Bredy Network Management Corporation Blogs

2 minutes reading time (372 words)

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to BNMC at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Business Computing Hackers Internet Software Microsoft Google Business Computer Hosted Solutions Ransomware Mobile Devices Network Security Smartphone Managed IT Services Android IT Services Tech Term Hardware Windows Data Management Small Business IT Support Backup Business Continuity Windows 10 Cloud Computing Internet of Things Cybersecurity Data Browser App Innovation User Tips Business Management Encryption Remote Monitoring Facebook Server Data Recovery Artificial Intelligence Gmail Saving Money Managed IT Services Windows 10 Disaster Recovery Tip of the week Word Outsourced IT Smartphones Data Backup Productivity Productivity Vulnerability Chrome Communication Managed Service Provider Office 365 Phishing Efficiency Money IT Support Infrastructure Website Office Tips Robot Google Drive Antivirus Content Filtering Passwords Bandwidth Big Data Upgrade Settings Analytics Employer-Employee Relationship communications Government IT Management Applications Microsoft Office Data storage Network YouTube Risk Management Social Media Computing Outlook Telephone Systems Spam WiFi LiFi Vendor Management Company Culture Monitors Hosted Solution Maintenance Save Money Firewall Two-factor Authentication The Internet of Things Avoiding Downtime Administration Mouse Managing Stress Scam Automation VoIP Miscellaneous End of Support Wireless Virtual Reality Apple Storage HIPAA VPN Mobile Device SaaS Workplace Tips Data Security Paperless Office Holiday Business Technology Mobile Security Server Management BYOD Virtual Private Network Alert Data loss Unified Threat Management IT Technicians Optimization Mail Merge Blockchain Running Cable Alt Codes Customer Service Connectivity Downloads Staff desktop Office Leominster Samsung Shortcut Distributed Denial of Service Bring Your Own Device Operating System Digital Payment Modem FinTech VoIP Unified Threat Management Buisness Bluetooth Comparison Virtual Desktop Budget Regulations Digital Tech Support Firefox Superfish Sports Social Language Disaster Value Information Technology Mirgation Recycling Address Permissions Laptop Typing Humor Collaboration IoT Chromebook Augmented Reality Social Engineering K-12 Schools Patch Management Managed IT Service Best Practice Cookies MSP User Error Current Events Specifications Document Management Social Networking Spyware Websites Customer Relationship Management Computing Infrastructure Uninterrupted Power Supply Professional Services Apps Computer Care Chatbots IBM eWaste Cryptocurrency File Sharing Star Wars Heating/Cooling Multi-Factor Security Wearable Technology Solid State Drive Safety Network upgrade Break Fix Cybercrime Google Docs Nanotechnology Development Time Management Printer IT solutions Downtime Going Green Search Black Friday Identity Theft Motherboard Cables Networking Marketing Education Hacks Alerts USB Remote Computing Google Wallet Training Identity Corporate Profile Continuity Emergency Gadgets Bitcoin Fraud Network Congestion Cost Management Servers Google Calendar Hard Disk Drive Smart Office Dark Web Business Growth Automobile Screen Reader Charging Network Management Access Control Printing Cyber Monday Legal Wi-Fi Wires Password Licensing Dell Writing Dongle Legislation Unified Communications Drones WannaCry Solar Users Halloween Windows 8 Cabling Computers Assessment Work Microsoft Excel Hacker Google Maps Dark Data Smart Tech Touchscreen SharePoint Service Level Agreement Managed IT Smart Technology Deep Learning Router Voice over Internet Protocol Quick Tips Techology Cooperation Retail Statistics Tablet Compliance Business Intelligence Politics How To Lenovo Scary Stories Hotspot Display Internet Exlporer IT Consultant How To Work/Life Balance Recovery Health Private Cloud Mobile Computing Cameras Tracking Meetings Black Market Cleaning Law Enforcement CCTV Notifications Electronic Medical Records Physical Security Webcam Twitter Upgrades Gadget Emoji Crowdsourcing Error Personal Information Botnet Point of Sale Ben McDonald shares 3D Printing Travel Cortana G Suite Supercomputer BDR CrashOverride Machine Learning Processors Staffing Unsupported Software Motion Sickness Virtualization Taxes Administrator Update IT Budget Computer Repair Relocation Mobile Device Management Web Server what was your? GPS Mobile Data

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3