructure Office 365 Tip of the week Upgrade Website Outsourced IT Word Vulnerability Analytics communications Disaster Recovery Employer-Employee Relationship Robot IT Management Save Money Data storage Settings Government YouTube Google Drive Risk Management Content Filtering Social Media Bandwidth BYOD Maintenance Miscellaneous Antivirus Office Tips Big Data VoIP Data Security HIPAA Information Mobile Device Business Technology Server Management Virtual Private Network Mobile Security Automation Paperless Office Touchscreen End of Support Virtual Reality Spam Computing Outlook WiFi Operating System Business Intelligence Unified Threat Management LiFi Users Data loss SaaS Hosted Solution Telephone Systems Administration desktop Two-factor Authentication Company Culture Mouse Avoiding Downtime Holiday Firewall Scam Alert Managing Stress Display Apple Laptop Storage Wireless The Internet of Things VPN Monitors Vendor Management Cyber Monday Screen Reader Charging Chromebook PowerPoint Unified Communications Drones Smart Office Training Windows 8 Corporate Profile Wires Automobile Cybercrime Licensing Dongle Social Engineering Hacker Hard Disk Drive Downtime Legislation Websites Microsoft Excel Assessment Co-Managed IT Deep Learning Dell Marketing SharePoint Solar Managed IT Smart Technology Smart Tech Onboarding Cabling Gadgets Quick Tips Techology Work WannaCry Router Voice over Internet Protocol Slack Google Maps How To Lenovo Cooperation Service Level Agreement Safety Alt Codes Statistics Tablet Mail Merge Blockchain Hotspot Internet Exlporer Remote Computing Content Bring Your Own Device Downloads Compliance Shortcut Distributed Denial of Service Connectivity Network Congestion Digital Signage Budget Halloween VoIP Unified Threat Management IT Technicians Optimization Social Modem FinTech Monitoring Information Technology Firefox Superfish Staff Leominster Typing Humor Bluetooth Comparison Wi-Fi Digital Payment Current Events Address Permissions Language Value Writing Streaming Best Practice Regulations Digital Patch Management Managed IT Service IoT Computers Troubleshooting Disaster Scary Stories User Error Mirgation Recycling Specifications Cookies MSP Dark Data Update Spying Collaboration Apps Running Cable Customer Relationship Management Augmented Reality K-12 Schools Cryptocurrency Analysis IT solutions Going Green Computing Infrastructure Professional Services Retail Google Docs Buisness Heating/Cooling Multi-Factor Security Social Networking Education Document Management Hacks Spyware Virtual Desktop Break Fix Star Wars Uninterrupted Power Supply Sports Time Management Printer Chatbots eWaste Politics Search Black Friday Nanotechnology Development Customer Service Employee-Employer Relationship File Sharing Google Wallet Networking Wearable Technology Network upgrade Computer Care Bitcoin IBM Managed Service Printing Emergency Alerts USB Office Samsung Business Growth Solid State Drive Servers Google Calendar Motherboard Cables Identity Theft Password Dark Web Fraud Cost Management LED Legal Network Management Access Control Identity Continuity Tech Support Travel Law Enforcement BDR Electronic Medical Records Notifications G Suite Supercomputer Mobile Device Management CrashOverride Twitter Physical Security Regulation Emoji Motion Sickness Upgrades Gadget Staffing Administrator Crowdsourcing Taxes Personal Information Botnet IT Budget Mobile Computing Web Server what was your? Cortana 3D Printing GPS IT Consultant Machine Learning Processors Cameras Virtualization Meetings Unsupported Software Tracking Cleaning Computer Repair Relocation CCTV Printers Webcam Mobile Data Recovery How To Work/Life Balance Health Private Cloud Error Black Market Point of Sale Ben McDonald shares

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3