312-253-4321    Get SUPPORT

Alchetec Blog

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Alchetec. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 312-253-4321.

Reduce Your Technology Headaches Go with Managed I...
Power Off, or Leave It On?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Malware Business Computing IT Services Email Hackers Software Productivity Managed IT Services Network Security Outsourced IT Data Backup Hosted Solutions Internet Data Tech Term Ransomware Microsoft Backup IT Support Computer Data Recovery Business Mobile Devices Business Continuity Innovation Cloud Computing Small Business Productivity Hardware IT Support Google Smartphone Android User Tips Data Management Remote Monitoring Managed IT Paperless Office Disaster Recovery Internet of Things VoIP Communication BYOD Cybersecurity Browser Artificial Intelligence Windows 10 Workplace Tips Managed Service Provider Facebook Encryption Mobile Device Office 365 Phishing Applications Business Management Social Media Save Money Smartphones Efficiency Passwords Telephone Systems Unified Threat Management Managed IT Services Compliance Recovery Holiday Network Risk Management Saving Money Server Tip of the week Government Document Management Wi-Fi Infrastructure SaaS Vulnerability Router Data loss Storage IT Management Gmail App Bandwidth Project Management Employer-Employee Relationship File Sharing Password BDR Managed Service Chrome Virtualization Files Going Green Windows 10 Website Data Security Vendor Management Money Data Storage Word Regulations Collaboration Virtual Reality IT Service Two-factor Authentication Windows Work/Life Balance Healthcare Hosted Solution Antivirus Robot Firewall Training Licensing Smart Technology Network Management Tablet Scam Apps Computing Alert Analytics Server Management The Internet of Things HIPAA Automation VPN How To Microsoft Office Customer Relationship Management Quick Tips Internet Exlporer How To Monitors Samsung Uninterrupted Power Supply Blockchain IoT Big Data Mobility Virtual Private Network Information Help Desk Miscellaneous Maintenance Mobile Security Business Technology Chromebook Upgrade Twitter Politics Health Wireless Flexibility Assessment Mobile Device Management Machine Learning Remote Computing Patch Management Bring Your Own Device Digital Payment Office Unified Communications Outlook Computers Redundancy Upgrades Identity Theft USB Mouse Tech Support Employee-Employer Relationship Legal Law Enforcement Proactive IT Wireless Technology Computing Infrastructure Management IBM Identity Remote Monitoring and Management Personal Information Safety Net Neutrality Cost Management Unsupported Software Read Only Hacking Google Calendar Vulnerabilities Display Wires Hacker Disaster Microsoft Excel Connectivity 3D Printing Point of Sale Update Printer Comparison Gadgets Software Tips Distributed Denial of Service Modem Remote Workers Gadget Touchscreen IT Consulting WiFi VoIP Alerts Enterprise Resource Planning Dark Data Apple Social Engineering WPA3 Virus Networking Hard Drive Mobile Data Trending Legislation IT Technicians Geography E-Commerce Websites Access Control Black Market Specifications Managed IT Service Cookies Data Breach GPS YouTube Cooperation Mobile Customer Service Google Maps Social Networking Search Fleet Tracking Computer Repair Crowdsourcing Google Drive Cache Supercomputer Mirgation High-Speed Internet Notifications Firefox Travel Permissions Star Wars Features Botnet Statistics SharePoint Physical Security Mail Merge Content Filtering History Break Fix Nanotechnology Monitoring Sports Technology Laws Tracking Settings Staff Company Culture Network Congestion Communications Shortcut Software as a Service Spam Black Friday Motherboard Asset Tracking Avoiding Downtime Techology Corporate Profile Hotspot Recycling Humor Business Growth IT Budget Migration Development End of Support MSP Social Lenovo Solid State Drive Fraud Utility Computing Cortana Electronic Health Records Bluetooth Downloads Address G Suite Cabling Dark Web Screen Reader Printing Consulting Telephony Heating/Cooling Unified Threat Management Digital Operations Managing Stress Education Automobile Technology Tips Cyber Monday Mobile Computing OneNote Electronic Medical Records Time Management Disaster Resistance Computer Care WannaCry Language eWaste Office Tips Chatbots Cables Proactive Consultation Superfish Taxes Hard Disk Drive Cyberattacks Emoji Multi-Factor Security IT Solutions Processors Data Warehousing Smart Tech Managed Services Provider Servers User Error Augmented Reality Spyware Wearable Technology Enterprise Content Management Sync 5G Staffing Fun IT Consultant Private Cloud Marketing CrashOverride Budget Mobile Device Managment Administrator Competition Printers Error Emergency IP Address Cybercrime Users Hard Drives Information Technology Public Cloud Regulation Mobile Office Domains Cleaning Hacks Motion Sickness Public Speaking Downtime Presentation Lithium-ion battery Relocation Hiring/Firing