312-253-4321    Get SUPPORT

Alchetec Blog

65 Bitcoin Ransom Paid by Florida City

65 Bitcoin Ransom Paid by Florida City

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.

A few weeks ago, an unwitting employee of the city of Riviera Beach, a small city just up the coast from West Palm Beach, clicked on a file that wasn’t supposed to be clicked on and it ended up locking large portions of their municipal computing infrastructure. When the initial report came to the City Council, they decided it was high time that they updated their computers and approved to spend nearly $1 million to update all municipal computers. Only then were they told that new hardware is all well and good, but paying to upgrade their computers isn’t going to get their access to data back. 

The only way that was going to happen is by giving over to the hackers demands. They were simple: produce 65 Bitcoin, and the files will be decrypted. Since after the ransomware was deployed, the city email system was unavailable and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response, the city council acted quickly as to avoid a long, drawn-out situation that could potentially cost the city millions. 

Ransomware victims: Atlanta, GA; Newark, NJ; and Sarasota, FL, had been examples of cities that refused to pay ransoms only to see costs of recovery soar. Currently, the FBI, the Department of Homeland Security, and the U.S. Secret Service are all working on the case.

Typically, we’ve advised ransomware victims not to pay the ransom, since it provides the hackers the resources they need to continue conducting acts of cybercrime. It’s been mentioned repeatedly by IT professionals and cybercrime experts that there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a major and continuously-developing problem for municipalities and businesses, alike. For more information about ransomware, subscribe to our blog, or give us a call at 312-253-4321.

Our Top 7 List of IT Myths and Wild Conspiracies
Tip of the Week: Working Around Windows’ Restore P...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Network Security IT Services Malware Privacy Hosted Solutions Software Email Data Backup Hackers Data Outsourced IT Internet Computer Microsoft Innovation Business Managed IT Services Productivity Data Recovery Ransomware IT Support Tech Term Cloud Computing Hardware Business Continuity Collaboration Backup User Tips IT Support Mobile Devices Small Business Efficiency Business Management Google Android VoIP Communication Managed IT Services Paperless Office Phishing Upgrade Windows 10 Remote Monitoring Workplace Tips Disaster Recovery Server Save Money Smartphones Internet of Things Data Management Cybersecurity Managed Service Provider Smartphone Communications Office 365 Encryption Managed IT Passwords Mobile Device Browser Artificial Intelligence Social Media Windows 10 Quick Tips BYOD Holiday Compliance Government Document Management Windows Saving Money Wi-Fi Laptops Facebook Managed Service Employer-Employee Relationship Applications Risk Management Business Technology Tip of the week Virtualization Network Vendor Management SaaS Healthcare Training Antivirus Infrastructure Processor Vulnerability Telephone Systems File Sharing Bandwidth Unified Threat Management IT Management Scam Automation Analytics Project Management Password BDR Recovery Chrome Blockchain Help Desk Information Microsoft Office Going Green Website Miscellaneous Virtual Reality Data Storage IT Service Regulations Work/Life Balance Firewall Wireless Data loss Mobile Device Management Tablet Router Two-factor Authentication Bring Your Own Device Office Hosted Solution Robot VPN Files Storage Apps Gmail Maintenance App Money Word Data Security Customer Relationship Management Politics Big Data Monitors Company Culture Health Machine Learning Users Software as a Service Social Customer Service Remote Computing Assessment Downtime Electronic Medical Records Digital Payment Patch Management Unified Communications Identity Theft Consultation Flexibility Proactive Licensing Redundancy Computing Management Employees Printing Smart Technology Network Management Net Neutrality Alert Server Management HIPAA Remote Monitoring and Management RMM Outlook Windows 7 Computers Upgrades Internet Exlporer Mobility How To Samsung Remote Workers Uninterrupted Power Supply Networking Access Control Operating System IoT The Internet of Things Display Cooperation Virtual Private Network Mobile Security Chromebook Gadgets How To Settings Twitter Corporate Profile Technology Laws Staff Business Growth Human Error Current Events Mail Merge Break Fix Nanotechnology Features Wasting Time Hotspot Recycling Authentication IT Budget Database Management Shortcut Black Friday Motherboard Monitoring ROI Solid State Drive Avoiding Downtime Techology Utility Computing Telephony Favorites Teamwork Digital Solid State Drives Bluetooth Downloads Search Migration Development Asset Tracking Theft G Suite Cabling Lenovo Fraud Computer Care WannaCry Heating/Cooling Unified Threat Management Operations Managing Stress Automobile MSP Permission Projects Address Dark Web Screen Reader Electronic Health Records Database Network Congestion Language Emoji eWaste Authorization GDPR Technology Tips Cyber Monday Mobile Computing Consulting Notes Taxes Hard Disk Drive Time Management Disaster Resistance Conferencing Shared resources Spyware Spam Options Multi-Factor Security IT Solutions Chatbots Processors Cables OneNote Financial Superfish Humor Servers User Error End of Support Wearable Technology USB Enterprise Content Management Test Return on Investment Cortana Data Warehousing Legal Smart Tech Law Enforcement Cyberattacks Voice over Internet Protocol Proactive IT Education Computing Infrastructure Private Cloud Mouse Personal Information Managed Services Provider PowerPoint Update Cost Management Meetings OneDrive Wireless Internet Hacking Google Calendar Identity Employee-Employer Relationship Procurement Disaster Office Tips WiFi VoIP Printer Vulnerabilities Software Tips Microsoft Excel Connectivity Gadget Read Only Augmented Reality Touchscreen IT Consulting Alerts Enterprise Resource Planning Wires Zero-Day Threat Apple Comparison Distributed Denial of Service Modem Virus Point of Sale Professional Services Hard Drive Instant Messaging Manufacturing Tech Support Employer/Employee Relationships Trending Legislation Security Cameras Cybercrime Wireless Technology 5G Transportation GPS YouTube IBM Websites IT Technicians Black Market Geography WPA3 Safety Unsupported Software Data Breach Mobile Backup and Disaster Recovery Google Maps Hacker Bitcoin Specifications 3D Printing Managed IT Service Computer Repair Cookies Crowdsourcing E-Commerce Virtual Assistant Cache Botnet Finance Hard Disk Drives Supercomputer Proactive Maintenance Social Networking Notifications Remote Worker Travel Google Drive Dark Data Bookmarks Tracking Statistics SharePoint Social Engineering Physical Security Mirgation High-Speed Internet Fleet Tracking Tech Terms Content Filtering History Firefox Mobile Data Permissions Sports Star Wars Cleaning Regulation IP Address Hard Drives Hacks Motion Sickness Mobile Office Relocation Domains Staffing Sync IT Consultant Public Speaking CrashOverride Presentation Mobile Device Managment Lithium-ion battery Error Administrator Hiring/Firing Fun Emergency Printers Public Cloud Marketing Information Technology Budget Students Competition