312-253-4321    Get SUPPORT

Alchetec Blog

65 Bitcoin Ransom Paid by Florida City

65 Bitcoin Ransom Paid by Florida City

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.

A few weeks ago, an unwitting employee of the city of Riviera Beach, a small city just up the coast from West Palm Beach, clicked on a file that wasn’t supposed to be clicked on and it ended up locking large portions of their municipal computing infrastructure. When the initial report came to the City Council, they decided it was high time that they updated their computers and approved to spend nearly $1 million to update all municipal computers. Only then were they told that new hardware is all well and good, but paying to upgrade their computers isn’t going to get their access to data back. 

The only way that was going to happen is by giving over to the hackers demands. They were simple: produce 65 Bitcoin, and the files will be decrypted. Since after the ransomware was deployed, the city email system was unavailable and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response, the city council acted quickly as to avoid a long, drawn-out situation that could potentially cost the city millions. 

Ransomware victims: Atlanta, GA; Newark, NJ; and Sarasota, FL, had been examples of cities that refused to pay ransoms only to see costs of recovery soar. Currently, the FBI, the Department of Homeland Security, and the U.S. Secret Service are all working on the case.

Typically, we’ve advised ransomware victims not to pay the ransom, since it provides the hackers the resources they need to continue conducting acts of cybercrime. It’s been mentioned repeatedly by IT professionals and cybercrime experts that there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a major and continuously-developing problem for municipalities and businesses, alike. For more information about ransomware, subscribe to our blog, or give us a call at 312-253-4321.

Our Top 7 List of IT Myths and Wild Conspiracies
Tip of the Week: Working Around Windows’ Restore P...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 14 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Network Security Data Backup IT Services Data Hosted Solutions Software Privacy Malware Email Hackers Outsourced IT Internet IT Support Data Recovery Microsoft Computer Innovation Productivity Managed IT Services Business Ransomware User Tips Hardware Efficiency Tech Term Business Continuity Cloud Computing Small Business Managed IT Services Google Windows 10 Collaboration Backup Communication Phishing IT Support Upgrade Cybersecurity Mobile Devices Paperless Office VoIP Business Management Workplace Tips Android Remote Monitoring Disaster Recovery Managed Service Office 365 Internet of Things Passwords Server Save Money Managed IT Smartphone Data Management Managed Service Provider Smartphones Communications Mobile Device Browser Artificial Intelligence Encryption Help Desk Document Management Holiday Saving Money Social Media Windows 10 BYOD BDR Government Wi-Fi Quick Tips Laptops Compliance Training Applications Business Technology Microsoft Office Windows Automation Password Miscellaneous Healthcare Risk Management Facebook Employer-Employee Relationship Chrome Blockchain Virtualization Apps Going Green SaaS Network Vendor Management Telephone Systems Information Tip of the week Bandwidth Avoiding Downtime File Sharing Infrastructure Recovery Antivirus Unified Threat Management Redundancy Vulnerability IT Management Scam Project Management Processor Analytics Windows 7 Work/Life Balance Access Control Word IT Service Data Security Regulations Gadgets Data Storage Customer Relationship Management Big Data Website Firewall Files Data loss Tablet Bring Your Own Device Hosted Solution Money Office Router Wireless Robot Mobile Device Management Politics Storage Mobility Gmail Machine Learning Two-factor Authentication App VPN RMM Virtual Reality Maintenance IoT Electronic Medical Records Professional Services Settings Remote Workers Cooperation Monitors Virtual Private Network Operating System Mobile Security The Internet of Things Solid State Drive Search Company Culture Computing Alert Downtime Recycling Software as a Service Assessment Digital Payment Utility Computing Flexibility Identity Theft Dark Web Monitoring Users Samsung Printing Licensing Customer Service Patch Management Consultation Unified Communications Outlook Smart Technology Upgrades Network Management Management Chromebook Computers Apple Net Neutrality Twitter Proactive How To Health Server Management Uninterrupted Power Supply HIPAA Employees Social Employee-Employer Relationship File Management OneDrive Display Remote Computing Remote Monitoring and Management How To Networking Internet Exlporer Hard Drive Supercomputer Point of Sale Augmented Reality Mobile Data Websites Payment Cards Travel IT Technicians Geography Wires Automobile Zero-Day Threat Social Engineering Managed IT Service Cookies Wireless Technology Security Cameras 5G Data Breach Value of Managed Services Content Filtering History Mobile Emoji Instant Messaging Tech Support Manufacturing Specifications Employer/Employee Relationships Tracking IT Solutions Processors WPA3 Safety Google Drive Windows Server Cache IBM Transportation Corporate Profile Social Networking Firefox Bitcoin IT Budget Permissions Star Wars Legal Law Enforcement E-Commerce Virtual Assistant Statistics SharePoint Telephone Mirgation High-Speed Internet USB Backup and Disaster Recovery Hacker Digital Break Fix Nanotechnology Personal Information Remote Worker Technology Laws Managed Services G Suite Cabling Staff Private Cloud Finance Hard Disk Drives Mail Merge Proactive Maintenance Fleet Tracking Tech Terms Techology User Management Hotspot Update Bookmarks Network Congestion Shortcut Computer Care WannaCry Black Friday Motherboard Lenovo Current Events Fraud Gadget Features Wasting Time Humor Bluetooth Downloads Mobile VoIP Taxes Hard Disk Drive Migration Development Human Error Spyware Screen Reader Virus ROI Cortana Heating/Cooling Unified Threat Management Vendor Operations Managing Stress Authentication End of Support Address Database Management Mobile Computing Asset Tracking Theft Time Management Disaster Resistance Batteries Language eWaste Favorites Teamwork Education Technology Tips Solid State Drives Cyber Monday Superfish Projects Electronic Health Records Database Office Tips Multi-Factor Security Chatbots Cables Black Market MSP Permission GDPR Data Warehousing Smart Tech Computer Repair Crowdsourcing Consulting Notes Servers User Error Smart Devices Disaster Wearable Technology Enterprise Content Management Authorization Notifications OneNote Financial Proactive IT Remote Work Software Tips Computing Infrastructure Botnet Conferencing Spam Shared resources Mouse Options WiFi VoIP Test Return on Investment Cost Management Sports Cyberattacks Voice over Internet Protocol Hacking Google Calendar Identity Physical Security Microsoft Excel Connectivity Managed Services Provider PowerPoint Unsupported Software Printer Sensors Cybercrime Vulnerabilities Business Growth Distributed Denial of Service Modem Procurement 3D Printing Touchscreen IT Consulting Alerts Enterprise Resource Planning Meetings Comparison Wireless Internet GPS YouTube Active Directory Google Maps Telephony Read Only Dark Data Trending Legislation Information Technology Emergency Relocation Hard Drives Printers Cleaning Motion Sickness Marketing Budget Competition Students Regulation IP Address Error Sync Staffing Cyber security IT Consultant Mobile Office CrashOverride Domains Public Cloud Hiring/Firing Mobile Device Managment Administrator Public Speaking Fun Hacks Presentation Lithium-ion battery